Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe
Resource
win10v2004-20241007-en
General
-
Target
2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe
-
Size
536KB
-
MD5
5768d3ed26ff86e6aa2b36fb701bc4c2
-
SHA1
d2393e778bcb4e54b2e23b15bf30a535189579a1
-
SHA256
2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258
-
SHA512
7c0659b001b79e6d68797857e12b68b7908d558a774b857f48c33dfc80dde26d504d17710d234d660407ea413bd03cde3696475c5165ae125d054bb2390c83ff
-
SSDEEP
12288:hMrEy90ByzPxkbr63cEVdLVadIk1twNlDYK4xYcbUOwSzfuGZ3J9h86EXu:9yHP+br63ckdLgdIk07YdycbOGZ3h
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9f-12.dat healer behavioral1/memory/2740-15-0x0000000000870000-0x000000000087A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw17LQ78Gd20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw17LQ78Gd20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw17LQ78Gd20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw17LQ78Gd20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw17LQ78Gd20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw17LQ78Gd20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4616-22-0x0000000002650000-0x0000000002696000-memory.dmp family_redline behavioral1/memory/4616-24-0x0000000002860000-0x00000000028A4000-memory.dmp family_redline behavioral1/memory/4616-32-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-38-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-88-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-86-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-84-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-82-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-80-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-78-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-76-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-72-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-70-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-68-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-66-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-64-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-62-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-60-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-58-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-56-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-52-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-50-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-48-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-46-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-44-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-42-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-40-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-36-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-34-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-30-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-74-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-54-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-28-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-26-0x0000000002860000-0x000000000289E000-memory.dmp family_redline behavioral1/memory/4616-25-0x0000000002860000-0x000000000289E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1856 vmp5506qu.exe 2740 sw17LQ78Gd20.exe 4616 tRu56ke36.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw17LQ78Gd20.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmp5506qu.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmp5506qu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tRu56ke36.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 sw17LQ78Gd20.exe 2740 sw17LQ78Gd20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 sw17LQ78Gd20.exe Token: SeDebugPrivilege 4616 tRu56ke36.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1856 3056 2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe 83 PID 3056 wrote to memory of 1856 3056 2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe 83 PID 3056 wrote to memory of 1856 3056 2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe 83 PID 1856 wrote to memory of 2740 1856 vmp5506qu.exe 85 PID 1856 wrote to memory of 2740 1856 vmp5506qu.exe 85 PID 1856 wrote to memory of 4616 1856 vmp5506qu.exe 92 PID 1856 wrote to memory of 4616 1856 vmp5506qu.exe 92 PID 1856 wrote to memory of 4616 1856 vmp5506qu.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe"C:\Users\Admin\AppData\Local\Temp\2d754e8af9ea6634cc24f657a6b163fb1d7032f1e645401d7fe9fb3b02e75258.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmp5506qu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmp5506qu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw17LQ78Gd20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw17LQ78Gd20.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRu56ke36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRu56ke36.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5e01f4e8655c844aef9bcc7978cd8c1fa
SHA1db72450451dccc716a8bb5f80de2bca3cde0f53c
SHA256216c61d9b2ad7d2e2e7fa065ee2b7cfc9999ae49ef122db295f7f2a1792c5b2b
SHA512b1a186142cd10cf8cd4cd3e1b377787598ce76c7a4549d719ad36f8e1dce6a2d909a904e6fa505a39e084792db903cdeddfea72efca57c2ee59722dfb7b7daea
-
Filesize
16KB
MD561500ca66a9d5697046eea02edf8cc01
SHA10b30d1c3dc116cf3bc1a80bd700d5724b95bde50
SHA256cc075c7d5217400fae972387611e7aaba76a09fa28eb8eb82facb59291c476bf
SHA5129b0e1ed9b1a4e82af2223854ad61ec0b41563567f3058cb01e7d7766fd9541498239bcdb2b981723b95962fd8bc09be3bcecf7a5ec824adf6b1643b811d1191e
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23