Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe
Resource
win10v2004-20241007-en
General
-
Target
5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe
-
Size
557KB
-
MD5
eafc265482e5b4d2149cee70435916b0
-
SHA1
7ceef40d86246fd21d0b56a602347391eb2ca245
-
SHA256
5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb
-
SHA512
41f2ddd613ba3bd6ff0b0eb260de3945913e3112b554ed3e12b5fe65f847dfd8c377bea7bb94ef5b7690583508a5c531eae6c31d8b819ce609611dcfbe369050
-
SSDEEP
12288:YMray90pzYC7uBzjhVFiNjRrbOcSbbfFbsG9G2qUOpO8e:iyGzYQ8zjh3iN1yb7WG9GdUce
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbc-12.dat healer behavioral1/memory/640-15-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf85fl05Hi40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf85fl05Hi40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf85fl05Hi40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf85fl05Hi40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf85fl05Hi40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf85fl05Hi40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/780-21-0x0000000004E40000-0x0000000004E86000-memory.dmp family_redline behavioral1/memory/780-23-0x0000000004EC0000-0x0000000004F04000-memory.dmp family_redline behavioral1/memory/780-35-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-25-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-24-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-51-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-87-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-83-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-81-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-79-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-77-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-75-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-73-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-71-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-69-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-65-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-63-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-62-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-57-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-55-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-54-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-49-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-47-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-45-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-43-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-41-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-39-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-37-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-33-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-31-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-29-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-27-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-85-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-67-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline behavioral1/memory/780-59-0x0000000004EC0000-0x0000000004EFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1440 vhsp6129hv.exe 640 sf85fl05Hi40.exe 780 tf03pc81Fd87.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf85fl05Hi40.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhsp6129hv.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhsp6129hv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf03pc81Fd87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 640 sf85fl05Hi40.exe 640 sf85fl05Hi40.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 640 sf85fl05Hi40.exe Token: SeDebugPrivilege 780 tf03pc81Fd87.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1440 2080 5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe 83 PID 2080 wrote to memory of 1440 2080 5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe 83 PID 2080 wrote to memory of 1440 2080 5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe 83 PID 1440 wrote to memory of 640 1440 vhsp6129hv.exe 84 PID 1440 wrote to memory of 640 1440 vhsp6129hv.exe 84 PID 1440 wrote to memory of 780 1440 vhsp6129hv.exe 92 PID 1440 wrote to memory of 780 1440 vhsp6129hv.exe 92 PID 1440 wrote to memory of 780 1440 vhsp6129hv.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe"C:\Users\Admin\AppData\Local\Temp\5036d5966af7bd6985c2d7127d35b9c28681606d483fe0a1c77c9bf1c06bf5fb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhsp6129hv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhsp6129hv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf85fl05Hi40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf85fl05Hi40.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03pc81Fd87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03pc81Fd87.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a85bd99fbba6722a18066a2124eccfcb
SHA1f6342074e21a10c1d20fcdc287e210602edc791a
SHA2566e9c6732dd00d4028938a744269d4e1e96b35b93f6fc95b714c233ccb72a2318
SHA512248ec4e6d307b34c0fa1492551d60b580c2b95bb12862517e80f0c9ebf8276c1bf92ddbdf06dc35bf9e6c2d5160fca9fff04686d470688502cf15ee378f0585e
-
Filesize
11KB
MD5a4d34446cfdf12793374ccb7ba0da56f
SHA1197dedbeab753c93fb0efd1bf52d7516ec465f06
SHA256015f7b41c79d9f6ab7e5670f55defaaba2a4e8ba56992538856e00e611850b8d
SHA512bfa6d6a60933a90d2603b0e76c5809644c353b09ae6f72f69d5c3780f2c110237ed72b8bb77f2ca606b1c6c0b6db66e15ff54836a60f13140f597bcb78f03fe6
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187