Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe
Resource
win10v2004-20241007-en
General
-
Target
f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe
-
Size
1.1MB
-
MD5
b3694dcd2d3561f79554fe9e42ffb6bb
-
SHA1
34b4b0deed8f40aa8de9f4ae94e04598c0c6e327
-
SHA256
f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987
-
SHA512
cf1a89830b7a3535db50a9b4a59ecee5b39289740d9f80c412faad29e98b027aaeaa8a4f1970305e790ad1df4247761c23d5ebe459c73d05e932a371278eda09
-
SSDEEP
24576:oyf4Ne/v6En3hEGFAMpQavK0bM+Ky1YGYWLUJ8mW:vf4G6En3hEGFtVvowUOm
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb3-33.dat healer behavioral1/memory/100-35-0x0000000000280000-0x000000000028A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buar41yG63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buar41yG63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buar41yG63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buar41yG63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buar41yG63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buar41yG63.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3424-41-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/3424-43-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/3424-49-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-59-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-107-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-105-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-103-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-101-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-97-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-95-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-93-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-91-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-89-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-87-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-85-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-81-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-79-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-77-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-75-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-73-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-71-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-69-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-65-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-63-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-61-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-57-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-55-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-53-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-51-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-99-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-83-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-67-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-47-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-45-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/3424-44-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 4484 plTa04BK00.exe 3532 plRS16Zf18.exe 1620 pluB89GR30.exe 2076 pliM53JN53.exe 100 buar41yG63.exe 3424 caps01on88.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buar41yG63.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plTa04BK00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plRS16Zf18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pluB89GR30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" pliM53JN53.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plTa04BK00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plRS16Zf18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pluB89GR30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pliM53JN53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caps01on88.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 100 buar41yG63.exe 100 buar41yG63.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 100 buar41yG63.exe Token: SeDebugPrivilege 3424 caps01on88.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4484 3488 f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe 83 PID 3488 wrote to memory of 4484 3488 f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe 83 PID 3488 wrote to memory of 4484 3488 f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe 83 PID 4484 wrote to memory of 3532 4484 plTa04BK00.exe 86 PID 4484 wrote to memory of 3532 4484 plTa04BK00.exe 86 PID 4484 wrote to memory of 3532 4484 plTa04BK00.exe 86 PID 3532 wrote to memory of 1620 3532 plRS16Zf18.exe 87 PID 3532 wrote to memory of 1620 3532 plRS16Zf18.exe 87 PID 3532 wrote to memory of 1620 3532 plRS16Zf18.exe 87 PID 1620 wrote to memory of 2076 1620 pluB89GR30.exe 88 PID 1620 wrote to memory of 2076 1620 pluB89GR30.exe 88 PID 1620 wrote to memory of 2076 1620 pluB89GR30.exe 88 PID 2076 wrote to memory of 100 2076 pliM53JN53.exe 89 PID 2076 wrote to memory of 100 2076 pliM53JN53.exe 89 PID 2076 wrote to memory of 3424 2076 pliM53JN53.exe 96 PID 2076 wrote to memory of 3424 2076 pliM53JN53.exe 96 PID 2076 wrote to memory of 3424 2076 pliM53JN53.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe"C:\Users\Admin\AppData\Local\Temp\f00d27bfc6175c82f1c9f49a2b3fdd449cb891ca3d7721afb9baf9cffe865987.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plTa04BK00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plTa04BK00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plRS16Zf18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plRS16Zf18.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pluB89GR30.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pluB89GR30.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pliM53JN53.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pliM53JN53.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buar41yG63.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buar41yG63.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caps01on88.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caps01on88.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
989KB
MD5290261e7b1ed89a8bc86380d23e24fa9
SHA14b6fefb0ad6ceba41305a3c06386bd7f3b80c69b
SHA2563614111bbfd82deac10ed4d76e9449532cce7700e44a7554d810a0256966c11e
SHA512312bc88abb8c650fd5d7a75e4cd52444d308d2c9a999e36130611ad4f133972b0551facecc7aad8de51ac0fda98c6bd4a7f091fe3007e2905ab572e7377b27b2
-
Filesize
893KB
MD53b01461e8bfdcef6222e56669c7ab038
SHA146b5ea0d58ccc3d4d3116fa8505bcf7c7237db7d
SHA256b4e65edd7b91e58c69f534cfd7eb25f8b13291d32d3d8c1f7e8b0598d329d26b
SHA51294a6609391f10e0d05169eadd696486cb36c796f3cdc574d36f67ddf738e6debb9690ba03a2ef77abd2e1d21c68aa08b9fa74b8e0705a1fceda9562c6b70f6f8
-
Filesize
667KB
MD534c8639ebc0540015078f7c5d2517dfc
SHA18d9f4fb3bc4b609af3a4d2f3f5210b9c7f7b220d
SHA25648dacb3e10ceeaaa54ee08622425260236c9eb1207ffde744f39b53ddc13c65e
SHA512e705cb4cdec36574e6d12b757e491e97ed0d00d89b43adac9cda1f07c1c4c4d517d7aa22cf76a33e2399df08caa02106bd668081fb3bfc22506babc5a8dcc7d8
-
Filesize
391KB
MD53a0ed6e8745f730b81b7cc5ef0f8d355
SHA19e52c22ef294a519628507e559b86fea8f1970f2
SHA256e4b009d65ca23c68edac42634b21d62f7b551f422d05c27c20ff086539c15f7e
SHA5124c1de67073aec1b011deef1bbabc847068fb58fc7de9d3080d90f15a9493e22f4b23b1b7b6a3598a0a1f8094a653724a6c5ec7199cb6d2484b28d1794d7b9398
-
Filesize
16KB
MD591820a72abe90a8d40566738fce275f6
SHA155b1c788f255fb27a9976e81d0c53840a08f2e48
SHA2568d5689051b9a99e28dd6330e5c322a51f96e1aa2bceed4cd51a30b30ba87df8f
SHA5128e89f104875fb0374563dd9ffad7cc8e0103cf602053ace4885a06ea936a5760858d8c9e110c9716d1b5defd30f8b7d3ef883993808fcd2599f724b97fa21384
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715