Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe
Resource
win10v2004-20241007-en
General
-
Target
a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe
-
Size
413KB
-
MD5
7990a69a00f56f871d6b25979c142a1c
-
SHA1
4f6be831ea948d1efdb2c09d17b7341948440ff9
-
SHA256
a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0
-
SHA512
c90cf0381bac5806f882b89aa542735fb952471056a7a8a5e3e7b141db1d7cc34c91d9048610a19ece8344324b3d7aaec8a957144255aecf5151aeb8419052de
-
SSDEEP
6144:KXy+bnr+cp0yN90QEGXweAcBVjflo1O75DqFMQb7FFCF42rywA072MMRmKpsX:5Mr8y90MX6cBFf625DaMfF42zA3MVKOX
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023ba3-5.dat healer behavioral1/memory/4868-8-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dGM76rT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dGM76rT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dGM76rT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dGM76rT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dGM76rT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dGM76rT.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2336-17-0x00000000027F0000-0x0000000002836000-memory.dmp family_redline behavioral1/memory/2336-19-0x0000000005290000-0x00000000052D4000-memory.dmp family_redline behavioral1/memory/2336-23-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-29-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-83-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-81-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-77-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-75-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-73-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-71-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-69-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-65-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-63-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-59-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-57-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-55-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-53-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-51-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-49-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-47-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-45-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-43-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-39-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-37-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-35-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-33-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-27-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-25-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-79-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-67-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-61-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-41-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-31-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-21-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/2336-20-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4868 dGM76rT.exe 2336 ebc91LO.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dGM76rT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebc91LO.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 dGM76rT.exe 4868 dGM76rT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 dGM76rT.exe Token: SeDebugPrivilege 2336 ebc91LO.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4868 4324 a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe 83 PID 4324 wrote to memory of 4868 4324 a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe 83 PID 4324 wrote to memory of 2336 4324 a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe 93 PID 4324 wrote to memory of 2336 4324 a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe 93 PID 4324 wrote to memory of 2336 4324 a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe"C:\Users\Admin\AppData\Local\Temp\a9a2957312b3bf4f2de90a8a3c931cf6a909b6b3d4ede94f57364643a30306a0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dGM76rT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dGM76rT.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ebc91LO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ebc91LO.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
350KB
MD549695f01d02501ed0f348d8552a6d85f
SHA10facf6bc070df919e29917c28b0c62f571a667b5
SHA25693afdf95025f723ca841c251a9189d52d9b0a04f8ba27e9a99cdac45e280db9e
SHA512aeba12f2d9bb9c2bdb94c21c0e5248f786cb60de5288f86aee48a24615d78e0373a2647c35492dfd5c2fabad9d7222e9045d55552063f4cee9e9ec07ba35ab5f