Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe
Resource
win10v2004-20241007-en
General
-
Target
493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe
-
Size
681KB
-
MD5
2f308bf390af28ed2b6662502058d1e2
-
SHA1
de1bc67e7f32cfa421abd7524f4ebf5e81df93b2
-
SHA256
493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535
-
SHA512
30ba7c0cd6865059588011485e194edfc7ca07f0b41aefe985c62f717c8dcc7618eb50049a5b210095b3d30dd5617479c03fc2f060ea4db5003fb8a419735040
-
SSDEEP
12288:sMrSy90teupiM/zXfoc9wq2I3nEgP4E3ynD8EUZD7QODHVRrW:myAe5MbXgcWyBP1ZEID7QSfW
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ce4-13.dat healer behavioral1/memory/3320-15-0x0000000000680000-0x000000000068A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buUJ94MY88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buUJ94MY88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buUJ94MY88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buUJ94MY88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buUJ94MY88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buUJ94MY88.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2620-22-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/2620-24-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/2620-38-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-86-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-84-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-82-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-78-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-76-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-74-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-72-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-68-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-66-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-64-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-62-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-60-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-58-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-56-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-52-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-50-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-48-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-46-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-44-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-42-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-40-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-36-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-34-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-88-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-32-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-80-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-30-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-70-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-28-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-54-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-26-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline behavioral1/memory/2620-25-0x0000000004C00000-0x0000000004C3E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1256 pljJ04mF60.exe 3320 buUJ94MY88.exe 2620 cahf55XI63.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buUJ94MY88.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pljJ04mF60.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pljJ04mF60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cahf55XI63.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3320 buUJ94MY88.exe 3320 buUJ94MY88.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3320 buUJ94MY88.exe Token: SeDebugPrivilege 2620 cahf55XI63.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1256 4212 493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe 85 PID 4212 wrote to memory of 1256 4212 493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe 85 PID 4212 wrote to memory of 1256 4212 493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe 85 PID 1256 wrote to memory of 3320 1256 pljJ04mF60.exe 88 PID 1256 wrote to memory of 3320 1256 pljJ04mF60.exe 88 PID 1256 wrote to memory of 2620 1256 pljJ04mF60.exe 95 PID 1256 wrote to memory of 2620 1256 pljJ04mF60.exe 95 PID 1256 wrote to memory of 2620 1256 pljJ04mF60.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe"C:\Users\Admin\AppData\Local\Temp\493a79bb4f628ba88f24cbe8525041d4b1c30af5d7c30a1d09696b48be69f535.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pljJ04mF60.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pljJ04mF60.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buUJ94MY88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buUJ94MY88.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cahf55XI63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cahf55XI63.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD587244a37a676c01e0a2958d73a793bcb
SHA1847568bf3eea5bcbd85f6c1cfd602a17288af018
SHA256d09ee75ffc43cf4f09800f5908cbb0f66632076de6227778dda592ef4381120a
SHA512a8ee046a93300fd853f6a335d0f0f64a68a3fc543b43a5df275457050556e2288d415cb764005114d5c7c88296efcde4cc6740f47cdaaa8741dca304aff4898b
-
Filesize
13KB
MD5faa8c750a0754306ebba1de6a09713d4
SHA1651b60e1738cdb8a7e673db124a11937a2861119
SHA256ec581e5d4065bbe617ead07b47dc40a771ccafa3995dde739bb58f1e4739df9a
SHA51282d57b3858d2a90708fcf45a329d05e86e38141381742b758608e0536d7b382fa35540744b451efad008de78a51eb1e52ad09605a856618ddef70dd7adb6da67
-
Filesize
311KB
MD5df8b658ff430e07a3083de9d55e38d9f
SHA1a1c69254ba895096f75660ca5c9c09f46486e65f
SHA256885045b17ae6220ea794be50c2290b1c771323b5ff3680879e7d2bd8d1576a74
SHA512ce534ec18d6e3f3f30a21c0749818ae89895281164262fe118610f4609d98d78f3164659cc8114d2d4767eff56cb446a118b72488982989c0e722fff8bcdae8a