Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe
Resource
win10v2004-20241007-en
General
-
Target
5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe
-
Size
557KB
-
MD5
9549dd7d7d07e98d9379925f96fb1639
-
SHA1
f5adcb25cc85ca09bc80214876229d2258cf02c2
-
SHA256
5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156
-
SHA512
0016340b1c91d749d4a9277ecea9d061ef35d641668cd6159dad0fd657276da35034f62264391f25ed88a4d6198c8a50da37ec1790ea34aaf250b66db70a5bf7
-
SSDEEP
12288:IMrsy906lDsYQR2NrrkvSZob+fknCGkG2zU6Cekr:Ey/lwlRArIKZobcnGkGEU6no
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca8-12.dat healer behavioral1/memory/2564-15-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf98BD66zR70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf98BD66zR70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf98BD66zR70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf98BD66zR70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf98BD66zR70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf98BD66zR70.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4408-22-0x0000000007110000-0x0000000007156000-memory.dmp family_redline behavioral1/memory/4408-24-0x0000000007780000-0x00000000077C4000-memory.dmp family_redline behavioral1/memory/4408-28-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-36-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-88-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-86-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-84-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-82-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-78-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-76-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-74-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-72-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-70-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-68-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-66-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-64-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-62-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-58-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-56-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-54-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-52-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-50-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-48-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-46-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-44-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-40-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-38-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-34-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-32-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-30-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-80-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-60-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-42-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-26-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline behavioral1/memory/4408-25-0x0000000007780000-0x00000000077BE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 664 vhuf7606LD.exe 2564 sf98BD66zR70.exe 4408 tf92Ux83ve58.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf98BD66zR70.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhuf7606LD.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhuf7606LD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf92Ux83ve58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 sf98BD66zR70.exe 2564 sf98BD66zR70.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2564 sf98BD66zR70.exe Token: SeDebugPrivilege 4408 tf92Ux83ve58.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 664 2300 5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe 82 PID 2300 wrote to memory of 664 2300 5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe 82 PID 2300 wrote to memory of 664 2300 5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe 82 PID 664 wrote to memory of 2564 664 vhuf7606LD.exe 83 PID 664 wrote to memory of 2564 664 vhuf7606LD.exe 83 PID 664 wrote to memory of 4408 664 vhuf7606LD.exe 91 PID 664 wrote to memory of 4408 664 vhuf7606LD.exe 91 PID 664 wrote to memory of 4408 664 vhuf7606LD.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe"C:\Users\Admin\AppData\Local\Temp\5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhuf7606LD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhuf7606LD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98BD66zR70.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98BD66zR70.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf92Ux83ve58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf92Ux83ve58.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a4997335cb94b8d090e4d1d50f376da0
SHA1aa24e3e38e48b715aeef393d7b9ddb0f4020c7f3
SHA256cc1d54b361c463630aac7cb37e0f5bbee2380d2092d48987fa6280c1333be42e
SHA51210297a526fec03156e6f530ad8c95c2a5102b62dcaa52899c2bad9e6c3726c21b3f1cf9d9f873a016ad96e6dfe698573eb12c87883a06d7be00fa3dcee573194
-
Filesize
11KB
MD5e4ab14752d54e867226cba4b8e5d12c0
SHA1f823ecebbedfdfbcecf7671804d86db308e27ac5
SHA256096004dd32aef7ccff1e066266ea111a66d99932a3ece1920aa15f4cf5b5438c
SHA5124a4115596fd4ebf83ff3cd4fb0e01c60982d39a514628872a81b26282e7cf4687939e768cb8fdb60e7e2f41e9948f5dd70f8fae456bb6b7b50f41f55b82bdf53
-
Filesize
409KB
MD5d918db9077504212d04e97bc5857b710
SHA1cbac3bfca65f8dfe4efd408bcf480f3d603f1d06
SHA256ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3
SHA512f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187