Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe
Resource
win10v2004-20241007-en
General
-
Target
9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe
-
Size
1.2MB
-
MD5
81d89345c64329675959fd66c47543a8
-
SHA1
9bd22a3565ea09cb2a7022b7a733579185cf64bb
-
SHA256
9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01
-
SHA512
c126ecb25078c137573d3c1052f74fdfbcaa18dd4d34f041227a3daa405034d29531ddff9a372b52f29ec7f0f7cde87424ff6e63ed709ff36f37abf7af3fb7d5
-
SSDEEP
24576:vyWzXxtKYK3gn3TfxSvVNrznmuzESqIU3Mfo/sguOhB:6Ws+zc9N/nmuueo/sguk
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b93-33.dat healer behavioral1/memory/564-35-0x00000000002C0000-0x00000000002CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iCO10Vj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iCO10Vj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iCO10Vj71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iCO10Vj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iCO10Vj71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iCO10Vj71.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/780-41-0x0000000007160000-0x00000000071A6000-memory.dmp family_redline behavioral1/memory/780-43-0x00000000071E0000-0x0000000007224000-memory.dmp family_redline behavioral1/memory/780-51-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-57-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-107-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-105-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-103-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-101-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-99-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-97-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-95-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-91-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-89-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-87-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-85-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-83-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-81-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-79-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-77-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-75-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-73-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-71-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-69-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-65-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-64-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-61-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-59-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-55-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-53-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-49-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-47-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-93-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-67-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-45-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline behavioral1/memory/780-44-0x00000000071E0000-0x000000000721E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3516 vmwT15lR04.exe 4996 vmpb79cp51.exe 3412 vmYM35Gd18.exe 944 vmJm92Ac05.exe 564 iCO10Vj71.exe 780 kCS00fR87.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iCO10Vj71.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmwT15lR04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmpb79cp51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmYM35Gd18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmJm92Ac05.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4772 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmwT15lR04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmpb79cp51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmYM35Gd18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmJm92Ac05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kCS00fR87.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 564 iCO10Vj71.exe 564 iCO10Vj71.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 564 iCO10Vj71.exe Token: SeDebugPrivilege 780 kCS00fR87.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3516 3792 9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe 83 PID 3792 wrote to memory of 3516 3792 9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe 83 PID 3792 wrote to memory of 3516 3792 9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe 83 PID 3516 wrote to memory of 4996 3516 vmwT15lR04.exe 84 PID 3516 wrote to memory of 4996 3516 vmwT15lR04.exe 84 PID 3516 wrote to memory of 4996 3516 vmwT15lR04.exe 84 PID 4996 wrote to memory of 3412 4996 vmpb79cp51.exe 86 PID 4996 wrote to memory of 3412 4996 vmpb79cp51.exe 86 PID 4996 wrote to memory of 3412 4996 vmpb79cp51.exe 86 PID 3412 wrote to memory of 944 3412 vmYM35Gd18.exe 88 PID 3412 wrote to memory of 944 3412 vmYM35Gd18.exe 88 PID 3412 wrote to memory of 944 3412 vmYM35Gd18.exe 88 PID 944 wrote to memory of 564 944 vmJm92Ac05.exe 89 PID 944 wrote to memory of 564 944 vmJm92Ac05.exe 89 PID 944 wrote to memory of 780 944 vmJm92Ac05.exe 97 PID 944 wrote to memory of 780 944 vmJm92Ac05.exe 97 PID 944 wrote to memory of 780 944 vmJm92Ac05.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe"C:\Users\Admin\AppData\Local\Temp\9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmwT15lR04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmwT15lR04.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmpb79cp51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmpb79cp51.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmYM35Gd18.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmYM35Gd18.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmJm92Ac05.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmJm92Ac05.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iCO10Vj71.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iCO10Vj71.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kCS00fR87.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kCS00fR87.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD537052bdc94f92f75e905585ca7b06a99
SHA10dd4e2c059dcd06ffb5236929e8a1d3b930845de
SHA256ca178c79fa18eaace5a3e203f4e3d668aef2a99d016130ea7b5ab02c4d98335b
SHA5129d818772749cff88053d79bc9bfab460ef78eca79fc1f8a0ad58b5dceb224720f84d7a3aae9a080b7892a2a89d732cfc040fb2daa11b798b94f2ecf0a9f600b8
-
Filesize
959KB
MD5b694b3866c55a6fe8f9dad165278a63d
SHA15be9bd63e22b2d521b7e062106e0b8a53a51e64a
SHA256a04b5239936bf23f0160eb754f35cc488d374429e5fe733b3c8826612b1fd1e3
SHA512f1ce673e0c1b2481ba18cce2afe021d9e49d732dda748923b8556a44b00c4800e0f1b75bbb7d147552694a1a56d6e3f2c7ca7edc62d0e4bc52128ce1524ebc91
-
Filesize
682KB
MD59ad87167d32a3bb0b3b8a6d2e172f62c
SHA1de438c5b44459b7b5bc8e9d90412248eb776430d
SHA256ac597893571af28c6b6c0997644cd8c5446f7d9c840cf9fc8541641f81d5217c
SHA5127035e7d99b1b7c6bc5ee4e12dc63a010a740e5cbd4f87899f28ebee44c3eb1b85c83db00d47359f98a5f42026f7b2118d18d4ce4798ba45cb8e714601adeb55c
-
Filesize
399KB
MD50b24f82e6c9f69facc5134c1d54ca06c
SHA186a74f8ac6b8e0ed47c15f9b093d8c903e972b22
SHA25653aae8d9eb6db7fc09d2041d2b497239f154092f89bedc1225dc29b46f3e010b
SHA5122d6fce1b31bc539c269b4cc5dd3fb265c82f323e95546c7e038512b304b9fb38366d7986729d1fcd3ab0f03583a1759944b8649b001b5a8887308fe48f31359d
-
Filesize
13KB
MD5c45b27d5d452ab26e3e391439fbf1e12
SHA1ce75bd10e689b89581cc2a7c9df5d22d9287f40b
SHA2568721f76103d7a1c31a5673ac16006dbbc93ed6b4027dc4c6491ee7990a08cb63
SHA5123bdd693f5f01bc516b6bcd511552abca528f54f35d4cbee7f3e3ce5bee8dd71e60041bd5a962d99135696ce09f1fabf21f963fa99cfc30fe9c664f1eb5d15b64
-
Filesize
374KB
MD5534196314ab3a6ddde9383161e04bb1c
SHA11aada3e9ec093f011c9e1c4c557f2e9da73861cd
SHA256d4eb393c9ee03f90888b37f01abdb6bb09d44416bacdfd5216c29f2739993c7e
SHA5124d134be97ff5f2af6d2b9f8dadff10ace57447cf3a51f13a1d69b933de3a94673bf5c3c3899ff68036a2c4ec579248c015b974c5bdb51488ed8819227950ff8b