Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe
Resource
win10v2004-20240226-en
General
-
Target
0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe
-
Size
892KB
-
MD5
cef429558df1ed7d9eeba231f786c9ca
-
SHA1
507689b64ea314a4124ca7d2b2f03696d1ad424c
-
SHA256
0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca
-
SHA512
bce0bff3f159844c8d9cc0f736e554db21ee3b9e79c2d0f982b116797952f5eddf062a6311c1c335684f752cf644b33c41faed2cd74fc47d38865f9a7714ceb3
-
SSDEEP
24576:OyqHyhl84FXEvcXTAJfQGQZmHAgn5sQycdt:dqHyDOKsWRmHAgn/7d
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231fb-19.dat healer behavioral1/memory/4012-21-0x0000000000F90000-0x0000000000F9A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buOF05nB53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buOF05nB53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/912-34-0x0000000002350000-0x0000000002396000-memory.dmp family_redline behavioral1/memory/912-38-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/912-54-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-60-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-64-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-70-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-84-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-96-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-102-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-100-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-98-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-94-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-92-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-90-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-88-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-86-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-80-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-78-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-68-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-62-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-58-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-52-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-50-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-46-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-40-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/912-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231fb-19.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4012-21-0x0000000000F90000-0x0000000000F9A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Executes dropped EXE 4 IoCs
pid Process 1272 plZA31LB38.exe 2648 plsp92Cu08.exe 4012 buOF05nB53.exe 912 cato69Uw10.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buOF05nB53.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plZA31LB38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plsp92Cu08.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4012 buOF05nB53.exe 4012 buOF05nB53.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4012 buOF05nB53.exe Token: SeDebugPrivilege 912 cato69Uw10.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1272 4392 0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe 87 PID 4392 wrote to memory of 1272 4392 0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe 87 PID 4392 wrote to memory of 1272 4392 0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe 87 PID 1272 wrote to memory of 2648 1272 plZA31LB38.exe 88 PID 1272 wrote to memory of 2648 1272 plZA31LB38.exe 88 PID 1272 wrote to memory of 2648 1272 plZA31LB38.exe 88 PID 2648 wrote to memory of 4012 2648 plsp92Cu08.exe 90 PID 2648 wrote to memory of 4012 2648 plsp92Cu08.exe 90 PID 2648 wrote to memory of 912 2648 plsp92Cu08.exe 96 PID 2648 wrote to memory of 912 2648 plsp92Cu08.exe 96 PID 2648 wrote to memory of 912 2648 plsp92Cu08.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe"C:\Users\Admin\AppData\Local\Temp\0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plZA31LB38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plZA31LB38.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plsp92Cu08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plsp92Cu08.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buOF05nB53.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buOF05nB53.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cato69Uw10.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cato69Uw10.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
666KB
MD586d80efcf39ac0644815a6a7793b4e07
SHA1abf36fbcb4de003a0c4acb063a3752ebfd849298
SHA256794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0
SHA512b223b880c06f5ea76c80833d83d57b57b71e4c78b77c8641162fd5c12805bcc406ce7ab5929bb216de7da9813d63f422050912d91eae32afce1702a17502ee8b
-
Filesize
391KB
MD5b4944bc275ae14c46b017da4121ca43b
SHA1f791c3ac27e502e2aa6b4c6b0abbd116ac96c6f3
SHA25662a2b9cf24ec16917202c5938495357bdc6b4861a77520225388ee25370d1ce8
SHA512b82bc47d7fa503ba545b74796695edb7db82535c181b19b33242cb67fb87e79bedb79da6b64cbb43978290879e9923b7f010ccf78e4027847166c0d1cdddc5f0
-
Filesize
11KB
MD53b416a1b882466bd99311dbab98fb42d
SHA1286eaf9931732e12f2ba571d44e4bb20e20d0022
SHA2569810f5b05ccbee3d0d4dc6368bbafdb3fd80eb506f5f443969dd98747febe29d
SHA5125903569d34bced97c27426313c309f243d5eb145bf496eccd2ee598a61154da0057b4753a6a1de1fa9a8f76bb51b6a7c53937d91456abda15cce93ac9554baad
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729