Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe
Resource
win10v2004-20240226-en
General
-
Target
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe
-
Size
666KB
-
MD5
784f68b99ad3a7a73f3b691ffa4d2b62
-
SHA1
94bca74ae43c1b36328740749cf363fdffaa6997
-
SHA256
f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1
-
SHA512
4e29de01ab83ddd9dc674f3d8ec211a4ad4c3334a73362a956e91d2a800ce160755f2bf1c6147a534510d7905efb12c825bfb5df681adf4eea3efd185f3883a3
-
SSDEEP
12288:4Mrgy90+rFnb7XWnPS+LV5it2YZzBoP/uqDznJYw3muv+:4ylnXsPS+LV5iAY8uEn7Y
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000800000002320a-12.dat healer behavioral1/memory/224-14-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buBs31UH87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buBs31UH87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buBs31UH87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buBs31UH87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buBs31UH87.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buBs31UH87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3188-25-0x0000000004B00000-0x0000000004B46000-memory.dmp family_redline behavioral1/memory/3188-30-0x0000000005190000-0x00000000051D4000-memory.dmp family_redline behavioral1/memory/3188-31-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-32-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-34-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-36-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-38-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-40-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-42-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-44-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-46-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-48-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-50-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-52-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-54-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-56-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-58-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-60-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-62-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-64-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-66-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-68-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-70-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-72-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-74-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-76-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-78-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-80-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-82-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-84-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-86-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-88-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-90-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-92-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline behavioral1/memory/3188-94-0x0000000005190000-0x00000000051CE000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x000800000002320a-12.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/224-14-0x0000000000AD0000-0x0000000000ADA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Executes dropped EXE 3 IoCs
pid Process 2964 plOd36ML43.exe 224 buBs31UH87.exe 3188 caSp57wA26.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buBs31UH87.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plOd36ML43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 buBs31UH87.exe 224 buBs31UH87.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 224 buBs31UH87.exe Token: SeDebugPrivilege 3188 caSp57wA26.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4244 wrote to memory of 2964 4244 f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe 87 PID 4244 wrote to memory of 2964 4244 f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe 87 PID 4244 wrote to memory of 2964 4244 f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe 87 PID 2964 wrote to memory of 224 2964 plOd36ML43.exe 88 PID 2964 wrote to memory of 224 2964 plOd36ML43.exe 88 PID 2964 wrote to memory of 3188 2964 plOd36ML43.exe 94 PID 2964 wrote to memory of 3188 2964 plOd36ML43.exe 94 PID 2964 wrote to memory of 3188 2964 plOd36ML43.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe"C:\Users\Admin\AppData\Local\Temp\f55a602235535dc194813aa6c0174677bc16b1e825f27956a156da465088cce1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOd36ML43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOd36ML43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buBs31UH87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buBs31UH87.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\caSp57wA26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\caSp57wA26.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD57cee11e64f45911fef5567a62b720fd2
SHA192ca84a9e6cdf12293fda4e3991ea1e9c61627c7
SHA2567748e48583b71cd471ff964a38ab4c4d7463142fb5cca488f8aa82c0fafc1862
SHA5127bc4cdc0a88afbc3a28fb20a97516c23410b18ef31a4da4f3fa2652d09e615c94904b2a7e091e97e00c1c761c8892cc25eabcdbbed693352cd5a26c2595a31dd
-
Filesize
11KB
MD5ea130a0e7d62ffd43a0f29dd0141af9a
SHA1e150260a7a9e43f11cb7434c28541b65a36b8f44
SHA256e77ef407d5340d0e23e807b940ebb632a47877ac2aecac4fba8da704d782a858
SHA51275c34d73cbe8e2c882d81da61c1259857bd201c5e716b17c6c89a300bb9b0b240c383857d06bb676cb55a9f6188e249551818d0627289600c4750e488d573b9a
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729