Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe
Resource
win10v2004-20241007-en
General
-
Target
0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe
-
Size
1.1MB
-
MD5
bc0d7467c8462bce1034f27f280cf616
-
SHA1
bdb61e6b03b3024ad0561d92767981e80671d132
-
SHA256
0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d
-
SHA512
df6825cc93abd8505df4bac506b0db82eeaea156525527f940fce13ed16908c95206e93635897465103ff15ec620d577bf91952d8cd7d3cb15d2cf8e0dc62b9c
-
SSDEEP
24576:iy4waKpGoSRKlMi4lclOaeiJjHYVY2CbMDf7FtQf9yfFan:J41KpLS0lvkCJTUWMDf7FtQVsFa
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b79-32.dat healer behavioral1/memory/3940-35-0x0000000000CD0000-0x0000000000CDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buwL50bA49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buwL50bA49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buwL50bA49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buwL50bA49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buwL50bA49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buwL50bA49.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2252-41-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/2252-43-0x0000000002630000-0x0000000002674000-memory.dmp family_redline behavioral1/memory/2252-51-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-49-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-47-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-45-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-44-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-105-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-107-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-103-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-101-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-99-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-97-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-95-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-91-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-89-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-88-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-85-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-81-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-79-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-77-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-75-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-73-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-69-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-67-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-65-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-63-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-61-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-59-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-57-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-55-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-93-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-83-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-71-0x0000000002630000-0x000000000266E000-memory.dmp family_redline behavioral1/memory/2252-53-0x0000000002630000-0x000000000266E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3936 plFE21iN55.exe 4548 plWz48gN21.exe 1372 plbR70Bn37.exe 1692 plMO94KF52.exe 3940 buwL50bA49.exe 2252 caHC13pC40.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buwL50bA49.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plMO94KF52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plFE21iN55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plWz48gN21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plbR70Bn37.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFE21iN55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plWz48gN21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plbR70Bn37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plMO94KF52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caHC13pC40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3940 buwL50bA49.exe 3940 buwL50bA49.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3940 buwL50bA49.exe Token: SeDebugPrivilege 2252 caHC13pC40.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3936 4916 0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe 83 PID 4916 wrote to memory of 3936 4916 0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe 83 PID 4916 wrote to memory of 3936 4916 0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe 83 PID 3936 wrote to memory of 4548 3936 plFE21iN55.exe 84 PID 3936 wrote to memory of 4548 3936 plFE21iN55.exe 84 PID 3936 wrote to memory of 4548 3936 plFE21iN55.exe 84 PID 4548 wrote to memory of 1372 4548 plWz48gN21.exe 86 PID 4548 wrote to memory of 1372 4548 plWz48gN21.exe 86 PID 4548 wrote to memory of 1372 4548 plWz48gN21.exe 86 PID 1372 wrote to memory of 1692 1372 plbR70Bn37.exe 87 PID 1372 wrote to memory of 1692 1372 plbR70Bn37.exe 87 PID 1372 wrote to memory of 1692 1372 plbR70Bn37.exe 87 PID 1692 wrote to memory of 3940 1692 plMO94KF52.exe 89 PID 1692 wrote to memory of 3940 1692 plMO94KF52.exe 89 PID 1692 wrote to memory of 2252 1692 plMO94KF52.exe 97 PID 1692 wrote to memory of 2252 1692 plMO94KF52.exe 97 PID 1692 wrote to memory of 2252 1692 plMO94KF52.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe"C:\Users\Admin\AppData\Local\Temp\0acf18183ba6cd5b1953e2931c8c3fb9ba0b3bcf9dda90a02724bd3144dd2b4d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plFE21iN55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plFE21iN55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plWz48gN21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plWz48gN21.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plbR70Bn37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plbR70Bn37.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plMO94KF52.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plMO94KF52.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buwL50bA49.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buwL50bA49.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHC13pC40.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHC13pC40.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996KB
MD5946fc9aca7b928356ec2e78f241c76a5
SHA18ef731db779be719666ca3a522d35dd939213c57
SHA256d1eb6971b5be7dd29712512b49365d5f1f1e8f8017179b628ee959de41d188d2
SHA5124f1e89648408a2a521e9bee80f2c75e7e2f946d0cf89d540c6baac3801e337b13adf825610ee256b295016c442a57890b0d704e23297b0c7e0479a0b027e84f9
-
Filesize
892KB
MD5938a77e4e3207f943ec16a140a8075f8
SHA1a982d6f1e04fab2f2b5210e9ced02b4d69255218
SHA256a3ac077b2814b2869fab1c0f24addfeef476913c28331dd542375b0a3221927c
SHA51277c1b07f8828c03a3ac60bfa42e6fbb71b4b1893fb82de26e979db221ff41262360efeb3dd8d920e6d4e65c51fa2236dd0d753b96b008d79c983a07b5d5bb4ad
-
Filesize
666KB
MD522b9cc3f6f0a23a80cd828ed8e9e688c
SHA15363cd4bd7181508fb1699edcc0d79150c06f93d
SHA25647ffb3ae935405ac1921dea2517b7a2311f312ad236163357dd8cb4d6222c5a6
SHA5128fcbccd1de1a67b6e7175ab6c6288d128733c490863fa6583a728f8f4368c9636f62eb2a2acd65523a2e3fc147eb77df8cd1230b0bc6f45007291655f7ec4ff9
-
Filesize
391KB
MD512d52964c6dc04439e528de6519333ff
SHA1f7c8687bb39f12097902df899544976e395e8f29
SHA256ed8230fdd7c7355221ca61af34f36dda6f31e052064bd381b1057560cc2b59f2
SHA512515820be8a44f6b1516bd6846b62e7c74bc01f88237db56ce70bb3a29c78ef8018b2da7b7712887d171076ab28ba92fab33b2fa0ceaeaaed1c23c9f938c5721a
-
Filesize
11KB
MD5b2faf09c34bf68c65658079ec016f47b
SHA16d4b1a4e4c024bbd34bf270d45d0c5dfb5158968
SHA256b79b391b8381cedf87b30d56bfd915f47d1679df7778fbd74e464686db739657
SHA51272d59d1768633c1c32d7ffd1776c6f675bd434728e06731af6df35b0a68a2f836811d4087fbd5bb0950f87d5186fefcd45bf2ec1486b9febc1c980ea9242ea7e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e