Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe
Resource
win10v2004-20241007-en
General
-
Target
d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe
-
Size
1.1MB
-
MD5
fb0be7bbceffc6cb2e204d978c498d51
-
SHA1
5da586be6b192515196e3086974942ffd7681cd7
-
SHA256
d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab
-
SHA512
429c0bf0f51351f72505ff543025d9c907519f59f3dc0bcdfcb8aab3cb5bdffeadc4ad0a8f0ed61108a2efb5e8420d39ac838ba0f14232d184cc8961b909f16a
-
SSDEEP
24576:tyO1ijsNZusOPzP4hTAJ8eEwIL3Svg3SXgtU2sMM/+WqmFpwWQ:IO1HcPzP4Bq8ex43CXgt/P79mF
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6e-33.dat healer behavioral1/memory/556-35-0x0000000000480000-0x000000000048A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buDn00jJ37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buDn00jJ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buDn00jJ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buDn00jJ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buDn00jJ37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buDn00jJ37.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/64-41-0x0000000004AD0000-0x0000000004B16000-memory.dmp family_redline behavioral1/memory/64-43-0x0000000005180000-0x00000000051C4000-memory.dmp family_redline behavioral1/memory/64-59-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-69-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-75-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-106-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-103-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-99-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-97-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-95-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-93-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-89-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-87-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-85-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-83-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-81-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-79-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-77-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-73-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-108-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-101-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-91-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-67-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-65-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-63-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-61-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-57-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-53-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-51-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-49-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-47-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-71-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-55-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-45-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline behavioral1/memory/64-44-0x0000000005180000-0x00000000051BE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 628 pltH59DX97.exe 3180 plLR40SP39.exe 1240 plpc47dq13.exe 1664 plhX48Nc35.exe 556 buDn00jJ37.exe 64 caUI64Sv25.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buDn00jJ37.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pltH59DX97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plLR40SP39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plpc47dq13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plhX48Nc35.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pltH59DX97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plLR40SP39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plpc47dq13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plhX48Nc35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caUI64Sv25.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 556 buDn00jJ37.exe 556 buDn00jJ37.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 556 buDn00jJ37.exe Token: SeDebugPrivilege 64 caUI64Sv25.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1964 wrote to memory of 628 1964 d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe 87 PID 1964 wrote to memory of 628 1964 d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe 87 PID 1964 wrote to memory of 628 1964 d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe 87 PID 628 wrote to memory of 3180 628 pltH59DX97.exe 88 PID 628 wrote to memory of 3180 628 pltH59DX97.exe 88 PID 628 wrote to memory of 3180 628 pltH59DX97.exe 88 PID 3180 wrote to memory of 1240 3180 plLR40SP39.exe 89 PID 3180 wrote to memory of 1240 3180 plLR40SP39.exe 89 PID 3180 wrote to memory of 1240 3180 plLR40SP39.exe 89 PID 1240 wrote to memory of 1664 1240 plpc47dq13.exe 90 PID 1240 wrote to memory of 1664 1240 plpc47dq13.exe 90 PID 1240 wrote to memory of 1664 1240 plpc47dq13.exe 90 PID 1664 wrote to memory of 556 1664 plhX48Nc35.exe 91 PID 1664 wrote to memory of 556 1664 plhX48Nc35.exe 91 PID 1664 wrote to memory of 64 1664 plhX48Nc35.exe 100 PID 1664 wrote to memory of 64 1664 plhX48Nc35.exe 100 PID 1664 wrote to memory of 64 1664 plhX48Nc35.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe"C:\Users\Admin\AppData\Local\Temp\d325d42b8f135a5f897bf01699656869bdc4df9b8d7ab9834d2c7394af5f0dab.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pltH59DX97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pltH59DX97.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLR40SP39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plLR40SP39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plpc47dq13.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plpc47dq13.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plhX48Nc35.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plhX48Nc35.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buDn00jJ37.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buDn00jJ37.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caUI64Sv25.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caUI64Sv25.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD55909dd9134c336654e846e2a803a055e
SHA184722cd8431e828b898f819b6a1a981da1a11715
SHA2566079eaa13e2fece5c18d9962782b1b69e9231aa7fdf4c35a31e54df5130eb938
SHA5123361873e2e8913c45509ce1f2eb50328673070805828bffff3ea522d25f8dfdce9c39a5376a47be4577acd912b121ab29ad06470c2717df92817071b1b964324
-
Filesize
893KB
MD50c61a9fe1b9526fb625f14d1d379bbac
SHA169a11ef87b0d50fc590f38684f0dce5a6547b364
SHA256e8f93df08e78fc275fa7acad41abbdd15e80d4dd853a2b6bb5fa0f5bda701d53
SHA512e12906704f65bc7b433957285aa4865b67d311be5d49c7958fff12d6bcf12376003a83029cb4a60a03611d0560a9d1ca24bc90d41f25f34cc78dd7ab7037360f
-
Filesize
666KB
MD5fda5f63a9419c235070046503806e71f
SHA156c9b274e12805a2f52afd904115d1a5cd6af77d
SHA256a6d8b44cc563f218fdbdfb393380458e51b5f4c8713f46065d28cf76c064d1e2
SHA512b5ab86d54629657faa668b082c98999a5cfd7ca87eaf2ee6a13573a6da155a5815a2b0498397633575c3f9cda4f866f8313450ca4e1e1b95eb4c1c6af40a55d2
-
Filesize
391KB
MD59f7579fcac42cd16c1af12bf111ad323
SHA1263077c9e3a1ff705e796f356618345592dc9580
SHA2569a33bd6b7f176ddf5d7faae08fbd0a22e03ed045e339fc2bc21e01ffa9427de8
SHA51251c6d48af67db60513e37322d591bf25091bb6fc9cd62c0840188d1834dc51084c1814319727129a7fccc2eecf557743fad14fc7869ac3841e5b44bad7d24055
-
Filesize
11KB
MD52f4b25a3407645a2c28267f108682c85
SHA1936f435ee996078e4c1519302fec1b129937eb5b
SHA256d6e90dbaf9403286bcef5ddd231152df01330d24075da3c17a1ce45cb30d922c
SHA512f8397703336c7f92865d3aa71fea3530946e80919d66241436630bb48136465aa04474caabcfb72f6a9ccb2e5c75e1a0262852613471b06e60a507d821e215d6
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a