Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe
Resource
win10v2004-20241007-en
General
-
Target
34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe
-
Size
536KB
-
MD5
11657d20cb98ff5ff73000a8a64bf6c0
-
SHA1
6975ae735cb259f57a2e60a525cf3174c7824181
-
SHA256
34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95
-
SHA512
5bf3d19cbc2486906663160e2d25afabc42e90c9a6f1fd268cf16d37a43da7c3d8204baf8cd3e7225efb4aa587acb60d42ce29a34208fa50c0c6cf67d59127be
-
SSDEEP
12288:cMrty90ww4sz89s2wnVrLkArzYnLL0RDBTNZ:hyWJz89sXn5LkAr8nL4NZ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7a-12.dat healer behavioral1/memory/3080-15-0x0000000000D10000-0x0000000000D1A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw21Va17sV83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw21Va17sV83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw21Va17sV83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw21Va17sV83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw21Va17sV83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw21Va17sV83.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2300-22-0x00000000026F0000-0x0000000002736000-memory.dmp family_redline behavioral1/memory/2300-24-0x0000000004CE0000-0x0000000004D24000-memory.dmp family_redline behavioral1/memory/2300-44-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-56-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-54-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-52-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-51-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-48-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-46-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-42-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-40-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-38-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-36-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-34-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-32-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-86-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-80-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-76-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-66-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-58-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-30-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-28-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-26-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-25-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-88-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-84-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-82-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-78-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-74-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-73-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-70-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-68-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-64-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-62-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/2300-61-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1112 vKd3960kL.exe 3080 sw21Va17sV83.exe 2300 tEk87BY84.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw21Va17sV83.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vKd3960kL.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vKd3960kL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tEk87BY84.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3080 sw21Va17sV83.exe 3080 sw21Va17sV83.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3080 sw21Va17sV83.exe Token: SeDebugPrivilege 2300 tEk87BY84.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1112 2840 34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe 84 PID 2840 wrote to memory of 1112 2840 34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe 84 PID 2840 wrote to memory of 1112 2840 34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe 84 PID 1112 wrote to memory of 3080 1112 vKd3960kL.exe 85 PID 1112 wrote to memory of 3080 1112 vKd3960kL.exe 85 PID 1112 wrote to memory of 2300 1112 vKd3960kL.exe 93 PID 1112 wrote to memory of 2300 1112 vKd3960kL.exe 93 PID 1112 wrote to memory of 2300 1112 vKd3960kL.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe"C:\Users\Admin\AppData\Local\Temp\34b3a1cd5a0160f012b5359f3df6ca2ae4c8ff8a33c5133516df627230d1dc95.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vKd3960kL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vKd3960kL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw21Va17sV83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw21Va17sV83.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tEk87BY84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tEk87BY84.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD59d247619d7b386844ec451c91f4d74fb
SHA18f29a5cfab7abf1c8235d87d0729b1ffed19f87f
SHA256326dd99fc95425518202797c5bf481ab9166407c49d48017085001e867998fd6
SHA51240d107a3334c4a17d7eff3ef61bcf0f077475d489df41b169722690bada388c0d8e9b6611bb5a2b0d21cdcbbb156721c0b33eba13c9cd98c594cf34df36c0cb1
-
Filesize
17KB
MD56b91f9f0a6ad83b9e409ccadca41cc4e
SHA1af9343e0ccd890f74d8c91f7ed7b804b17933aa5
SHA256edf2e7dc910f2ae4e29d3f849c57e5a3ec8a9e6c9fe25f6bc15b0cdc00ea9959
SHA512a6d78c8d55d5826444c64f2b1084623db58d0ea2dc749e422862c0b338a0400ce70d679dca85bfec0038ed74a1cc90c2918f5ae427de121375c22ce5a71c00bb
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a