Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe
Resource
win10v2004-20241007-en
General
-
Target
139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe
-
Size
1.1MB
-
MD5
389f0a53dbe9aa2cdf1d56eb2eabf3f0
-
SHA1
f6c0abf2a10cd981095c82a983138bdae85fbc0e
-
SHA256
139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0
-
SHA512
173996f60019f0dc54cb4794cca702c9f6dea4377d98586de7fb2a8722c72b8a03bbc0d5c3c56032a8a296b7e04a23bf6ffca301179ae6c4aa9fa67d49df794a
-
SSDEEP
24576:XyONC0UOKbkF3jA4cjojXG6vVAOb78JdvUUhUHA8/aY/:iONX1Jc0rGiAO4JdctHAH
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b79-32.dat healer behavioral1/memory/1376-35-0x0000000000CD0000-0x0000000000CDA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buwP07AG65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buwP07AG65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buwP07AG65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buwP07AG65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buwP07AG65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buwP07AG65.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5056-41-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/5056-43-0x0000000004B60000-0x0000000004BA4000-memory.dmp family_redline behavioral1/memory/5056-79-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-99-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-107-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-105-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-103-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-97-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-95-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-94-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-91-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-89-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-87-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-85-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-83-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-81-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-77-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-75-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-73-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-71-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-69-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-67-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-63-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-61-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-59-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-57-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-55-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-49-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-101-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-65-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-53-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-51-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-47-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-45-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/5056-44-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1256 plSu30ht09.exe 316 plIl09kR27.exe 5004 plmN88Cx57.exe 1076 plqL80RC73.exe 1376 buwP07AG65.exe 5056 caWk01Fm75.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buwP07AG65.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plSu30ht09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plIl09kR27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plmN88Cx57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plqL80RC73.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plIl09kR27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plmN88Cx57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plqL80RC73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caWk01Fm75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plSu30ht09.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1376 buwP07AG65.exe 1376 buwP07AG65.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 buwP07AG65.exe Token: SeDebugPrivilege 5056 caWk01Fm75.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2836 wrote to memory of 1256 2836 139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe 83 PID 2836 wrote to memory of 1256 2836 139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe 83 PID 2836 wrote to memory of 1256 2836 139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe 83 PID 1256 wrote to memory of 316 1256 plSu30ht09.exe 84 PID 1256 wrote to memory of 316 1256 plSu30ht09.exe 84 PID 1256 wrote to memory of 316 1256 plSu30ht09.exe 84 PID 316 wrote to memory of 5004 316 plIl09kR27.exe 86 PID 316 wrote to memory of 5004 316 plIl09kR27.exe 86 PID 316 wrote to memory of 5004 316 plIl09kR27.exe 86 PID 5004 wrote to memory of 1076 5004 plmN88Cx57.exe 87 PID 5004 wrote to memory of 1076 5004 plmN88Cx57.exe 87 PID 5004 wrote to memory of 1076 5004 plmN88Cx57.exe 87 PID 1076 wrote to memory of 1376 1076 plqL80RC73.exe 88 PID 1076 wrote to memory of 1376 1076 plqL80RC73.exe 88 PID 1076 wrote to memory of 5056 1076 plqL80RC73.exe 95 PID 1076 wrote to memory of 5056 1076 plqL80RC73.exe 95 PID 1076 wrote to memory of 5056 1076 plqL80RC73.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe"C:\Users\Admin\AppData\Local\Temp\139af633beba2f500fe961d76459a8fde6d8a11a2d9cc82f64965597df41c2c0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSu30ht09.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plSu30ht09.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIl09kR27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plIl09kR27.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plmN88Cx57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plmN88Cx57.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plqL80RC73.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plqL80RC73.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buwP07AG65.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buwP07AG65.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWk01Fm75.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWk01Fm75.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD59a52b33de1e9cf931840e9dea59309b3
SHA1d45ed8d4da5916c0c50ea760fb7a5113d552d714
SHA256cdea6be7ca5691fe40e0f23e2170897bdabd0d13c4f2663f7256d337f56fa577
SHA512165a1e28fe9e99fa2c55e5aee07d863237bdf72d44d79d318e7316d8c2c51315e6c487d0b0a91e871ef1e11a0e2ca8b9653df7e12e3f78efb99e88fbef72abe1
-
Filesize
892KB
MD5942c6350f85543c56e63dc2e0e75c691
SHA126b0a2d6cef84cf3d1e68e9aae68fbdb23172654
SHA2560f5ca7b890fea33cd25ac172b96412ef257f866e8b00d08d82586fd0dae7d1f1
SHA512a0db4f64031bf6d66df4d771f045fcd4502b8e1a5f064f065477fda1c0207c37cba530e6a3642bb38db8a122171c42d330775b9018f0ea2562529afe3873e0dc
-
Filesize
666KB
MD5fe336187f8023f0f48b7b51e4f9dd34f
SHA1f37e71d98f971635a88faf4ed174b37e02f92eb2
SHA25610c632a668920f694b23d68d978b3351d5fa07aa6e5ab5b3a04c9e085e8758ab
SHA5120004fc1823519a2350cd388e5fd7ad8301c54500ace23776c1d40af89a645aa535d149aaec84401f15f9d6ab70077fc1d2649d0250f995682c4a36696721c44f
-
Filesize
391KB
MD536490354359045630af24d2de57302fa
SHA103e43fe21f0af15668df15cba61b1c7eb00ae87a
SHA2564a5b5de306ae643a3aa194c963d44c09191699e8f7fba8dc002baeaf34bf4d53
SHA51242e90fc29f007fa4dc86d9d93c0d9e01e06761a79977334e69b52d2745dfc717ad0b265c18b1516a67641e4ab4db174603634e9a672f0ad334224a927964bc07
-
Filesize
16KB
MD58971c60174b719a25c0b92c8a47e59f8
SHA142b2ecfcd2cacb57aeca81f5520c4e0ef843093f
SHA256f90f8a469088df2b720e283bf8156131f731e2f8db13d18a2d89c8cd03c7ba34
SHA512e43fa3a265dcdba8c15a6f8e3459a8be4ff2be23188bc2d182d5409032d23e666a71bef19d8dacd56e732449f31e2c4da839a88ea3a750deb8032370ac5fe6cb
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8