Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe
Resource
win10v2004-20241007-en
General
-
Target
95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe
-
Size
538KB
-
MD5
04e7bcbb1c889f5c2fa777d080871aa2
-
SHA1
9f3e0492a592c73411c60c98b635e918a78eddde
-
SHA256
95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255
-
SHA512
40586b29be25862c3365c98b0dff11255c6e5d4f0d2182415ccde3d3eba6881cee0ea6c9d606ef31ad92f56e38cdabd3eb11d3eac4a4615306bdbf8f253f2e81
-
SSDEEP
12288:/Mroy90dR7PW8m2Umi4f1N2BaS8jPNuHRB/2KhE99Uq:ryYPW8dzTyaS4PNoRB/Y
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca3-12.dat healer behavioral1/memory/2304-15-0x0000000000280000-0x000000000028A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw16aM87Nk67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw16aM87Nk67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw16aM87Nk67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw16aM87Nk67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw16aM87Nk67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw16aM87Nk67.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2204-22-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/2204-24-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/2204-36-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-34-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-32-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-82-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-88-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-86-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-85-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-80-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-78-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-76-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-74-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-70-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-68-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-66-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-62-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-60-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-56-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-54-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-52-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-50-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-46-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-44-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-42-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-72-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-64-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-58-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-48-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-40-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-38-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-30-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-28-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-26-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2204-25-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 764 vkiH0538lx.exe 2304 sw16aM87Nk67.exe 2204 tkpt79YL85UM.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw16aM87Nk67.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkiH0538lx.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkiH0538lx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkpt79YL85UM.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2304 sw16aM87Nk67.exe 2304 sw16aM87Nk67.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2304 sw16aM87Nk67.exe Token: SeDebugPrivilege 2204 tkpt79YL85UM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3924 wrote to memory of 764 3924 95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe 84 PID 3924 wrote to memory of 764 3924 95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe 84 PID 3924 wrote to memory of 764 3924 95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe 84 PID 764 wrote to memory of 2304 764 vkiH0538lx.exe 85 PID 764 wrote to memory of 2304 764 vkiH0538lx.exe 85 PID 764 wrote to memory of 2204 764 vkiH0538lx.exe 96 PID 764 wrote to memory of 2204 764 vkiH0538lx.exe 96 PID 764 wrote to memory of 2204 764 vkiH0538lx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe"C:\Users\Admin\AppData\Local\Temp\95e3739b38501d3d7c1ae16bf19b2b204a1c163c375dd3daae9e0ed2ad782255.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkiH0538lx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkiH0538lx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw16aM87Nk67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw16aM87Nk67.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkpt79YL85UM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkpt79YL85UM.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5b6017908c6a4d3cfc579edcdbcdee711
SHA1eac05b07ec4a252369766443717c8367558ba4e2
SHA2567d3f315397f3feb9a842baa207d01a64b577979dae039835fde67edde82fe919
SHA5121d301ed4a26f4ff5ea8d4c4956b588ef2c8371c9fcc2b2dc51fe789adcbc0a5f57f57ba6e45a324e0cc41bf982187fa860cc5cb0f5a4fe6f78fd189dfd35a139
-
Filesize
18KB
MD50a64443d70f368eabc23a00054fce2c5
SHA18b90494aa65dc3fb64eea2a9126697a81e34318e
SHA25624202d6a891e20ee1b947e0e2dcb79eff7a7009bd3df164fda57da273ef4bde8
SHA51226ed855d63da595bb702dedc04cfe4f353e75f59453f3c00ce6b36932ef1b43eb7a584bf24f823161cc02bff0a2b2b9cae5b126d800882507226f1e5807c371d
-
Filesize
308KB
MD5c08ea92c1d03fb367226765e9271415b
SHA1a7446c05eb491cbaeb1d528f96b4d6ba70017c2a
SHA2565687174289cc28ecf2025e0aec313a18151361200f818a8e6d83123e4ad40388
SHA512a975c487c656bd35704a3a2da42c2cae28aa72c234295ffc4d4c87f2aa4f05889bc5bed1d6e41c4b5c7390808cc0fae7241577cbf538694eb0167de089400a1d