Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe
Resource
win10v2004-20240226-en
General
-
Target
d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe
-
Size
666KB
-
MD5
1deac687b6874a859a92c617d67ad5b7
-
SHA1
a7774936595b5993c1487c2383e844e9a0263c3d
-
SHA256
d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1
-
SHA512
d283ba11dc4052b61cfe329d51d5712ff6c6717751560245ef4159f8929cb41d8673e22337600d6119ff4ef5510aa133bcf5c47bbc768c22742f5ab2d081756d
-
SSDEEP
12288:6MrSy90suTShb8NOE2pLqd/oBht5Yque2QuSqDVbuLvszBCyBR:IyiTShb8NOpwoBhPYnziCbu8CyBR
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231ff-12.dat healer behavioral1/memory/4416-14-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bunm10bX23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bunm10bX23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bunm10bX23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bunm10bX23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bunm10bX23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bunm10bX23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5064-25-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/5064-31-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/5064-32-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-33-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-35-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-37-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-39-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-41-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-43-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-45-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-47-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-49-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-51-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-53-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-55-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-57-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-59-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-61-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-63-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-65-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-67-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-69-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-71-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-73-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-75-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-77-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-79-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-81-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-83-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-85-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-87-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-89-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-91-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-93-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/5064-95-0x0000000002610000-0x000000000264E000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231ff-12.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4416-14-0x0000000000AD0000-0x0000000000ADA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Executes dropped EXE 3 IoCs
pid Process 1604 plnP35rX27.exe 4416 bunm10bX23.exe 5064 cada92qb54.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bunm10bX23.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plnP35rX27.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4416 bunm10bX23.exe 4416 bunm10bX23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4416 bunm10bX23.exe Token: SeDebugPrivilege 5064 cada92qb54.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3412 wrote to memory of 1604 3412 d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe 88 PID 3412 wrote to memory of 1604 3412 d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe 88 PID 3412 wrote to memory of 1604 3412 d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe 88 PID 1604 wrote to memory of 4416 1604 plnP35rX27.exe 90 PID 1604 wrote to memory of 4416 1604 plnP35rX27.exe 90 PID 1604 wrote to memory of 5064 1604 plnP35rX27.exe 94 PID 1604 wrote to memory of 5064 1604 plnP35rX27.exe 94 PID 1604 wrote to memory of 5064 1604 plnP35rX27.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe"C:\Users\Admin\AppData\Local\Temp\d9e189693f51b8451e208914996fdff88faa733a2e23e5d53235153d745dcfe1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnP35rX27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnP35rX27.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bunm10bX23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bunm10bX23.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cada92qb54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cada92qb54.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD51ffdf2d6bd53b27c4081eb2ef266bea0
SHA1e3e766d89f05b468d2564755ee3506d185111dc1
SHA256145ed14eec0d30180652d65ee791602dccef14e8b6e88b50e5dfca8b60aa873a
SHA5128cdedc28f72383df6ceda05de4d0257f342718067daf83e5e9d15604b36f262d8f04653532a58ed015ff6f3cc10841100021792f137e38980f08a980f103567d
-
Filesize
11KB
MD5f76d83503cb250e7a5afeebdd89ff9a2
SHA10ace56269b9834ba4caaaa11e2e720eefd47f250
SHA25697712250d663bd2b4e2f93437c9d70e8e593c2192f663f9d086da9fa21387ab1
SHA512f251d38feb1f74742c56fa213ec8fea6fbbe7f3bdafee9d2ad691a8a9ca5cafb7ea09a6e57012d6c0193e68e91b24fc68c1c0f45fe570b5b2840b43270843f43
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729