Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe
Resource
win10v2004-20241007-en
General
-
Target
6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe
-
Size
561KB
-
MD5
8d1309c95493cf210b076511ae1a6044
-
SHA1
c162a69bde50871d39e4fd72894294e9b2d0e5f7
-
SHA256
6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42
-
SHA512
303529b3c8016e737ea941d78de728b11eb516bf097c06d897aa047291023af9533c323fd25f7a9e41199c0e8249b943e8587be838c4b552bf9bb1f7dccb707d
-
SSDEEP
12288:WMriy90RhDgaCpiJHFJVGKT/UK+aqd+F8a:gyuqeFJKIU+F8a
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb4-12.dat healer behavioral1/memory/840-15-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf77kf03Ty61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf77kf03Ty61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf77kf03Ty61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf77kf03Ty61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf77kf03Ty61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf77kf03Ty61.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3628-22-0x0000000004AC0000-0x0000000004B06000-memory.dmp family_redline behavioral1/memory/3628-24-0x0000000004D70000-0x0000000004DB4000-memory.dmp family_redline behavioral1/memory/3628-25-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-60-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-68-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-88-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-86-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-84-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-82-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-80-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-78-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-74-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-72-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-70-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-66-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-64-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-62-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-58-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-56-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-54-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-52-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-50-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-48-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-46-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-44-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-42-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-40-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-38-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-36-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-34-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-32-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-30-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-76-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-28-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3628-26-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4816 vhbF0343mK.exe 840 sf77kf03Ty61.exe 3628 tf52zi89WF46.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf77kf03Ty61.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhbF0343mK.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3920 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhbF0343mK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf52zi89WF46.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 840 sf77kf03Ty61.exe 840 sf77kf03Ty61.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 840 sf77kf03Ty61.exe Token: SeDebugPrivilege 3628 tf52zi89WF46.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4816 4480 6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe 83 PID 4480 wrote to memory of 4816 4480 6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe 83 PID 4480 wrote to memory of 4816 4480 6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe 83 PID 4816 wrote to memory of 840 4816 vhbF0343mK.exe 84 PID 4816 wrote to memory of 840 4816 vhbF0343mK.exe 84 PID 4816 wrote to memory of 3628 4816 vhbF0343mK.exe 95 PID 4816 wrote to memory of 3628 4816 vhbF0343mK.exe 95 PID 4816 wrote to memory of 3628 4816 vhbF0343mK.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe"C:\Users\Admin\AppData\Local\Temp\6ac45f957b1f8e6803b515e730565dea300eda8840bc2fa089a708651e4d3b42.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhbF0343mK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhbF0343mK.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77kf03Ty61.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf77kf03Ty61.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf52zi89WF46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf52zi89WF46.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5551b9ad42de0f55355ee086c11528109
SHA12ea83fb2446af80fc16283b1a403b029e05c10d1
SHA256a81ced0b5482ee29bec759bd20fd91579016887c725b0e6f954af2074302ebf2
SHA51229f874fafc33d0f42561916e6c5e2798d667cab1e7546bf39a9a722bbf6cab738129f86fe7befb0169a9467b624da496a17e9174bc9c8333fd2f49fe6a59485a
-
Filesize
11KB
MD5e8ed1f81397f5f52efbbeb3d4e4c11a2
SHA1db8f98b1d64afa55ca3702a0aa99aee275121080
SHA25637f44c0ef6d51e0d14c1e542015bd61890e740e0867f6212b90a56452627355f
SHA51272af2dd2ca0169c85f430a0b0e3f0adc34e3bca50853a99564caa56a377005821b10bb6519c397dd5d08f6a835442fb9370d6d566508f8d256de4c470311b2d4
-
Filesize
416KB
MD59ce8c74a533c9909e622ad2c5700ca63
SHA1bcce3e38eaf3c3b741bad36507671231d94ef844
SHA256a41658d0c260a9fa32e4797a385856dcbcd11ec5afd2135cee0f69ee6a52576d
SHA51298491caf62c0bfd90a89e3172801096e12328a4ac379f99a6895db5d85eb70468ccede97678b46eceabdc419d1114f3da59b9e72d68847be2384c58169cb0e73