Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe
Resource
win10v2004-20241007-en
General
-
Target
72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe
-
Size
996KB
-
MD5
90110a431b034143c46c80cd3b83b570
-
SHA1
aa71b66b3b36e111079bbaf6b105e4e3de295491
-
SHA256
72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0ac
-
SHA512
a472b94290c27c2de8ccb5ba74cd179e72138fe05a67f2119c7e8a26099d4fd54af05e884dcf1822074af6bc136ed0eb8cba1623dd906c037da41601f3e03285
-
SSDEEP
24576:kyRruA6OLb0a2Dmf37O45sqHMTpiMxaTWOnm:zRr46b0as47O+sYMTpx46
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b80-25.dat healer behavioral1/memory/2200-28-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buLK88HH11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buLK88HH11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buLK88HH11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buLK88HH11.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buLK88HH11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buLK88HH11.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4520-34-0x0000000002690000-0x00000000026D6000-memory.dmp family_redline behavioral1/memory/4520-36-0x0000000005170000-0x00000000051B4000-memory.dmp family_redline behavioral1/memory/4520-44-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-56-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-100-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-98-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-96-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-94-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-92-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-88-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-86-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-84-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-82-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-80-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-78-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-76-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-74-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-72-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-70-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-68-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-64-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-62-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-60-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-58-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-54-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-52-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-50-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-48-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-46-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-42-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-40-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-90-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-66-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-38-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4520-37-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 1372 plYV03yT63.exe 3912 plzZ83FL88.exe 3068 plrL02Ym81.exe 2200 buLK88HH11.exe 4520 caKU67BH98.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buLK88HH11.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plYV03yT63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plzZ83FL88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plrL02Ym81.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYV03yT63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plzZ83FL88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plrL02Ym81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caKU67BH98.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 buLK88HH11.exe 2200 buLK88HH11.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 buLK88HH11.exe Token: SeDebugPrivilege 4520 caKU67BH98.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1372 4272 72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe 83 PID 4272 wrote to memory of 1372 4272 72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe 83 PID 4272 wrote to memory of 1372 4272 72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe 83 PID 1372 wrote to memory of 3912 1372 plYV03yT63.exe 84 PID 1372 wrote to memory of 3912 1372 plYV03yT63.exe 84 PID 1372 wrote to memory of 3912 1372 plYV03yT63.exe 84 PID 3912 wrote to memory of 3068 3912 plzZ83FL88.exe 85 PID 3912 wrote to memory of 3068 3912 plzZ83FL88.exe 85 PID 3912 wrote to memory of 3068 3912 plzZ83FL88.exe 85 PID 3068 wrote to memory of 2200 3068 plrL02Ym81.exe 86 PID 3068 wrote to memory of 2200 3068 plrL02Ym81.exe 86 PID 3068 wrote to memory of 4520 3068 plrL02Ym81.exe 100 PID 3068 wrote to memory of 4520 3068 plrL02Ym81.exe 100 PID 3068 wrote to memory of 4520 3068 plrL02Ym81.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe"C:\Users\Admin\AppData\Local\Temp\72b4feb93226dc0cafbbf170001fa1772706489cbf75b57412436d03cd6fc0acN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plYV03yT63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plYV03yT63.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzZ83FL88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzZ83FL88.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plrL02Ym81.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plrL02Ym81.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buLK88HH11.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buLK88HH11.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caKU67BH98.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caKU67BH98.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD54914b4212a45ad96d53221ff428f5007
SHA1406744180cf00b4553550a421d1a6c4300eb5d64
SHA256485dc1ce8fdb4be71dc2773a39c3e85eb61961b767dca21adcf2f0689b144e2b
SHA512d337d6869cb167ae908e65db6f0518a23d21b1c6f8b3c2b241928991e2f9d79ef41cb92119645485d468492b734264757d67f58912d78ba26c28f8b5e2b5942a
-
Filesize
666KB
MD588a81c2233db97020dc2ce7261808c78
SHA132eb1707cdcf2cd772af9d7a4b9fb34b4080fc8b
SHA2565a41a7190c6e610810e9bde127ad7299ce50dd58bce9598bfe275728f5f37f37
SHA512c7c52c3573d878840c83b3044a1c4938ec294f42a0fec0a50d18378310b69d0c2ed50f50e7426a96a99f333ae0ffe7fb2f2846c0803c1e3e4342c1df6d12f5ed
-
Filesize
391KB
MD5f6e825cdc838e6b264b7d8a01009771f
SHA1ff20705a5dafb3416371297cdb49d40c5a92cb98
SHA2560e51e71f582810f49aad4fe7d85a634aee9402830f434da50b3b17898d847600
SHA512b84309914713a795ca564ee73de0dc4b5ecf565b0366487c038c5d0b3632f7249e78943c8d19564bcb392729cd98699410ea3b725e721404cb749d486b89ec18
-
Filesize
11KB
MD5c1c020c59cdf379c115377423ebcd969
SHA1156ff2c61339f776ce26be8f4489fbb5966ec1f7
SHA2562990ab23d14cb70a564db14a77dd09a8afff17f1f344d4163042860879ed430d
SHA512994e5cd7be3d64988c5d795afef7f8b92fb3c335291fefc9b2b4f8a99e037f3c42fe2728bc31453ddd2bee3a6d41325f1b1743cf813780eb9fa91212b9c71ad5
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a