Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe
Resource
win10v2004-20241007-en
General
-
Target
4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe
-
Size
560KB
-
MD5
dfe366e83e0734432ae0d34d4084bf2f
-
SHA1
eeb9fa9d7c608b2ff32f9e05aee51d7086010f76
-
SHA256
4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e
-
SHA512
48d8cad9d449bf8da02a408b14324fc00c4a9d05198b57d34a4bf9b83b94c244ed86956f72174d6f010d352f42b22c324a0f604fbf02f8a45391ccf96292e3cd
-
SSDEEP
12288:zMrNy90zV/haONjJzyKuWx8NDryqTd1u6yBx5rkE4Lh:uyEnNRyK7eJug1unBx5rkZt
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c21-12.dat healer behavioral1/memory/3652-15-0x0000000000BC0000-0x0000000000BCA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf27yF23Gd87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf27yF23Gd87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf27yF23Gd87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf27yF23Gd87.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf27yF23Gd87.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf27yF23Gd87.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4024-21-0x0000000004E20000-0x0000000004E66000-memory.dmp family_redline behavioral1/memory/4024-23-0x0000000004ED0000-0x0000000004F14000-memory.dmp family_redline behavioral1/memory/4024-29-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-27-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-25-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-24-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-37-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-87-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-85-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-83-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-81-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-79-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-75-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-73-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-71-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-69-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-67-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-65-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-63-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-61-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-59-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-57-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-53-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-51-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-47-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-46-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-43-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-41-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-39-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-35-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-33-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-31-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-77-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-55-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline behavioral1/memory/4024-49-0x0000000004ED0000-0x0000000004F0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1124 vhyJ7631rq.exe 3652 sf27yF23Gd87.exe 4024 tf28qU92WT74.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf27yF23Gd87.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhyJ7631rq.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1916 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhyJ7631rq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf28qU92WT74.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3652 sf27yF23Gd87.exe 3652 sf27yF23Gd87.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3652 sf27yF23Gd87.exe Token: SeDebugPrivilege 4024 tf28qU92WT74.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1124 3424 4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe 83 PID 3424 wrote to memory of 1124 3424 4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe 83 PID 3424 wrote to memory of 1124 3424 4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe 83 PID 1124 wrote to memory of 3652 1124 vhyJ7631rq.exe 84 PID 1124 wrote to memory of 3652 1124 vhyJ7631rq.exe 84 PID 1124 wrote to memory of 4024 1124 vhyJ7631rq.exe 96 PID 1124 wrote to memory of 4024 1124 vhyJ7631rq.exe 96 PID 1124 wrote to memory of 4024 1124 vhyJ7631rq.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe"C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD57c80fc48674f3dfff6bc05ad8a71d15b
SHA1d61a5800c2831deed711e5be8d3460bb7ff9afee
SHA256e4cacd065c73bf5c022b0b961f3777e069bfaa4187843e345b20010e06d1c604
SHA512bece4681615fb7a8ca132b7473feeea9e378cac734a35771ce6fcf5264e1f855793f0d03d59c253a5ee279c751eaca3c55aeab80595f3d4124ca44f205be00cc
-
Filesize
11KB
MD58d81e111cd05bea98c0b430e1cc3a382
SHA1485eeefc15c6dfc9f929cb92870a6bcd30979590
SHA256cd59155f0f491654a54dfd0abf0820f2baaab9f37dac537963a6902e37afbb6a
SHA512debaeb28a53cc19eccfdabc5c70c0315a4b4137d905c77b51023dfbfe474710fbf0a2ac0c7f9b44caa1fb6437610ad568edc893a281f548ccff56d2b86c865d8
-
Filesize
416KB
MD5197d8f3be31e2a0e255e510348dccf49
SHA1c55404597c3904b99ebb6eac727feeef78fda213
SHA256e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c
SHA512efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2