Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe
Resource
win10v2004-20241007-en
General
-
Target
f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe
-
Size
536KB
-
MD5
40640a6bb945069bd0d55ee6c65aa88a
-
SHA1
de029248d1eed6f25ab47d3755aef471938d8837
-
SHA256
f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595
-
SHA512
91f2869e0518064db57753b5013d3ce6f35740cb286a118028c40240c147f9cd4fd543b9e9507e6ff6288c7d84c8be2dabc6bd65235b97b63d7fefd9a5c737f9
-
SSDEEP
12288:oMrxy90S0hVqHoSYgTq4JnEUE49+37ImQxvAlRVdn:ZypISYCDNE56ENVdn
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023caa-12.dat healer behavioral1/memory/4072-14-0x00000000000F0000-0x00000000000FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf37nQ95DY73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf37nQ95DY73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf37nQ95DY73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf37nQ95DY73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf37nQ95DY73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf37nQ95DY73.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4516-23-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/4516-25-0x0000000004BA0000-0x0000000004BE4000-memory.dmp family_redline behavioral1/memory/4516-39-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-75-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-90-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-87-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-85-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-84-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-81-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-79-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-77-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-73-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-71-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-69-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-67-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-65-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-63-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-61-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-59-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-57-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-55-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-53-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-51-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-49-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-47-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-45-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-43-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-41-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-37-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-35-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-33-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-31-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-29-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-27-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/4516-26-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4524 vhHP2358ff.exe 4072 sf37nQ95DY73.exe 4516 tf18vn85EF60.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf37nQ95DY73.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhHP2358ff.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf18vn85EF60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhHP2358ff.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4072 sf37nQ95DY73.exe 4072 sf37nQ95DY73.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4072 sf37nQ95DY73.exe Token: SeDebugPrivilege 4516 tf18vn85EF60.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4524 4904 f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe 83 PID 4904 wrote to memory of 4524 4904 f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe 83 PID 4904 wrote to memory of 4524 4904 f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe 83 PID 4524 wrote to memory of 4072 4524 vhHP2358ff.exe 84 PID 4524 wrote to memory of 4072 4524 vhHP2358ff.exe 84 PID 4524 wrote to memory of 4516 4524 vhHP2358ff.exe 94 PID 4524 wrote to memory of 4516 4524 vhHP2358ff.exe 94 PID 4524 wrote to memory of 4516 4524 vhHP2358ff.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe"C:\Users\Admin\AppData\Local\Temp\f0fce9292cedf923a16bc6e34c3f957c2efc935091523a15bd411aed9e21c595.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhHP2358ff.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhHP2358ff.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37nQ95DY73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37nQ95DY73.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf18vn85EF60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf18vn85EF60.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5f9c34ae6326847594a81566b4587c1dc
SHA19d61d82e643ab659a77f11727f784d9213b75dcb
SHA25610665730c4a181d70eb85e381fb88022f2d84b9b2ffd95810fab4d282e3cfe77
SHA5124884109bf2db1391baab2db92a046d67984ce7b50ef7f3ab5966215ba820e633428776c30971c76eed841f460b9de67b441866ac9375673a2b2b54b733765629
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
366KB
MD5da3a935ab081e87483af1c3d4a04b8d3
SHA1b0854a7549e01afd4724f5d3605a161a0a9a4a9b
SHA256febc94ca65f96934856c89b8a54271ddb245b39100a324d4b2d586d87411e1e7
SHA5124640c93f236d86c988c60a4324cde28d6e86b95cad5ba4b8cdd4b7124e5df5f7170cb408968702fd81d2200b1b8976d41e097929e2f7c0efcfb4860f3110ec74