Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
Resource
win10v2004-20241007-en
General
-
Target
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
-
Size
560KB
-
MD5
a721237fc59826593b16e05a77c9936c
-
SHA1
498bcc6de832789d8bd6cbd941a7e62164e6c041
-
SHA256
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
SHA512
72cfb4d3bd17f84fd875f0729f5efa2cac1f32c0d39c86f404e4dc7103e2770bd93187a8c3c3bbcc75b688c4d7e10b43798a10e1097c9cb0bb8f691174c5c977
-
SSDEEP
12288:jMrGy90kTg90DFAtleqvYmb+eB853zqtd8MeLbWgnC0:FyHkeDStlzvYqsJi8MUbxC0
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb4-12.dat healer behavioral1/memory/4740-15-0x0000000000620000-0x000000000062A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf37Et27Wx29.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1408-22-0x0000000004DF0000-0x0000000004E36000-memory.dmp family_redline behavioral1/memory/1408-24-0x0000000004FA0000-0x0000000004FE4000-memory.dmp family_redline behavioral1/memory/1408-28-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-46-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-58-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-74-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-88-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-86-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-84-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-82-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-80-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-78-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-76-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-72-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-70-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-68-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-66-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-64-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-62-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-60-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-57-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-54-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-52-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-50-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-48-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-44-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-42-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-41-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-38-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-36-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-35-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-32-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-30-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-26-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline behavioral1/memory/1408-25-0x0000000004FA0000-0x0000000004FDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 184 vhtD5163dm.exe 4740 sf37Et27Wx29.exe 1408 tf72kw99bn23.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf37Et27Wx29.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhtD5163dm.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhtD5163dm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf72kw99bn23.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4740 sf37Et27Wx29.exe 4740 sf37Et27Wx29.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4740 sf37Et27Wx29.exe Token: SeDebugPrivilege 1408 tf72kw99bn23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3580 wrote to memory of 184 3580 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 85 PID 3580 wrote to memory of 184 3580 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 85 PID 3580 wrote to memory of 184 3580 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 85 PID 184 wrote to memory of 4740 184 vhtD5163dm.exe 87 PID 184 wrote to memory of 4740 184 vhtD5163dm.exe 87 PID 184 wrote to memory of 1408 184 vhtD5163dm.exe 93 PID 184 wrote to memory of 1408 184 vhtD5163dm.exe 93 PID 184 wrote to memory of 1408 184 vhtD5163dm.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe"C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD53807fccbf75d9af066b5806228a8e22a
SHA17150b1585a9c800f6ff5b7dbee6af4196996a719
SHA2564c8aa517f37d1687b59afc2e7fe24ecd40e02e2a6655841868192f203961bfc2
SHA51254f09c6a795596a65c2b966e37bb81c1b50b50ecad69efe85136a99d6c3e7e5a5f35f2d765f8d6711bc4fb5aa017fb715621d699d79200695ca1fe1c4dd16eef
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
416KB
MD5197d8f3be31e2a0e255e510348dccf49
SHA1c55404597c3904b99ebb6eac727feeef78fda213
SHA256e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c
SHA512efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2