Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe
Resource
win10v2004-20241007-en
General
-
Target
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe
-
Size
526KB
-
MD5
22c4f615f759c62c5d554a00f83c1df7
-
SHA1
00d83d37bdb747fb1ed226bf73ff562a32271fd2
-
SHA256
eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7
-
SHA512
988001ecb975a6b7d631754d65f2f2df8fb22c9628b85e058367f4d53ce21e2fe978cf1a5f5365cd5f9c402813664f4610366b314b9f6604665d2894bf9328eb
-
SSDEEP
12288:gMrBy90095knw1RZQubAI+JMaalfrmITyNL:xy1UwxB+JMwNL
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c04-13.dat healer behavioral1/memory/4432-15-0x0000000000530000-0x000000000053A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf16vt64eG17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf16vt64eG17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf16vt64eG17.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf16vt64eG17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf16vt64eG17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf16vt64eG17.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3104-22-0x00000000027A0000-0x00000000027E6000-memory.dmp family_redline behavioral1/memory/3104-24-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/3104-30-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-34-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-88-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-86-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-85-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-82-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-80-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-79-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-76-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-74-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-73-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-70-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-68-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-67-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-64-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-62-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-61-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-58-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-56-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-54-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-52-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-51-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-48-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-46-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-45-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-42-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-40-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-39-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-36-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-32-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-28-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-26-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3104-25-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4396 vhdP5422ax.exe 4432 sf16vt64eG17.exe 3104 tf36qU55ea36.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf16vt64eG17.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhdP5422ax.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhdP5422ax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf36qU55ea36.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4432 sf16vt64eG17.exe 4432 sf16vt64eG17.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4432 sf16vt64eG17.exe Token: SeDebugPrivilege 3104 tf36qU55ea36.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4396 3468 eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe 84 PID 3468 wrote to memory of 4396 3468 eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe 84 PID 3468 wrote to memory of 4396 3468 eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe 84 PID 4396 wrote to memory of 4432 4396 vhdP5422ax.exe 85 PID 4396 wrote to memory of 4432 4396 vhdP5422ax.exe 85 PID 4396 wrote to memory of 3104 4396 vhdP5422ax.exe 94 PID 4396 wrote to memory of 3104 4396 vhdP5422ax.exe 94 PID 4396 wrote to memory of 3104 4396 vhdP5422ax.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe"C:\Users\Admin\AppData\Local\Temp\eae12126345f769e285066a48a7cfdcb382f1ab57e61c319def43263ba118ee7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhdP5422ax.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhdP5422ax.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf16vt64eG17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf16vt64eG17.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf36qU55ea36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf36qU55ea36.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5e16cdda26a71b7571f6708f127489ae7
SHA12eac9db69a76cd875d922ff7dd3f3913cf34a20c
SHA256e207a86ccfc1974af0ce966d9ce6b3b441e1d761e069ce29b9f4b0521f2b156b
SHA5126ce670b4629ff3e1f42b850573f9a9c6b0dbb299fbfa2e8dda4c07b5449a7639153e69cbf8c49eb17504b92c69e1b61b9ec7d2dcd065c14ecccf686ede2637e7
-
Filesize
11KB
MD5b487eeeffe34eea6add09947288fb97f
SHA123d37d71ddd6075e39da6dcea9f1cec477513b24
SHA256c0bfabb7c57081dacc2510aea7bd473f4e05c6d539f24506fd5e773b47cc0ead
SHA5122b526efca3e277336be987620d399c0cafc5cdd787a82b131e0faf5c37daf44622feb4f079611ccd8ef38c78020971d47204da4fe1cab868cf66ee74b3919f4e
-
Filesize
292KB
MD533eef0ef7d3d426c664f6e3380b0a87c
SHA166eea27c3262719cb51de3a08a47b13da67f33b7
SHA2564dec2b62f8f47bed9dad690b372fe7ab707a251657470a0cc9b85cf603ce441e
SHA512cc0b998114447a96d23f8cbd4ede81b5f103f204cd5a887fbe892b67ce836226bcc0d15ec60f9a754d166e57c5d9fd10c6e2b1851416654f504860ffd93cd6c5