Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe
Resource
win10v2004-20241007-en
General
-
Target
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe
-
Size
1.1MB
-
MD5
5d5cf5535b98336f45e26555b064230c
-
SHA1
a0571bb3d640c3f1703a30015d340dc74f1a7f66
-
SHA256
563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b
-
SHA512
10bc2839acdb7572e481753a847795fe2871788ea3760029d3b2c853b3a1f6186be27dd835d750de6924a32ef69e3ec24d6faeb740ffb33a1e0b16ffdf47ce3f
-
SSDEEP
24576:AyK17wd8xQ5XYOukcYbMQ4giz673oHkNRg2wiSc:HKBwdcZ6t4gs67X7gnT
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b95-32.dat healer behavioral1/memory/3244-35-0x00000000003F0000-0x00000000003FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buWA24mJ39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buWA24mJ39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buWA24mJ39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buWA24mJ39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buWA24mJ39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buWA24mJ39.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1380-41-0x0000000007130000-0x0000000007176000-memory.dmp family_redline behavioral1/memory/1380-43-0x0000000007790000-0x00000000077D4000-memory.dmp family_redline behavioral1/memory/1380-59-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-63-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-61-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-57-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-55-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-53-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-51-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-84-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-76-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-67-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-49-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-47-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-45-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-44-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-65-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-107-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-105-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-103-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-101-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-99-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-97-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-95-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-93-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-91-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-89-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-87-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-85-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-81-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-79-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-77-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-73-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-71-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1380-69-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 912 plFP21mJ58.exe 4432 plft68hw29.exe 3384 pllA88vD61.exe 3520 plVv37Ie23.exe 3244 buWA24mJ39.exe 1380 caSu76AF90.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buWA24mJ39.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plFP21mJ58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plft68hw29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pllA88vD61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plVv37Ie23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5960 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pllA88vD61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plVv37Ie23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caSu76AF90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFP21mJ58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plft68hw29.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3244 buWA24mJ39.exe 3244 buWA24mJ39.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3244 buWA24mJ39.exe Token: SeDebugPrivilege 1380 caSu76AF90.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 540 wrote to memory of 912 540 563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe 84 PID 540 wrote to memory of 912 540 563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe 84 PID 540 wrote to memory of 912 540 563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe 84 PID 912 wrote to memory of 4432 912 plFP21mJ58.exe 86 PID 912 wrote to memory of 4432 912 plFP21mJ58.exe 86 PID 912 wrote to memory of 4432 912 plFP21mJ58.exe 86 PID 4432 wrote to memory of 3384 4432 plft68hw29.exe 87 PID 4432 wrote to memory of 3384 4432 plft68hw29.exe 87 PID 4432 wrote to memory of 3384 4432 plft68hw29.exe 87 PID 3384 wrote to memory of 3520 3384 pllA88vD61.exe 88 PID 3384 wrote to memory of 3520 3384 pllA88vD61.exe 88 PID 3384 wrote to memory of 3520 3384 pllA88vD61.exe 88 PID 3520 wrote to memory of 3244 3520 plVv37Ie23.exe 89 PID 3520 wrote to memory of 3244 3520 plVv37Ie23.exe 89 PID 3520 wrote to memory of 1380 3520 plVv37Ie23.exe 96 PID 3520 wrote to memory of 1380 3520 plVv37Ie23.exe 96 PID 3520 wrote to memory of 1380 3520 plVv37Ie23.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe"C:\Users\Admin\AppData\Local\Temp\563999ad1d63f5ffc2ade68f8f880679b697da49df558805ba87f7a57d54f17b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plFP21mJ58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plFP21mJ58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plft68hw29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plft68hw29.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllA88vD61.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pllA88vD61.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plVv37Ie23.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plVv37Ie23.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buWA24mJ39.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buWA24mJ39.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caSu76AF90.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caSu76AF90.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1003KB
MD5056bf3335420403056d8f5ce4f3b80ae
SHA1bd84e50425a90cb92e5bc6755bc6c204c7dbad68
SHA256e967e964b0efc7ba43b13e1d256ea837cb2bcc29250bf5dc46ca9acbc46c2fea
SHA51252472cfcbfd78dfb30cdcd0d15d73be0df0f127f8d424c37a93aa05ab856cc3352f6b2451d947cfc6a93bcea8785769868aedc8adf2746bb150737dda2084af8
-
Filesize
907KB
MD504c785a25331ce4b0c62f5123989d9c3
SHA11afaed60a38b98c41715ae374b55acf6e3591fca
SHA2560dd75ca8384ee6a15e72195551426ec945de3780eebe949a44b08eead5c6be60
SHA512573a447ca5393e21fd2ba31fe9d2050611e7b1d0d967a78406e50e23aac0d38be74b88168241b77552a727710add2defb8c736539670bebe32d4ce6761484b68
-
Filesize
683KB
MD5ca6ad095eff24ebe7f585aa276cb563e
SHA14ce2d4c3900f5344bf5517632df73c821161f86c
SHA25688004bde9d576b6dc1d50cbdde5893a313febc3eb750fc9676e514a9cb5a57dd
SHA512122c9e7e4f86e3210f6a55ea42bfbd9013e950bdbc7b346156303fe07ae1b268888969393995d3d978581539793ee6301816177de21f2fe687bd94a0f1f6e657
-
Filesize
399KB
MD5e97d8b641f6c678967d8a7a48bc7f5f6
SHA1b82c5ec2190e7057d4077ca02965d76bcea96c2f
SHA256c2d794686869053d0cf7b7ccdbeb032041b43391d75103b4efff2af0f3fa74b3
SHA5129f06e914c2e4d8d8e3e0438e8b4acf77a2318c53c6bf7162724d8089f4ee9d427fa941346451bca6e10b811416feaea0656470212e9e3cbbfa5712b885d47bea
-
Filesize
12KB
MD57e7f528106781100fd767e76f5dea621
SHA1edcf87876582e09df3fa84b79cf891b62209569d
SHA256cf47dc61a3e50848fd76653ad41aca913940098245285c35f02130f594516ade
SHA5127e9000ff385c8977929a27400647bb07677aa3b84b2b2c7cdfa809248025592e257237b88ffbac5b55a4bde80dedd3f65f0244597325247f1252be063340d10b
-
Filesize
375KB
MD55ff32f757fe387c14ed8b1388ed9ec51
SHA143465ddc0d2b6107b9ec69f4852abedc6dc7a3e3
SHA256ed7b94310be80b1aadad0043ae5539fbdf5a5b57626e275cf1e93cda3a307c60
SHA512f89a31e03ae0ec6116b58136b1362bab031f04a340738d5878152905ca69964c833fb5b58c339af3e71fc804e6f727983e8a9db43e58ac37875fb1e2d83a2c92