Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe
Resource
win10v2004-20241007-en
General
-
Target
f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe
-
Size
535KB
-
MD5
09808de3efaa4891f59727d08929c27a
-
SHA1
3e232c38f57f3134f2bb5ba07670bda8f8f4a230
-
SHA256
f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8
-
SHA512
35c2d6f2672b961f4377e75b32922eb3fa53277036ef5efff388254e8262287cea835d01e0086e7a46df308e885d76953ddd7bfb1ca1914e7b41d4f697ba4b95
-
SSDEEP
12288:aMr3y9040QC2afDfXEeSkSKgKpP7TwEpHry7DqY:Zy7afDPQgrpPQ8I
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9d-13.dat healer behavioral1/memory/1456-15-0x0000000000970000-0x000000000097A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw48ks95AT80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw48ks95AT80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw48ks95AT80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw48ks95AT80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw48ks95AT80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw48ks95AT80.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4784-22-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/4784-24-0x0000000004BC0000-0x0000000004C04000-memory.dmp family_redline behavioral1/memory/4784-28-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-40-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-88-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-86-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-84-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-82-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-80-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-78-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-76-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-74-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-72-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-70-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-68-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-66-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-64-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-60-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-58-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-57-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-54-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-52-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-50-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-48-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-46-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-44-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-42-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-38-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-36-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-34-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-32-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-30-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-62-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-26-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline behavioral1/memory/4784-25-0x0000000004BC0000-0x0000000004BFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2772 vlV1050tw.exe 1456 sw48ks95AT80.exe 4784 thy55zJ34.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw48ks95AT80.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vlV1050tw.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlV1050tw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thy55zJ34.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 sw48ks95AT80.exe 1456 sw48ks95AT80.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1456 sw48ks95AT80.exe Token: SeDebugPrivilege 4784 thy55zJ34.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2772 2028 f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe 83 PID 2028 wrote to memory of 2772 2028 f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe 83 PID 2028 wrote to memory of 2772 2028 f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe 83 PID 2772 wrote to memory of 1456 2772 vlV1050tw.exe 84 PID 2772 wrote to memory of 1456 2772 vlV1050tw.exe 84 PID 2772 wrote to memory of 4784 2772 vlV1050tw.exe 92 PID 2772 wrote to memory of 4784 2772 vlV1050tw.exe 92 PID 2772 wrote to memory of 4784 2772 vlV1050tw.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe"C:\Users\Admin\AppData\Local\Temp\f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlV1050tw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlV1050tw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw48ks95AT80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw48ks95AT80.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thy55zJ34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thy55zJ34.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5a121f67ce69af940986c17df427f3082
SHA1494b4d33f3f59e4b4617e1838624669f3b7a7775
SHA256792251703d2a7faa77c5840fd0adceef92414853545f8a08adfb7c79a79a3f61
SHA512813091f537c44fdc81bfec47fee02ec8ec22aea629364378a595eb4a6d01cd8b81b8844b7291657c771ccfe924ba38bb2430e634fdd23c9a55ec092a62db5b29
-
Filesize
11KB
MD584e0d5f7f225a60c1bfa614b4fd14bab
SHA12ceaa3f0d33e3eec0d4ed6e3924215e814098733
SHA256edf3bc0fe7ca86b560de85dbff70a90f7e3c343c6f3f00a9fa31d4a939262983
SHA5120cd05b6a7cce98529f6bee8488e029f6d93596ff1e2663377d40c15993cb353348737ac9b9aa6693e6837bd632c9751c7bf1cd7a99abf40980b34dad75cdfa7c
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d