Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe
Resource
win10v2004-20241007-en
General
-
Target
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe
-
Size
536KB
-
MD5
7ed2030e9459b0782f70ca9c69a99fd7
-
SHA1
69c37bcbf5f6be3031a3b2364ddf7f546aaeb0b0
-
SHA256
ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c
-
SHA512
7d2ba4e27b5043735cbf9eacbd983fdb95fe445f641ba4b620f53da7637d6f690e0ad2834b4ff62a8bae09831df8a50903016834d6a54010d74d19004e213822
-
SSDEEP
12288:cMrSy90DKLkeHF0moupaPbFyhK884/9iCwSDJj/W60Cl:my3llXzspy48REuJj/Ws
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c68-12.dat healer behavioral1/memory/3184-15-0x0000000000A10000-0x0000000000A1A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw93uE27ul87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw93uE27ul87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw93uE27ul87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw93uE27ul87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw93uE27ul87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw93uE27ul87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2252-22-0x0000000002550000-0x0000000002596000-memory.dmp family_redline behavioral1/memory/2252-24-0x0000000005170000-0x00000000051B4000-memory.dmp family_redline behavioral1/memory/2252-86-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-88-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-84-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-82-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-80-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-78-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-76-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-74-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-72-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-70-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-66-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-64-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-62-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-61-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-58-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-56-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-54-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-52-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-50-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-48-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-46-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-42-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-40-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-38-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-36-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-34-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-32-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-30-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-68-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-44-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-28-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-26-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/2252-25-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4564 vZg7657ov.exe 3184 sw93uE27ul87.exe 2252 teY12vR92.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw93uE27ul87.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vZg7657ov.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teY12vR92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vZg7657ov.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3184 sw93uE27ul87.exe 3184 sw93uE27ul87.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3184 sw93uE27ul87.exe Token: SeDebugPrivilege 2252 teY12vR92.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4564 3552 ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe 84 PID 3552 wrote to memory of 4564 3552 ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe 84 PID 3552 wrote to memory of 4564 3552 ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe 84 PID 4564 wrote to memory of 3184 4564 vZg7657ov.exe 86 PID 4564 wrote to memory of 3184 4564 vZg7657ov.exe 86 PID 4564 wrote to memory of 2252 4564 vZg7657ov.exe 95 PID 4564 wrote to memory of 2252 4564 vZg7657ov.exe 95 PID 4564 wrote to memory of 2252 4564 vZg7657ov.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe"C:\Users\Admin\AppData\Local\Temp\ad25a5c0c48b0b434c921f5a2d940e239df646edcc6267327e09ea916d2b350c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZg7657ov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vZg7657ov.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw93uE27ul87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw93uE27ul87.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\teY12vR92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\teY12vR92.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD53f24f26d5ed92af4660ea5916869d4bc
SHA1bb1d4cfd1b14d7b3480c062829231bdf0257fd9e
SHA25669e3d319ae7497b7b70877182ec3d9cd191cbe57f00411008e4e174c621655db
SHA512f378a9dc2b5c4a5dbe9cfb0ec8dc3f7f091600f8719b08956b329068baa8f713d24ccaac1434190e1d1b7cd3fffd303fcdb063402d3ef9953ca84e008b2b92e5
-
Filesize
17KB
MD53b0c701f2b024e0ba354f524fbab7c70
SHA138d60b15ddd4c68b144d05ddbd43cfbe58f7a8bb
SHA256c1619c02bb399465b8eab06bfcf8719d2a88c4dc8b1f90e746266110d30c8c56
SHA5128f14679bcc84803b15478fb85d03973d3489a907adc2b4d9fbef177029f1c49b910c4a190c9bb3871d45e9d4400052c368c5f36c62069b1c0b583365af555369
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a