Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe
Resource
win10v2004-20241007-en
General
-
Target
654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe
-
Size
526KB
-
MD5
aa51d5a5a7d824a91252cb7013be08db
-
SHA1
bec03cc27bdf35ac397f57c4ab392c0949eb5582
-
SHA256
654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f
-
SHA512
6bb12451cd5ec37510ced848decc01742ee2cc9a158cd4c9f802a4c787901796a4cf7767e2b924298f6a50a841643b9bc3fdd39103c89f468725ecac9b8e1cec
-
SSDEEP
12288:FMrUy901N56gGISAMiubD7EAF1PZ44bjsgQXCOKwW:1yi5QAED9PvQin
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7f-13.dat healer behavioral1/memory/3908-15-0x0000000000750000-0x000000000075A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf35nT81So60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf35nT81So60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf35nT81So60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf35nT81So60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf35nT81So60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf35nT81So60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/772-22-0x0000000002180000-0x00000000021C6000-memory.dmp family_redline behavioral1/memory/772-24-0x0000000004A50000-0x0000000004A94000-memory.dmp family_redline behavioral1/memory/772-58-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-74-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-88-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-86-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-84-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-82-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-78-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-76-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-72-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-70-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-68-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-66-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-64-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-62-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-60-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-56-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-54-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-52-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-50-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-48-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-46-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-44-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-42-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-40-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-36-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-34-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-32-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-30-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-28-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-80-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-38-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-26-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline behavioral1/memory/772-25-0x0000000004A50000-0x0000000004A8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4336 vhAe3152Nw.exe 3908 sf35nT81So60.exe 772 tf98hb48Nq23.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf35nT81So60.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhAe3152Nw.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhAe3152Nw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf98hb48Nq23.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3908 sf35nT81So60.exe 3908 sf35nT81So60.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3908 sf35nT81So60.exe Token: SeDebugPrivilege 772 tf98hb48Nq23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4336 1672 654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe 83 PID 1672 wrote to memory of 4336 1672 654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe 83 PID 1672 wrote to memory of 4336 1672 654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe 83 PID 4336 wrote to memory of 3908 4336 vhAe3152Nw.exe 84 PID 4336 wrote to memory of 3908 4336 vhAe3152Nw.exe 84 PID 4336 wrote to memory of 772 4336 vhAe3152Nw.exe 95 PID 4336 wrote to memory of 772 4336 vhAe3152Nw.exe 95 PID 4336 wrote to memory of 772 4336 vhAe3152Nw.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe"C:\Users\Admin\AppData\Local\Temp\654f1da92734f3732f9897a476434b049db61d63491b75247cf3d856c480815f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAe3152Nw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAe3152Nw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf35nT81So60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf35nT81So60.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf98hb48Nq23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf98hb48Nq23.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5abe8b691fe65e05a2644850004278687
SHA1dd62c6180613003d4694ab134f7f2298e5ed4be1
SHA256fafbb20820a5ac3ea21b3a40e266f2295938c40d9c4f6f263380870005c7e47c
SHA51269cea8fcaa0a0b11cb20f0b045ac6f59fc3cbe305ed76875bf31e484770dad4e3f0b3f1bb45d60dc677c5744c61cd982026381136161bb40e69d0875b443b62c
-
Filesize
11KB
MD5b159cb38d2dc1946cdfc8eefd2570666
SHA113b093f5fefca72fcd853d6c5ee88ee4e7b726f3
SHA256c922292e33d7e6f68aa6df774b383efa36ceb6da2962dd53014199a6fab7205a
SHA512f5fa68ac36590e17a6cd8dbd03c1d7e6aae2b7715ce43f033a71a97bff4bcb7594e791565de179cc3c18ce465ad9fcc9032df1b21098e295e9755f686ac2acb2
-
Filesize
292KB
MD5bde0fb595e9feb2667d8a8a78e326546
SHA1eead81585ede57400b7ec1bb906e9040e3f83833
SHA25672d6957bb47831ab0efe5678b31a54548a7733240fe207fa3b47497f4177ea8d
SHA5121f0ffa48e149869b3f6042752c4e80843441d242f539a7c863baae3f926fc55255d7eaa974c978e0655b5310b750a8844ea23670fe3079b53d62ce5c83412359