Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe
Resource
win10v2004-20241007-en
General
-
Target
a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe
-
Size
536KB
-
MD5
32db9714208484304d041bb56585a833
-
SHA1
0d61a2b839b9db93d930fae0329bafa6c263355a
-
SHA256
a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530
-
SHA512
d093d37b79a557fb1b6b907186b9e5c9d6d0356b4c1b97cc49811e6cd56b48b7a1a2efb9710726ef6830bb83a73bd69026c9d9d27067781e84a8fb0837e58b56
-
SSDEEP
12288:6Mray906A+I1vV2iFIZtqlFrjLGWYDALzr2iACdEHsofDU:8yZWhVnITAaDDATNAcEDU
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023caa-12.dat healer behavioral1/memory/3464-15-0x0000000000EB0000-0x0000000000EBA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw53LE41lb54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw53LE41lb54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw53LE41lb54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw53LE41lb54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw53LE41lb54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw53LE41lb54.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4216-22-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/4216-24-0x0000000005150000-0x0000000005194000-memory.dmp family_redline behavioral1/memory/4216-26-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-28-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-88-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-86-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-84-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-80-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-78-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-76-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-74-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-72-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-70-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-66-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-64-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-62-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-60-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-58-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-54-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-52-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-50-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-48-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-47-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-44-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-40-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-38-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-36-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-34-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-32-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-30-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-82-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-68-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-56-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-42-0x0000000005150000-0x000000000518E000-memory.dmp family_redline behavioral1/memory/4216-25-0x0000000005150000-0x000000000518E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1204 vVA1243nB.exe 3464 sw53LE41lb54.exe 4216 taQ10fK27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw53LE41lb54.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vVA1243nB.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vVA1243nB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taQ10fK27.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3464 sw53LE41lb54.exe 3464 sw53LE41lb54.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3464 sw53LE41lb54.exe Token: SeDebugPrivilege 4216 taQ10fK27.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1204 2392 a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe 84 PID 2392 wrote to memory of 1204 2392 a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe 84 PID 2392 wrote to memory of 1204 2392 a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe 84 PID 1204 wrote to memory of 3464 1204 vVA1243nB.exe 85 PID 1204 wrote to memory of 3464 1204 vVA1243nB.exe 85 PID 1204 wrote to memory of 4216 1204 vVA1243nB.exe 93 PID 1204 wrote to memory of 4216 1204 vVA1243nB.exe 93 PID 1204 wrote to memory of 4216 1204 vVA1243nB.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe"C:\Users\Admin\AppData\Local\Temp\a592b3c6c9fc22bc0923e16b8a66a7971bb883674665c8a2ddc16e3c9ef52530.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVA1243nB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vVA1243nB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw53LE41lb54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw53LE41lb54.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\taQ10fK27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\taQ10fK27.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5e4ed2f0ca51e29fcefa8bf7ddcba5dc1
SHA16fdd9f23362d99bc07bc36eb47478fc78ca0a4e0
SHA2565cc8de6f31e587132810bd23be14aded83742b4111f8fcd17e5dc5b81df96f4f
SHA5123393559c7fefeb0eff9ba650ea64c294910db18c8deda8b92d1f024ac949f80bd40506c3fb8cf86ff5e80b758534cc56eeaf4b3ecaa4c05d12f990f0885369b5
-
Filesize
17KB
MD5f21ca2578f292953a12108dc54b39cf2
SHA1910a14a2f1c832cc0c4992767ac86e55ff42f704
SHA25604c3ac2875bff1b51c300e6ab2466d3a6e92ac6d79c9a8c0ab923803559336c7
SHA512d9cea972fa60618d17ba54384202cca45b4b450cccbfe3c9f8e41c4620061a14fb8f44a44267d345f5d3fc38fda55a0312602a26aeaf2f431798ba54ef37d7b2
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a