Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe
Resource
win10v2004-20241007-en
General
-
Target
df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe
-
Size
538KB
-
MD5
c86a41d000ab61f48d281894dd5cbeca
-
SHA1
dd5dcd774ed068efb9632c363b062d124b261e39
-
SHA256
df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912
-
SHA512
d4ebf7e6c77c7811b2f77567970e7594a097389bef5efa6d81963aaf2ced8041d1b261eb57f379f2eb1127aa492dfe251c620a21ef5f111d63b45c7972f49151
-
SSDEEP
12288:wMr7y90+Zq+LxVsYTyWmA8JQOaSJjPNzMRaTcj9CPRC:byDJNVsVWmAzOaSxPNIRaTcj+C
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8b-13.dat healer behavioral1/memory/2436-15-0x0000000000790000-0x000000000079A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw78Ax67yE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw78Ax67yE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw78Ax67yE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw78Ax67yE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw78Ax67yE91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw78Ax67yE91.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3188-21-0x0000000002670000-0x00000000026B6000-memory.dmp family_redline behavioral1/memory/3188-23-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/3188-27-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-36-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-87-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-73-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-43-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-33-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-31-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-30-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-25-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/3188-24-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2420 vkxy9496aO.exe 2436 sw78Ax67yE91.exe 3188 tkWV17bN08vM.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw78Ax67yE91.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkxy9496aO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkxy9496aO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkWV17bN08vM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 sw78Ax67yE91.exe 2436 sw78Ax67yE91.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 sw78Ax67yE91.exe Token: SeDebugPrivilege 3188 tkWV17bN08vM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2420 3040 df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe 86 PID 3040 wrote to memory of 2420 3040 df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe 86 PID 3040 wrote to memory of 2420 3040 df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe 86 PID 2420 wrote to memory of 2436 2420 vkxy9496aO.exe 87 PID 2420 wrote to memory of 2436 2420 vkxy9496aO.exe 87 PID 2420 wrote to memory of 3188 2420 vkxy9496aO.exe 94 PID 2420 wrote to memory of 3188 2420 vkxy9496aO.exe 94 PID 2420 wrote to memory of 3188 2420 vkxy9496aO.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe"C:\Users\Admin\AppData\Local\Temp\df2d19ea32df7fbb2bfbc93ba40daa0faeaa25eb1c0d9b7be0b6fc70dffa9912.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkxy9496aO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkxy9496aO.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw78Ax67yE91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw78Ax67yE91.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkWV17bN08vM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkWV17bN08vM.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD513475b9b57e74c60e69f1501f9538bca
SHA10f783d9cd9d60ff4e6fda0d33f1aaead14b9e904
SHA256419a8de5e2b40f99766db3096f30ca1e726db1bb5ea32c7203070061a5446624
SHA512870f118b7111b2ac947af6ac2e0e450eccda60db01e3872aa6e35055b5c44d1ccbf0aed03271debc669420af3f7eefb0a433d6624f95e9757f06246251401f86
-
Filesize
18KB
MD5decd0e98fa528f9e22af48b97bfb1fa6
SHA1991de3674427e4722fb90cc5ac81259481a85a9c
SHA256c4862b77f19e6fd78cd18a1e9d4daa4e979348f0bf200530089b8c25c6bc5b4a
SHA512bcca14de614c23ab8c3b0bd608c98ab029a603cb63d7b2694a22b77908c69efba24006756c1c5a3bc99303ef068a5b54e0397a27021879278c8ff74a574152b4
-
Filesize
308KB
MD5c08ea92c1d03fb367226765e9271415b
SHA1a7446c05eb491cbaeb1d528f96b4d6ba70017c2a
SHA2565687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388
SHA512a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d