Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe
Resource
win10v2004-20241007-en
General
-
Target
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe
-
Size
1.2MB
-
MD5
79a7607d46aa5872d6a1e20eb144f38f
-
SHA1
b70e077738434da2297eb6dba34b63474268cdf7
-
SHA256
579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a
-
SHA512
d8cdc082b47b3ac2f80ce35f07fd7ae1c4aee072a3acbc8abdf54d4996b9352c813c4e9e259137d903db72221e547de5ed5f5350c5c1e65408bcceeaece40505
-
SSDEEP
24576:5yQ0omQKEf3VPM/6vvd7zfj7Ymv0PpXgwh4HM069NhQpEaEW:sQZd3FM/eZXcmvxjs0ONhBX
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c98-33.dat healer behavioral1/memory/872-35-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buzg92ZB66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buzg92ZB66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buzg92ZB66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buzg92ZB66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buzg92ZB66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buzg92ZB66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/780-41-0x0000000004B40000-0x0000000004B86000-memory.dmp family_redline behavioral1/memory/780-43-0x00000000077B0000-0x00000000077F4000-memory.dmp family_redline behavioral1/memory/780-55-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-53-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-107-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-106-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-103-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-101-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-100-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-97-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-95-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-91-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-89-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-87-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-85-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-83-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-81-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-79-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-77-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-75-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-73-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-69-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-67-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-65-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-64-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-61-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-57-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-51-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-49-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-47-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-93-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-71-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-59-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-45-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline behavioral1/memory/780-44-0x00000000077B0000-0x00000000077EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3772 plfK87fo08.exe 4396 plYe53eW85.exe 1388 plOM32bq70.exe 2008 plNS97CU80.exe 872 buzg92ZB66.exe 780 caHE52tc27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buzg92ZB66.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plYe53eW85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plOM32bq70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plNS97CU80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plfK87fo08.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2072 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plfK87fo08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYe53eW85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plOM32bq70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plNS97CU80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caHE52tc27.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 buzg92ZB66.exe 872 buzg92ZB66.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 872 buzg92ZB66.exe Token: SeDebugPrivilege 780 caHE52tc27.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3808 wrote to memory of 3772 3808 579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe 83 PID 3808 wrote to memory of 3772 3808 579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe 83 PID 3808 wrote to memory of 3772 3808 579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe 83 PID 3772 wrote to memory of 4396 3772 plfK87fo08.exe 84 PID 3772 wrote to memory of 4396 3772 plfK87fo08.exe 84 PID 3772 wrote to memory of 4396 3772 plfK87fo08.exe 84 PID 4396 wrote to memory of 1388 4396 plYe53eW85.exe 86 PID 4396 wrote to memory of 1388 4396 plYe53eW85.exe 86 PID 4396 wrote to memory of 1388 4396 plYe53eW85.exe 86 PID 1388 wrote to memory of 2008 1388 plOM32bq70.exe 88 PID 1388 wrote to memory of 2008 1388 plOM32bq70.exe 88 PID 1388 wrote to memory of 2008 1388 plOM32bq70.exe 88 PID 2008 wrote to memory of 872 2008 plNS97CU80.exe 89 PID 2008 wrote to memory of 872 2008 plNS97CU80.exe 89 PID 2008 wrote to memory of 780 2008 plNS97CU80.exe 98 PID 2008 wrote to memory of 780 2008 plNS97CU80.exe 98 PID 2008 wrote to memory of 780 2008 plNS97CU80.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe"C:\Users\Admin\AppData\Local\Temp\579866a8b3c2b1ea427a81f651cf5f9c1113e02b34aa44795074b6ab5282bf0a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfK87fo08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plfK87fo08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYe53eW85.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plYe53eW85.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOM32bq70.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plOM32bq70.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plNS97CU80.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plNS97CU80.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzg92ZB66.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzg92ZB66.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHE52tc27.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHE52tc27.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52e14766448251ac8ad791bdf679c8aaa
SHA19240f490ffbf1f187b08b2af1f56197ec1be6e35
SHA25647860bd07b86761de2fbc5cf45647a8d6ddb8b4171db7f424898d59819d9a790
SHA512d750e6ce8aac4fa1c6a69089d7e81d4723049cca26026e0b47b6f75dcc896da68835023ce997791a08cc5dbf9070dfa457df1e29057f5ab320a243a7991aefaa
-
Filesize
959KB
MD5a82fa481f4f7aabe730a3dbf425ccffc
SHA11ae5334fc496c3b9b1a88d6a4019b3126a47b28c
SHA256ec1487847a84360966edd6818f89130e1e14e49964751ff7c9bd944818b0596b
SHA51243cbb44497001955b16c8044441d01dd1644a3812fd98214d2e80e4412518432c43448c5d2b3d2440f255238bf218828b6f47971eda82bc8c0e6a2cbd55c69a3
-
Filesize
682KB
MD548c429bb35b31569176440fa61f02045
SHA14e00871cda9265031bc44892744d72fb5df7f19b
SHA2562e681bbec7a4322f1975ed5f29a6dec42da51872736bb9b7a107fc32d107e8d4
SHA512a64c92aa02657af53c648e95b9fb93e856f21af9c2cc71b0734da5481b41bf89232e41db3700183b75170b0380ed74b7620d6fb6d4e8cd5fcd5d8c390a667dfc
-
Filesize
399KB
MD5a81ecfefbef762589d5eaa9be471bfc1
SHA1f3fc62b87c8cbd137dd5e2cf1126b5095813eb90
SHA256a06cb80e367d28fa2a3ec575cf7172f3475e17e0f6cb7802360580f5dfafeba1
SHA512f14dc18ed1745c9bb7604c89f8c7a6391b92b3dd3ff5b9e47eb5f04644e57cc9087d75f3f148e2f0985618ae7389307af61e62041561e9b797f53359cc94b7bb
-
Filesize
13KB
MD582c92ed05d28a12cf4f9dd7b7a70aae5
SHA1b359ae65599c44a43b6315ba6656571a361d6d5d
SHA256db1f034bab01b4a28973487141110f8e60f6e141f912042b1d35bbc2708e6768
SHA512194be9fa06b95b9b987f39434a45560ccc4cc07ac455c5475242c2a1a709c7561e946dd37b82cabab5b8fa0cfc16c25103b3c68bd152c10d944df36b42ff69af
-
Filesize
374KB
MD5534196314ab3a6ddde9383161e04bb1c
SHA11aada3e9ec093f011c9e1c4c557f2e9da73861cd
SHA256d4eb393c9ee03f90888b37f01abdb6bb09d44416bacdfd5216c29f2739993c7e
SHA5124d134be97ff5f2af6d2b9f8dadff10ace57447cf3a51f13a1d69b933de3a94673bf5c3c3899ff68036a2c4ec579248c015b974c5bdb51488ed8819227950ff8b