Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe
Resource
win10v2004-20241007-en
General
-
Target
0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe
-
Size
1.0MB
-
MD5
bcccf9e378ba0f91a1ea6084874529c1
-
SHA1
dfe2dc73b912ffb810e6456b02cbf82b2e7e8931
-
SHA256
0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5
-
SHA512
4db33cba6529e843f69a4fb93f50fa59e5b96541c6623d2bd6047978beb2d584b910cf0722288f2a9dcf0aea18dc3559e3e7bea79ce63be9f9e01752d53492e8
-
SSDEEP
24576:TyWPAHHnVMU+/8IngOi9cUVMxw210yygb4afUygmastwaqd3:mXHHaR8InVii621XyiBPNtwZ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b92-26.dat healer behavioral1/memory/692-28-0x0000000000690000-0x000000000069A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bcl76pJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bcl76pJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bcl76pJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bcl76pJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bcl76pJ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bcl76pJ.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1760-34-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/1760-36-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/1760-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-54-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-100-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-98-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-96-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-94-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-92-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-90-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-88-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-86-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-84-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-78-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-68-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-64-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-62-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-58-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-52-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-50-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-46-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-40-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-38-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/1760-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 1660 ptY23Gw.exe 1036 pZN75sW.exe 1436 pdg72sU.exe 692 bcl76pJ.exe 1760 cVY89lb52.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bcl76pJ.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptY23Gw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pZN75sW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pdg72sU.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pZN75sW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdg72sU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cVY89lb52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptY23Gw.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 692 bcl76pJ.exe 692 bcl76pJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 692 bcl76pJ.exe Token: SeDebugPrivilege 1760 cVY89lb52.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1660 2800 0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe 84 PID 2800 wrote to memory of 1660 2800 0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe 84 PID 2800 wrote to memory of 1660 2800 0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe 84 PID 1660 wrote to memory of 1036 1660 ptY23Gw.exe 85 PID 1660 wrote to memory of 1036 1660 ptY23Gw.exe 85 PID 1660 wrote to memory of 1036 1660 ptY23Gw.exe 85 PID 1036 wrote to memory of 1436 1036 pZN75sW.exe 87 PID 1036 wrote to memory of 1436 1036 pZN75sW.exe 87 PID 1036 wrote to memory of 1436 1036 pZN75sW.exe 87 PID 1436 wrote to memory of 692 1436 pdg72sU.exe 88 PID 1436 wrote to memory of 692 1436 pdg72sU.exe 88 PID 1436 wrote to memory of 1760 1436 pdg72sU.exe 95 PID 1436 wrote to memory of 1760 1436 pdg72sU.exe 95 PID 1436 wrote to memory of 1760 1436 pdg72sU.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe"C:\Users\Admin\AppData\Local\Temp\0e07123bb98de380dd4bd4757dfe84b33d7fc6f97599e7382e3a22c25086ddf5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptY23Gw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptY23Gw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pZN75sW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pZN75sW.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pdg72sU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pdg72sU.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bcl76pJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bcl76pJ.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cVY89lb52.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cVY89lb52.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
883KB
MD579bdf58ef4ec1a5f9bf452d484d7f381
SHA1dfefb5ed64ea7e0cc61ca3740036e2ce54e423bd
SHA256860e70e09d87d527965285d66da7c0e1542db1ce42434652d97b1ed63665b8cf
SHA512d30cbd05afaa27de76c4e11d1b02b00c12f3b7da801122131b6082d1688fd08f5a592e9c0b96d219df9e32008403f1a50b0e690f2e45c112dcb6ac63673c78da
-
Filesize
660KB
MD58da2312a2176a95377823b3f86cbc7d1
SHA139709cb382b1383c35febda38b0e1b3986ba20fe
SHA2564c950e216b94518f605127e079e7f0a769b6a3182e4429eb4a0e87c768ce896e
SHA512e25e551d91a61acbaad93086aa935e01c76a63bc074f5894f5b85be9de2ddb18c79b4c54b29c823ba77a385bf073636e22ce95492ca1a613149c3f26052ce648
-
Filesize
388KB
MD578919304c17a3f5d59d82a4179e8f5c2
SHA1591e3ae7cc1709eb2fa2032befaa3a073bd9011d
SHA2564a89de3bbb76939906fea7c0df1e1632d3fd70bd275124a73b226fa69d7e52f9
SHA51267758c6d30b0b8411aa802e0e00947be8a7e395c1111675ea2eaaac5a2d16fc910b4b3984e81cacded469673eee0e2b86e9644e4b2b4dc81d3b3661ee2e590fa
-
Filesize
11KB
MD58f0298c0f41cbb02226b3017a5641de8
SHA12d4a8f863a75261ec5938810e2f995161899f36d
SHA2564c7ab1e56c69d9570974914a7c908019158c0c0ce2d8ef19a8727f28b7d37acf
SHA51287794bfc71e3dc4282fa353e1a7f8dec0faece2fe325e924b24473ed83130e246e2558b672a8b3c3916995e461485c915258c801f8fb3cf05a1775d2065118bd
-
Filesize
305KB
MD5c80a84da69e6b929948536e1d1b38c47
SHA1c94b4c26117a3ca689071f214a932ada9cf60226
SHA256d7fe92910a24b6d4121cd1695383cdb9b9ae2cd1d23c7a778cade3c389e60ae8
SHA512a41cebfb9494f42e4002d953f8851c03ff0da557df1978ac044e72ac9ed8295d0c01859049a0adb32a9e4d12b8138ff0ec43ecdfcfd2c194fd89d23f695be179