Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe
Resource
win10v2004-20241007-en
General
-
Target
d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe
-
Size
534KB
-
MD5
8c9e4c87ce4b245f422ec1a83a0d7b7f
-
SHA1
214e42656921b45e73291306ec9f8ed3a81b8b7f
-
SHA256
d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80
-
SHA512
ee734c455d70e359baf6bbc675bed9c622074956d27d1580c340287751ea8c4165085f88f5e50ef9f565fb18bca695237c2bcd81f3ace6793e1194b75338cf3c
-
SSDEEP
12288:TMryy90fARLG83uKUvmc/CfaaA6g7fiVGipIke9q9bRi:JyDL33u+YyaaAP2UQEEbRi
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ccd-12.dat healer behavioral1/memory/2028-15-0x0000000000CF0000-0x0000000000CFA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw09yG18Hl60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw09yG18Hl60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw09yG18Hl60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw09yG18Hl60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw09yG18Hl60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw09yG18Hl60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3648-22-0x00000000023B0000-0x00000000023F6000-memory.dmp family_redline behavioral1/memory/3648-24-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/3648-26-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-38-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-88-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-86-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-84-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-82-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-78-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-76-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-74-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-72-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-70-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-68-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-66-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-62-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-61-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-58-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-56-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-54-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-52-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-50-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-48-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-44-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-42-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-40-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-36-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-34-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-32-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-30-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-28-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-80-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-64-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-46-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/3648-25-0x0000000002750000-0x000000000278E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4540 vZg6586cM.exe 2028 sw09yG18Hl60.exe 3648 tzM85Vh89.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw09yG18Hl60.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vZg6586cM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vZg6586cM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzM85Vh89.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 sw09yG18Hl60.exe 2028 sw09yG18Hl60.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 sw09yG18Hl60.exe Token: SeDebugPrivilege 3648 tzM85Vh89.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4540 5092 d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe 84 PID 5092 wrote to memory of 4540 5092 d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe 84 PID 5092 wrote to memory of 4540 5092 d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe 84 PID 4540 wrote to memory of 2028 4540 vZg6586cM.exe 85 PID 4540 wrote to memory of 2028 4540 vZg6586cM.exe 85 PID 4540 wrote to memory of 3648 4540 vZg6586cM.exe 96 PID 4540 wrote to memory of 3648 4540 vZg6586cM.exe 96 PID 4540 wrote to memory of 3648 4540 vZg6586cM.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe"C:\Users\Admin\AppData\Local\Temp\d7d79bd2262233e232e88b9e79684be0b5010d523425a686d2249de3d455fc80.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZg6586cM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZg6586cM.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw09yG18Hl60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw09yG18Hl60.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzM85Vh89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzM85Vh89.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD57333965fed00bb95232543ad5d344099
SHA1522865f237eb56e50c9953a54d1c0029679090be
SHA256226d703b3a242ee2aeb1f3622c48b6bf051d5a6b7cd85a9075c3df66ad4c174c
SHA512b1a54c96755489d594856a947b5427a02b8489728db8d729a3df74bac899bb9c509cae5562a871ef8d4b3b58238e5f12db7e8ea83062a820795892c9a0c6a7ef
-
Filesize
12KB
MD51dbec2a643194da5110e9f9f2affc653
SHA1e7932bd5ff25c1b85f012cbcc6bdd4f44f7b1e12
SHA2563322d0fa238a458ecbea96b32c9cc1023396d847b9cbf1e79389efd1b9bcc398
SHA5120997c22d914459fbdb156cad19653e59ed6ac5780026eef226839afc82af47b48038fe9c5fbdde5b4c054e094f5fec92f5c3529809507b4e4b3380f10e0a52a0
-
Filesize
305KB
MD5932ce359cdc8eb7b4651a64aed6e493c
SHA110ab63aacb72202c59d42b88ddcc42252a615be5
SHA256049a442cf189e4ad3c32ddbb536332fca534ddb5cd2a4866b3af62be7cc4b2d4
SHA512bd9c106ef6b784cc85fd6e48b37f777f520a7c448263e2c747e651b2cbb742e88cfb2ece3ac97355c9aa0f37cd5b404210b6a35ad478896808468cf5d375d07e