Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe
Resource
win10v2004-20241007-en
General
-
Target
5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe
-
Size
403KB
-
MD5
04d944c0b299f4a533e0076627897518
-
SHA1
0f4efe8f0765786b4c3356bb8cda94ead5402fae
-
SHA256
5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c
-
SHA512
e6c2157aa5cae436abe41bc1d55668da186b346b05b2e786eaaae1367aae225e6d9835103cc04db7c63145cfc9aa82a3418e8a86568436a06383add5880a0d17
-
SSDEEP
6144:KGy+bnr+Vp0yN90QE/ywCRfm5sogX4RZr7woCdC9wvNWBzfBTavC57hmqVqT:uMr1y90UJRfmRgX4RZ3MCDcCpXA
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-5.dat healer behavioral1/memory/3968-8-0x0000000000160000-0x000000000016A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buks36BZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buks36BZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buks36BZ05.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buks36BZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buks36BZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buks36BZ05.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1628-18-0x0000000004BF0000-0x0000000004C36000-memory.dmp family_redline behavioral1/memory/1628-20-0x00000000071F0000-0x0000000007234000-memory.dmp family_redline behavioral1/memory/1628-84-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-74-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-58-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-40-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-21-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-82-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-80-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-79-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-76-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-72-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-70-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-68-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-66-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-64-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-62-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-60-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-56-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-54-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-52-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-50-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-48-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-46-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-45-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-42-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-38-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-36-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-34-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-32-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-30-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-28-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-26-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-24-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline behavioral1/memory/1628-22-0x00000000071F0000-0x000000000722E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3968 buks36BZ05.exe 1628 caIu64HK52.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buks36BZ05.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caIu64HK52.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3968 buks36BZ05.exe 3968 buks36BZ05.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3968 buks36BZ05.exe Token: SeDebugPrivilege 1628 caIu64HK52.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3560 wrote to memory of 3968 3560 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe 84 PID 3560 wrote to memory of 3968 3560 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe 84 PID 3560 wrote to memory of 1628 3560 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe 96 PID 3560 wrote to memory of 1628 3560 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe 96 PID 3560 wrote to memory of 1628 3560 5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe"C:\Users\Admin\AppData\Local\Temp\5f1a6822c4e74f628b558d60336f24653fafc637ab2eafc93ccd6990d04a251c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\buks36BZ05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\buks36BZ05.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caIu64HK52.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caIu64HK52.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD55ba43b2a87acdb746c148852285b3838
SHA196be5bd1e230f52a2f8b594f7283c446a6c904c8
SHA2564db821f2d5ed47d43631960fc9b664018e0ed15e057f8ab379b2c71a432c7ca9
SHA512fe9bf9d86540d2e5a8b8e830d9b7319fe76db71e66d80b46d21dca605a554f1e4046df94ace4a455786341bf9a18a133f9130fe8fee77ebf446aecfa7ae3d7d0
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b