Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe
Resource
win10v2004-20241007-en
General
-
Target
33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe
-
Size
543KB
-
MD5
b090b51b387c6c72e94aee626cb05faf
-
SHA1
a44a68c921a038f8eb5d8eeefb0f3d2555478e67
-
SHA256
33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c
-
SHA512
d8997608b5513d697fc03cbc1df6d984fe393e7d17ceb05606a54605a92e0cf38be7c464aaac9700b11d2d48178c98679e32aa48aafed7617f58db08137f85d9
-
SSDEEP
12288:UMrLy907a8x1oM5zkaAOUmfc3WKmIlsn/hTCZZhAunrorHFNT:HyCzeMNRjcGq+5ToZyusrlNT
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6a-12.dat healer behavioral1/memory/4724-15-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw60cb78MP98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw60cb78MP98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw60cb78MP98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw60cb78MP98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw60cb78MP98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw60cb78MP98.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3876-22-0x0000000004B60000-0x0000000004BA6000-memory.dmp family_redline behavioral1/memory/3876-24-0x0000000004C40000-0x0000000004C84000-memory.dmp family_redline behavioral1/memory/3876-56-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-54-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-86-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-84-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-82-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-80-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-78-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-76-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-72-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-70-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-68-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-66-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-64-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-62-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-60-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-58-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-52-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-50-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-48-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-46-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-44-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-42-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-40-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-36-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-34-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-32-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-30-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-28-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-88-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-74-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-38-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-26-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral1/memory/3876-25-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4180 vNY3947ua.exe 4724 sw60cb78MP98.exe 3876 tta99yu51.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw60cb78MP98.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vNY3947ua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vNY3947ua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tta99yu51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 sw60cb78MP98.exe 4724 sw60cb78MP98.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4724 sw60cb78MP98.exe Token: SeDebugPrivilege 3876 tta99yu51.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4180 1812 33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe 84 PID 1812 wrote to memory of 4180 1812 33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe 84 PID 1812 wrote to memory of 4180 1812 33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe 84 PID 4180 wrote to memory of 4724 4180 vNY3947ua.exe 85 PID 4180 wrote to memory of 4724 4180 vNY3947ua.exe 85 PID 4180 wrote to memory of 3876 4180 vNY3947ua.exe 93 PID 4180 wrote to memory of 3876 4180 vNY3947ua.exe 93 PID 4180 wrote to memory of 3876 4180 vNY3947ua.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe"C:\Users\Admin\AppData\Local\Temp\33dbfe2b8d29e7e62cb31922657d4a4e75bda8b17e3e58b7938153f4eb26917c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNY3947ua.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNY3947ua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw60cb78MP98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw60cb78MP98.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tta99yu51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tta99yu51.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5cebb8afadf3e517aaeafe9ac9d7c3f51
SHA1a817e97351efda68aae06ccea9b6025d836f6e49
SHA256740718dd3d07920f4eba683a3f377f8b472da8672d6da9d3f1015de5098c8b6d
SHA5122cce61fc02d3ff6de48ca9dcbbaba8230f043a3b3d6294fb605de284c1432aaeef436c67fbcadb1a2adf633663a368684642f153df820efcdc2a54b78f0e1691
-
Filesize
14KB
MD50b9fa43d7630cd2edca248212b2f4b9c
SHA1a283450d6f6d4be6bdbec804b571320fa3e9b2a1
SHA256b2983c4f2374c33559c413c886224c319f0e91d0a00072a5c0e4a87eb03a602f
SHA5127c35c816a6ded11f083583ecfb0fa8c9f061f7c46cfa7a7b81edfbd7aeab3158fdf85fc818648771fb39c51f2556787871fb4c1f0af4f7f305d422339dde9226
-
Filesize
374KB
MD5af0954d0538c7f7ddb0d9d2d166552ce
SHA15d51a5d821f180b6c46a5e02bcf7676f989c18ff
SHA256f9fb43735222b6ddc9c2866812045fbc8613527c988bf1d5167d3ab6818f29fb
SHA512184bfb555b83faf995af6f3e825334e526efba409d9dd0de4cb55af4a0a7336542895a9248832be332c6b892a9a7ea8240a009e613939a8a8037c9e9b5b12fec