Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe
Resource
win10v2004-20241007-en
General
-
Target
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe
-
Size
537KB
-
MD5
65ad989417f264c50831408584a8d039
-
SHA1
b0ef8efdaa5d3290b52c277c93daa9200d136f51
-
SHA256
fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e
-
SHA512
e547e09f0b95ea95fedeedf118e7c9dc70400a466ad7385f3976e422c04cb25914791100b2615532732e9d5286a2fc631c83bf740af8512ac50ab5867829eb1b
-
SSDEEP
12288:gMrcy90epcPD0yI3QiDv2zL1FiP7NC7VzOL/G14uMH2TDrVYuv2:Myl85muzL1FiDNCC/3uMH2T12
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c86-12.dat healer behavioral1/memory/2708-15-0x0000000000DA0000-0x0000000000DAA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw00iV07jZ72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw00iV07jZ72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw00iV07jZ72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw00iV07jZ72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw00iV07jZ72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw00iV07jZ72.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3856-22-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/3856-24-0x0000000005170000-0x00000000051B4000-memory.dmp family_redline behavioral1/memory/3856-32-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-42-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-86-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-84-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-83-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-80-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-79-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-76-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-74-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-72-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-70-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-68-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-66-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-64-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-62-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-60-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-58-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-56-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-54-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-52-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-48-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-46-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-44-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-40-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-38-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-36-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-34-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-88-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-26-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-50-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-30-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-28-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/3856-25-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4172 vNb8904DC.exe 2708 sw00iV07jZ72.exe 3856 tkw03KT63.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw00iV07jZ72.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vNb8904DC.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkw03KT63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vNb8904DC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 sw00iV07jZ72.exe 2708 sw00iV07jZ72.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2708 sw00iV07jZ72.exe Token: SeDebugPrivilege 3856 tkw03KT63.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4172 1544 fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe 84 PID 1544 wrote to memory of 4172 1544 fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe 84 PID 1544 wrote to memory of 4172 1544 fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe 84 PID 4172 wrote to memory of 2708 4172 vNb8904DC.exe 85 PID 4172 wrote to memory of 2708 4172 vNb8904DC.exe 85 PID 4172 wrote to memory of 3856 4172 vNb8904DC.exe 97 PID 4172 wrote to memory of 3856 4172 vNb8904DC.exe 97 PID 4172 wrote to memory of 3856 4172 vNb8904DC.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe"C:\Users\Admin\AppData\Local\Temp\fd4358a6c77feb9b700f6c76ec2104ec8f28b734036f224e41a8ab82d4fb4c9e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNb8904DC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vNb8904DC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw00iV07jZ72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw00iV07jZ72.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkw03KT63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkw03KT63.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5989ebc7d1122903d2a427c56c114876a
SHA1c3b1896edd90c2773b33b832af0a51964b46af4b
SHA25601aeb88693f1c1ada8e86f297603c53f16a3923a7a848a58b0fd9aea25478c0a
SHA5127c55799328436b4fda615c6c4cb3c04087c8b6468acae8761ca789ad567734a093cb1eafe14b8bd98f6372169a75ed0c76626a4b325872e4fb9db6814a1f3e8a
-
Filesize
12KB
MD55e0255ee1934ec098435383eafd7ae99
SHA116b5029656901ae89ca67c3decb627b9275f4b8e
SHA2566386c4a6036847c1b0d1069653fb524b5708394301df4a27857ef44a156b856c
SHA512d45d0de42c61b39dff1b38833d1d4fd6939c6407d74c0a1fdee1a8960b3c6b505de20a852254ba19590c1434021db4b21f46ccbe44b1c35dbbdc9d436e338305
-
Filesize
304KB
MD5e8a74f8947be8861da483f9a1b725bea
SHA1c9485cc022bb2ee5eb15bc98e1aa5330b1b5c09a
SHA256b27c4b8cc67abed8e257f5b43a656dbfafea50833d2aae5b7fe545ac82d74727
SHA5124ac48c039d81d9b6f5dd9cd4700855bc27efec45bb167fbf0268ec56c238138865a9d9b9575b2e71f2ab204f29da0daff1e78f5ac12cb54d0383766b7c82e2e8