Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe
Resource
win10v2004-20241007-en
General
-
Target
4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe
-
Size
538KB
-
MD5
cf563b8b2dc800d709581b157a8a0208
-
SHA1
8d90c01554a68b3f3b0359191cfd0e678eed579e
-
SHA256
4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2
-
SHA512
99cc4540f4d5c8e0199dcf1812d6ed3f8a5f21fd5c6b6158bc151664729aefed950eccdf6fef853b2de357fdfd82c9f4ee7ac1b614d1beef1098491b3dd9e31a
-
SSDEEP
12288:GMrgy90a1ymGuqcojbYXx4wMNFrygK+E/FPMvhM:OybexQXewMNFGgKlFJ
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8f-12.dat healer behavioral1/memory/828-15-0x0000000000E00000-0x0000000000E0A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw90ke37lP47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw90ke37lP47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw90ke37lP47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw90ke37lP47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw90ke37lP47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw90ke37lP47.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4000-22-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/4000-24-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/4000-40-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-46-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-88-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-84-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-82-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-80-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-78-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-76-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-74-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-72-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-66-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-64-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-62-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-60-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-58-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-56-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-52-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-48-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-44-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-42-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-38-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-36-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-34-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-32-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-30-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-86-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-70-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-69-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-54-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-50-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-28-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-26-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/4000-25-0x0000000002610000-0x000000000264E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 668 vkTM0365Lj.exe 828 sw90ke37lP47.exe 4000 tkgx47on63Cy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw90ke37lP47.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkTM0365Lj.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkTM0365Lj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkgx47on63Cy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 sw90ke37lP47.exe 828 sw90ke37lP47.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 828 sw90ke37lP47.exe Token: SeDebugPrivilege 4000 tkgx47on63Cy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1396 wrote to memory of 668 1396 4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe 86 PID 1396 wrote to memory of 668 1396 4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe 86 PID 1396 wrote to memory of 668 1396 4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe 86 PID 668 wrote to memory of 828 668 vkTM0365Lj.exe 87 PID 668 wrote to memory of 828 668 vkTM0365Lj.exe 87 PID 668 wrote to memory of 4000 668 vkTM0365Lj.exe 99 PID 668 wrote to memory of 4000 668 vkTM0365Lj.exe 99 PID 668 wrote to memory of 4000 668 vkTM0365Lj.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe"C:\Users\Admin\AppData\Local\Temp\4f57fa45a4eec7ed70fd9855d0ae00061f5fd3a610fcf5a6db7b2cfcb2289bb2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkTM0365Lj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkTM0365Lj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw90ke37lP47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw90ke37lP47.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkgx47on63Cy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkgx47on63Cy.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5a88c56832e0e65d9ab721febf0041f27
SHA1b8a40c78b55def1977bccfe66524136e40b7867d
SHA2567399b34518806ee94aaa65b69191495dabfae56ff36c59f94a84e1bb3b415ed0
SHA51210664263fc3fa6714875ab225ac290f20a1f442db86d4d92423382c21c431b1b4bd3df25f10270a29ab10d50e651ecae901e21e11aba541aaff1a7e6f92e3e60
-
Filesize
18KB
MD5ba34dd50359511f3db959704545e36da
SHA15888f8353ebb4b3716b4e01e0d0193164e35f21a
SHA256f343fbe82030907188280097ad0f235d803f5dd35a4bbaa3e9297a9b2818b67a
SHA512024ceeace1d1249c558df19b2edfc632dd4e1974865a84c1760e7f94df100d1b44ce348fe1e43a23787610212cfeb27a92dba6344c306fab555b2108714ca8c9
-
Filesize
309KB
MD5ad05fcfd3e5c54f2f09e0d5d11cadde8
SHA13309af9f3ba27dce1acfe21f1b5e0c025d9da266
SHA25628668b0252c666afd029f66fd8165adfe4957ab4196f535e1bd58dd1ad4e71b2
SHA5121c4128526b291a35eebc27947227e02f9abc094dd0d4a4f3d07534476eb54d60cf8324861c4afa479050b5fc41b2a13067f87f6160fcb54605bb459b7e5c8e58