Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe
Resource
win10v2004-20241007-en
General
-
Target
2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe
-
Size
557KB
-
MD5
c8835c4a2497224e7d9848ae510ae8d5
-
SHA1
4fb4aacbb6f252c3437ccd82f1721469b1ac51a4
-
SHA256
2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69
-
SHA512
bd3d8f9646d96ed491fb7c5bae09269edbce6b97372d0488128c87ab5f2ebc60549c8a607b6e72c2d99934467e88f4a253b6e76175b3ba85194a191c38434d50
-
SSDEEP
12288:TMr/y90pjxQ5HxZtgTT6ZidV7efzXNGCG2bU+k:gyijKfZtPgB8xGCG4UT
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c97-12.dat healer behavioral1/memory/2268-15-0x00000000009B0000-0x00000000009BA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf88JR09ul00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf88JR09ul00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf88JR09ul00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf88JR09ul00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf88JR09ul00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf88JR09ul00.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4068-22-0x0000000004BD0000-0x0000000004C16000-memory.dmp family_redline behavioral1/memory/4068-24-0x0000000004D90000-0x0000000004DD4000-memory.dmp family_redline behavioral1/memory/4068-32-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-40-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-88-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-86-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-84-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-82-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-80-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-78-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-76-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-74-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-72-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-70-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-68-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-66-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-65-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-62-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-60-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-58-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-56-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-54-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-50-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-48-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-46-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-44-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-38-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-36-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-34-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-52-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-42-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-30-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-28-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-26-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline behavioral1/memory/4068-25-0x0000000004D90000-0x0000000004DCE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4768 vhpc6117lk.exe 2268 sf88JR09ul00.exe 4068 tf27Fx16ZL04.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf88JR09ul00.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhpc6117lk.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1328 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhpc6117lk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf27Fx16ZL04.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2268 sf88JR09ul00.exe 2268 sf88JR09ul00.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2268 sf88JR09ul00.exe Token: SeDebugPrivilege 4068 tf27Fx16ZL04.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4768 1852 2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe 84 PID 1852 wrote to memory of 4768 1852 2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe 84 PID 1852 wrote to memory of 4768 1852 2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe 84 PID 4768 wrote to memory of 2268 4768 vhpc6117lk.exe 85 PID 4768 wrote to memory of 2268 4768 vhpc6117lk.exe 85 PID 4768 wrote to memory of 4068 4768 vhpc6117lk.exe 94 PID 4768 wrote to memory of 4068 4768 vhpc6117lk.exe 94 PID 4768 wrote to memory of 4068 4768 vhpc6117lk.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe"C:\Users\Admin\AppData\Local\Temp\2d3e5b1431c4294cc88ed404c6f24d18e3f94b701b055d16960d34c4b8af4e69.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpc6117lk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhpc6117lk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf88JR09ul00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf88JR09ul00.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf27Fx16ZL04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf27Fx16ZL04.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1328
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5728c062f02c64d19ccf2a638411075a6
SHA133274b186099aec8a0c707c51d8b46479fe11f82
SHA2566cecda33e953fbf9abe20bc496a4aecc380cc9d0df5950244cade4efc4ae805a
SHA512fe36b82d6dfe1318d6434b2baaba8d336b85e9fdab365ca115d5e94b2f42b4d88f32c62f708cd4dbfda553f72d5a4c4a1f4bb0c5a93893a56e53ddc0c63f8cfc
-
Filesize
11KB
MD5b44d70ab939a2790f166c7cd08173377
SHA13b11a0eed4017c001c959836b1047788059cb9d1
SHA25625a1a8a8d1d22eb04e2bb32c7812fdf2ef04930dbd0c62c70a0921aa63977fed
SHA512bdb8cbec4246e47bc97c8925798aae2cf76ee5442ea3e0377ce29119b86b265438c2091cb0cb87e8c6cc9b0defad1c55fcf92798b0cf12d502f4ae7b63051fdc
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187