Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe
Resource
win10v2004-20241007-en
General
-
Target
d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe
-
Size
533KB
-
MD5
b1bdd5fcd884450e606741f30926567e
-
SHA1
6522d48725ebf461a9af68acdf9191049380ad0e
-
SHA256
d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9
-
SHA512
cf405499339c2a73a64e5f7340350083a1a3c90d0ed51d2b0a0079a29cf96e2536c99f3ca1425fedbf4775fd97e97f21e7de2146f01ee98a245d2d2fbe706c33
-
SSDEEP
12288:BMrBy90ZP7dPA5Cai6XGSNESRwvcpBfiVqL9laW1z9G:IyoPZPWC8hZscp8OHG
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b65-12.dat healer behavioral1/memory/3460-15-0x00000000004A0000-0x00000000004AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw82Pi55LV37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw82Pi55LV37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw82Pi55LV37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw82Pi55LV37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw82Pi55LV37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw82Pi55LV37.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5012-22-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/5012-24-0x0000000004CF0000-0x0000000004D34000-memory.dmp family_redline behavioral1/memory/5012-88-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-86-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-84-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-83-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-80-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-78-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-76-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-74-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-72-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-70-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-66-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-65-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-62-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-60-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-58-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-56-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-54-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-52-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-48-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-44-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-42-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-40-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-38-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-36-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-32-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-30-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-29-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-68-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-50-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-46-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-34-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-26-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline behavioral1/memory/5012-25-0x0000000004CF0000-0x0000000004D2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3668 vWc3999Vd.exe 3460 sw82Pi55LV37.exe 5012 tgq73Vu61.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw82Pi55LV37.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vWc3999Vd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vWc3999Vd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgq73Vu61.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3460 sw82Pi55LV37.exe 3460 sw82Pi55LV37.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3460 sw82Pi55LV37.exe Token: SeDebugPrivilege 5012 tgq73Vu61.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3668 4788 d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe 84 PID 4788 wrote to memory of 3668 4788 d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe 84 PID 4788 wrote to memory of 3668 4788 d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe 84 PID 3668 wrote to memory of 3460 3668 vWc3999Vd.exe 85 PID 3668 wrote to memory of 3460 3668 vWc3999Vd.exe 85 PID 3668 wrote to memory of 5012 3668 vWc3999Vd.exe 90 PID 3668 wrote to memory of 5012 3668 vWc3999Vd.exe 90 PID 3668 wrote to memory of 5012 3668 vWc3999Vd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe"C:\Users\Admin\AppData\Local\Temp\d6f3e199122fe0adf7e22e6de8017f72d435c9f3254df63807de454a4369b8b9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vWc3999Vd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vWc3999Vd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82Pi55LV37.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82Pi55LV37.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tgq73Vu61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tgq73Vu61.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD53555908bbf8b2194a90d5a46aa8b6a64
SHA13923418df041f5abbaad1989104966dff1333db8
SHA2561faaaeedc2c460e1a7b00e3cbba6a21fd8e0819141760201e41aac2c9d1933fa
SHA51264d6cd2124c9c248b567cdc3510f2521dc50c2dcc19ae0fd1eec32e7822c6a3c01351505713eda20044bb1c6fb056a9867397805314a90bfef090c295129e60b
-
Filesize
12KB
MD527754cfee83f58407b0f9370231925df
SHA139fef764c432230ae410b34499c87a35183bd13d
SHA256a04d5f834d98e1fc85d778bee473c067c2d832b9958a183f429a331580582838
SHA512fd8a4c5f0a9343bc0e296f230a47d83f3d7758c253fef271fd15021ca66cd05d02dd6ac286aecc8d3a470ab02c81464b451db35b96b0553072a307b992a04a39
-
Filesize
305KB
MD5932ce359cdc8eb7b4651a64aed6e493c
SHA110ab63aacb72202c59d42b88ddcc42252a615be5
SHA256049a442cf189e4ad3c32ddbb536332fca534ddb5cd2a4866b3af62be7cc4b2d4
SHA512bd9c106ef6b784cc85fd6e48b37f777f520a7c448263e2c747e651b2cbb742e88cfb2ece3ac97355c9aa0f37cd5b404210b6a35ad478896808468cf5d375d07e