Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe
Resource
win10v2004-20241007-en
General
-
Target
23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe
-
Size
551KB
-
MD5
13ec6abcb562db2af342f3966d916c48
-
SHA1
82cad6698b87966f062a623ad126d6673860e4c3
-
SHA256
23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563
-
SHA512
b585a9544481c40578f79f519dad50ef71e0c53e65c9e1b324b1b6279b0c3bc674eb008afbf40f3fe5b93a2bb44bfaa3ef9a3d2094e3a5134f28a132b86f8c4c
-
SSDEEP
12288:1Mrgy90/styzWpr8w9yV+b9F5m2j4nHUQ5Fw/NpVke:NyIUSWprfyyOHG/Npae
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023baa-12.dat healer behavioral1/memory/1504-15-0x0000000000450000-0x000000000045A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kRZ74xy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kRZ74xy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection kRZ74xy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kRZ74xy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kRZ74xy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kRZ74xy.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4820-22-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/4820-24-0x0000000004C10000-0x0000000004C54000-memory.dmp family_redline behavioral1/memory/4820-42-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-40-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-88-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-86-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-84-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-82-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-80-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-78-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-76-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-74-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-72-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-68-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-66-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-64-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-62-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-60-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-58-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-54-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-52-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-50-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-48-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-46-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-44-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-38-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-36-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-34-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-32-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-30-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-70-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-56-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-28-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-26-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/4820-25-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4756 duA2518.exe 1504 kRZ74xy.exe 4820 nTk86li.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kRZ74xy.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" duA2518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language duA2518.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nTk86li.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 kRZ74xy.exe 1504 kRZ74xy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1504 kRZ74xy.exe Token: SeDebugPrivilege 4820 nTk86li.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4756 1956 23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe 83 PID 1956 wrote to memory of 4756 1956 23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe 83 PID 1956 wrote to memory of 4756 1956 23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe 83 PID 4756 wrote to memory of 1504 4756 duA2518.exe 84 PID 4756 wrote to memory of 1504 4756 duA2518.exe 84 PID 4756 wrote to memory of 4820 4756 duA2518.exe 92 PID 4756 wrote to memory of 4820 4756 duA2518.exe 92 PID 4756 wrote to memory of 4820 4756 duA2518.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe"C:\Users\Admin\AppData\Local\Temp\23876a8ec8457d313b01a91fca93d29a6044f7a2b8bad05e0567c3926da2e563.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\duA2518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\duA2518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kRZ74xy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kRZ74xy.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nTk86li.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nTk86li.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD57f4ecdfc2b66aa8f810e239bad4fe071
SHA130377a4a0e3375482f5f66193c8b7aed5fdaafc5
SHA25646003e4a0c11e387489e1b1ad09d92287eff0074a7d951477f9c2549b06974c6
SHA51247ef1ad7c89111db585e38613b4c2ac13f67b2213ba10105f00434f437e4a869d8735bd83c4622457ecdd7b393e1980a10bebe7055d4d05a6a416f65ae29ee61
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
330KB
MD5d2eb227a23cdaca4951867e11d0d818f
SHA119074af4a97df8cf80b62dd33f8816de4ecfc9f7
SHA25620b49145ce7ae4b6e7f4ff9600a38300914b1ace56b7ff97c4b143a0f477f9b8
SHA512ea9076967cd8e9bec076dbade127043bb9f752e3ec5c02c72dbee599c35b6b879515deff3327ed735f3ae15cd10357254841c180ca52c0d8c091e3ddb2acbbeb