Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe
Resource
win10v2004-20241007-en
General
-
Target
3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe
-
Size
1.0MB
-
MD5
b7e85c3713a5883df1bc19721fed12ac
-
SHA1
ba7d253a87b4693eda2ed84f8a51dac4d1958e8d
-
SHA256
3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f
-
SHA512
607d446acc3a0df873b2b102845e767020a62f9247c2dbe1a97307d972b6e5e0022eb3c49da06f458803799c035e86ca689d967dd1636a176b1b3b8426a863a1
-
SSDEEP
24576:QysdH13l3o7+oafOmlLFQ60tcjGPQKgn3Nt:XOHhl3w+HfOm5FQRqjEQKgnv
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-25.dat healer behavioral1/memory/4348-28-0x0000000000EC0000-0x0000000000ECA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buuX06du23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buuX06du23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buuX06du23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buuX06du23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buuX06du23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buuX06du23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1948-34-0x0000000004B90000-0x0000000004BD6000-memory.dmp family_redline behavioral1/memory/1948-36-0x0000000004C10000-0x0000000004C54000-memory.dmp family_redline behavioral1/memory/1948-40-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-38-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-37-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-100-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-98-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-96-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-94-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-93-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-90-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-88-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-84-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-82-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-80-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-78-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-77-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-74-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-72-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-70-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-68-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-66-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-64-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-63-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-60-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-58-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-56-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-54-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-52-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-50-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-48-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-46-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-44-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-42-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1948-86-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2480 plur57ss42.exe 632 plqe10jg14.exe 1292 plwA09RD26.exe 4348 buuX06du23.exe 1948 caSV45an44.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buuX06du23.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plur57ss42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plqe10jg14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plwA09RD26.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plur57ss42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plqe10jg14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plwA09RD26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caSV45an44.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4348 buuX06du23.exe 4348 buuX06du23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4348 buuX06du23.exe Token: SeDebugPrivilege 1948 caSV45an44.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3696 wrote to memory of 2480 3696 3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe 83 PID 3696 wrote to memory of 2480 3696 3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe 83 PID 3696 wrote to memory of 2480 3696 3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe 83 PID 2480 wrote to memory of 632 2480 plur57ss42.exe 84 PID 2480 wrote to memory of 632 2480 plur57ss42.exe 84 PID 2480 wrote to memory of 632 2480 plur57ss42.exe 84 PID 632 wrote to memory of 1292 632 plqe10jg14.exe 85 PID 632 wrote to memory of 1292 632 plqe10jg14.exe 85 PID 632 wrote to memory of 1292 632 plqe10jg14.exe 85 PID 1292 wrote to memory of 4348 1292 plwA09RD26.exe 87 PID 1292 wrote to memory of 4348 1292 plwA09RD26.exe 87 PID 1292 wrote to memory of 1948 1292 plwA09RD26.exe 98 PID 1292 wrote to memory of 1948 1292 plwA09RD26.exe 98 PID 1292 wrote to memory of 1948 1292 plwA09RD26.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe"C:\Users\Admin\AppData\Local\Temp\3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plur57ss42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plur57ss42.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqe10jg14.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqe10jg14.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plwA09RD26.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plwA09RD26.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buuX06du23.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buuX06du23.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caSV45an44.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caSV45an44.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD59285a12d435f7af743efe3ceac080d50
SHA19eb37db5d585005964969ceebc3a21c14ef3e890
SHA25686992bd0e10cd7c487f5e39ebeda29f95a231d8bb44c3eb7fb9c4a3f0ebacdb9
SHA5125bb156d55c2c77bca17d3ddac73e109577bbec25fc9cf69395e48c1f8ff335b7f6e3edda1b6716146c57c970fec6cab7bb82f87bd72757a551d4a1c73e9f1ee3
-
Filesize
680KB
MD5f7c5118a77412c2909265548ecb08c98
SHA173888704a385a2c17bc634408d69badb62405c4c
SHA2560fb9d38623d89a5f71b302f2f4cf45e58604d40c01b3080ca4ffabf4e943458c
SHA51242495051eadc16e51b188522ee27585c955187583b9c65e47031f0f23dc012d5a554efa3457bc3c59fc8548a66988f19d785d14a8ffe310149fbc8ada49eac13
-
Filesize
398KB
MD5356f8b9374355890579f25bee0d4f5e9
SHA1566acedca8e2ee1130bb7b5776411a982fdc45b0
SHA256ba758e277ed2d4237dbbca8f9492b1c8e83e0a0026a45052c71ad88ed1c24964
SHA512493aea5dcb1912510ce53699db0afd35ce4f426966f70f407d53267a352123095bdafefeeaa972c351420dc83be3dd16db3d4837c007a230f69057938162b950
-
Filesize
13KB
MD56b09b9afdf8c1877285b9c87ba86f11a
SHA151b401b1c95b5b36fe37a69f83761c6fa8587843
SHA256068df4bdcf73d160ecd1ae5e7049225cd075f4866dc70ea6548f0def0ab70715
SHA5126c6f41811dbcbd1c723397d14e3a271605c43a1370f38173fcf2e5f2271b54362da7f124990d28506a4770a06ef06df527d9e4c98e0dadb6a1d025546619f3e5
-
Filesize
311KB
MD5df8b658ff430e07a3083de9d55e38d9f
SHA1a1c69254ba895096f75660ca5c9c09f46486e65f
SHA256885045b17ae6220ea794be50c2290b1c771323b5ff3680879e7d2bd8d1576a74
SHA512ce534ec18d6e3f3f30a21c0749818ae89895281164262fe118610f4609d98d78f3164659cc8114d2d4767eff56cb446a118b72488982989c0e722fff8bcdae8a