Analysis
-
max time kernel
148s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe
Resource
win10v2004-20241007-en
General
-
Target
9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe
-
Size
1.1MB
-
MD5
d9b3578cb8831a40d68e391b0eb7169e
-
SHA1
7fd8d8c17c747c0c59e34be8c6a2c49a6d233372
-
SHA256
9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16
-
SHA512
7ff544e9cfca0c723c6488bd9be105c29a09fdab1b4d4c11965d5e8fcb5763690cf63b3156a14531bc956b548a5b20b58e8da9a27a812d619937f5f3037d27ef
-
SSDEEP
24576:fyLTyul17HVMuHvAERcxXCCG8/Lj7XyW709ALQtjPsg:qLTyuHABz/LjeoGALQdU
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba0-34.dat healer behavioral1/memory/4132-35-0x0000000000330000-0x000000000033A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" busO06sd21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" busO06sd21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection busO06sd21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" busO06sd21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" busO06sd21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" busO06sd21.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1572-41-0x0000000002660000-0x00000000026A6000-memory.dmp family_redline behavioral1/memory/1572-43-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/1572-45-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-53-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-107-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-105-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-103-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-101-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-99-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-95-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-93-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-91-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-89-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-87-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-85-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-83-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-81-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-79-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-77-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-75-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-73-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-71-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-67-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-65-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-63-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-61-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-59-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-57-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-55-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-51-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-49-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-47-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-97-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-69-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/1572-44-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 2456 plln69ze58.exe 2192 plzO01Ag92.exe 1604 plEw08dB76.exe 2888 plYc63Sf65.exe 4132 busO06sd21.exe 1572 caRm23ku87.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" busO06sd21.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plln69ze58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plzO01Ag92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plEw08dB76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plYc63Sf65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caRm23ku87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plln69ze58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plzO01Ag92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plEw08dB76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYc63Sf65.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4132 busO06sd21.exe 4132 busO06sd21.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4132 busO06sd21.exe Token: SeDebugPrivilege 1572 caRm23ku87.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 760 wrote to memory of 2456 760 9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe 84 PID 760 wrote to memory of 2456 760 9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe 84 PID 760 wrote to memory of 2456 760 9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe 84 PID 2456 wrote to memory of 2192 2456 plln69ze58.exe 85 PID 2456 wrote to memory of 2192 2456 plln69ze58.exe 85 PID 2456 wrote to memory of 2192 2456 plln69ze58.exe 85 PID 2192 wrote to memory of 1604 2192 plzO01Ag92.exe 86 PID 2192 wrote to memory of 1604 2192 plzO01Ag92.exe 86 PID 2192 wrote to memory of 1604 2192 plzO01Ag92.exe 86 PID 1604 wrote to memory of 2888 1604 plEw08dB76.exe 87 PID 1604 wrote to memory of 2888 1604 plEw08dB76.exe 87 PID 1604 wrote to memory of 2888 1604 plEw08dB76.exe 87 PID 2888 wrote to memory of 4132 2888 plYc63Sf65.exe 88 PID 2888 wrote to memory of 4132 2888 plYc63Sf65.exe 88 PID 2888 wrote to memory of 1572 2888 plYc63Sf65.exe 100 PID 2888 wrote to memory of 1572 2888 plYc63Sf65.exe 100 PID 2888 wrote to memory of 1572 2888 plYc63Sf65.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe"C:\Users\Admin\AppData\Local\Temp\9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plln69ze58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plln69ze58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzO01Ag92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzO01Ag92.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plEw08dB76.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plEw08dB76.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYc63Sf65.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYc63Sf65.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\busO06sd21.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\busO06sd21.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRm23ku87.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRm23ku87.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
985KB
MD5a579441d45ff529ec9bfc87d4e803d3b
SHA162efb95ec72fe11cdb7e089b92bf813116e28956
SHA256e9a405338d30f7dc136838284edf7aa2e0ee78d6985a42d85b31c5e993bf9571
SHA512b684ef14253c74eb1cf566233b799c94f0e5b0d60757faaf3a7e12ef56dd0dc91e76097a0b4712e9b9479b2f0fe7745bf0d38f5a946d6450b15660d31f6e7187
-
Filesize
885KB
MD5339c53d89e52dafcefe6ec1c4d9ae713
SHA1514748f7c6b19b26cda435c385375f5a0fb2bda4
SHA256b692d0901626e7583f15e2ca7b17a607cd248e02adbe1df63acad1e3e7e57572
SHA512abefad21a4a7de93b6c7c0cf8fd5aeb125b6c0cc5462c5d5dcd6fd3ba88c5abe146921eb79fe6e8a9802b7e971c73db63a14594706da82358cdc0411361613a7
-
Filesize
661KB
MD562071b1fb070202e195b7a7e88b471c4
SHA1a9b35508baab3470c57daf4dc8f41f769a4b8c68
SHA256a87a3a9d55939e77689974bb2b8d72a4f567b44d9ea648b07c2dc1d2580c4eb2
SHA51207cbb34049d6118426618129f2fc850584588ab58fa01abec86447086539ddd072abecbc72c8f72a72563d435d0afdc6888c142b0cd87695fe94ec9d42784380
-
Filesize
389KB
MD58b1be3036b7f84c566d2ba4adac54405
SHA18a9d54e0011cb711252cdd0e80ae7052453d819b
SHA25613d30d981410d737b89144ff7cb9ffcc9d3e3f8e6261641330c7a6b09af5f663
SHA51275d50e765f18ac4b427c56fc82f9f1435823976415e0af6d3f9db41aa9da311690d6b62ba10f413100f122d62b6f1c8af2f29ccf3b6fd1f7189e8fdada45e302
-
Filesize
11KB
MD52bc53be68540feae2531f8d8646412f3
SHA1f47017b31762c12d905383fd42404657e78bc0dc
SHA2567bb32a032817d13005d548d23f7c14258074926d17c614935cd9a65e1e80e12c
SHA5126b26f0272433f688ad6bc1103437a561ea750056df916644cc222f6d78572596a6c8d379228d83c809af7c723c8afa525a3adbc44f00213f849daa38bf58372a
-
Filesize
306KB
MD59792900c815b23017f946773359ebe08
SHA115629567cf9023b6a9a7a4b69a805e8314a6bb2d
SHA256edbe4131b7bd5f130c9650d2585d97337834a62073e58fcce4d3b6d2f95d3907
SHA512cf27fc151b7d74daebdad990da0e26bea2337d2b2b90b2d5586343c077e9540e3f1a0a94099b603ffe4eaf6263e864e009795ec4ff900063237d6b44b0ec7465