Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe
Resource
win10v2004-20241007-en
General
-
Target
1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe
-
Size
1.1MB
-
MD5
8bc18fd4d92f8303f91e9f240535eca3
-
SHA1
dd5cec9ef0768e52c22efa48685df6ebc3e72940
-
SHA256
1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d
-
SHA512
97a28d13f944f857b2c3350daff4c12a736047b393ffb6e7f1107564d0f20995df8d30c657ce8a19cf72a650ee48111c7f81e2e13193acbda6ed0ef510ba4d42
-
SSDEEP
24576:6yYuz9c7XroDXOlDtAPV9yI8vUJvznZgD:BLooDOPAdUItZ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca1-34.dat healer behavioral1/memory/2556-35-0x0000000000B80000-0x0000000000B8A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bugu27jw66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bugu27jw66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bugu27jw66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bugu27jw66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bugu27jw66.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bugu27jw66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1976-41-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/1976-43-0x0000000002720000-0x0000000002764000-memory.dmp family_redline behavioral1/memory/1976-57-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-55-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-107-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-105-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-103-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-101-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-97-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-95-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-93-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-90-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-87-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-85-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-83-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-79-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-77-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-75-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-73-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-71-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-69-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-67-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-65-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-63-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-61-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-53-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-52-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-49-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-47-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-46-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-99-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-91-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-81-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-59-0x0000000002720000-0x000000000275E000-memory.dmp family_redline behavioral1/memory/1976-44-0x0000000002720000-0x000000000275E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3440 plqr62uO04.exe 3652 pljb12zw80.exe 4084 plaK49nV23.exe 5084 plvm32Km87.exe 2556 bugu27jw66.exe 1976 caQs66EQ27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bugu27jw66.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plqr62uO04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pljb12zw80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plaK49nV23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plvm32Km87.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caQs66EQ27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plqr62uO04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pljb12zw80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plaK49nV23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plvm32Km87.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 bugu27jw66.exe 2556 bugu27jw66.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2556 bugu27jw66.exe Token: SeDebugPrivilege 1976 caQs66EQ27.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3440 2888 1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe 84 PID 2888 wrote to memory of 3440 2888 1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe 84 PID 2888 wrote to memory of 3440 2888 1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe 84 PID 3440 wrote to memory of 3652 3440 plqr62uO04.exe 85 PID 3440 wrote to memory of 3652 3440 plqr62uO04.exe 85 PID 3440 wrote to memory of 3652 3440 plqr62uO04.exe 85 PID 3652 wrote to memory of 4084 3652 pljb12zw80.exe 87 PID 3652 wrote to memory of 4084 3652 pljb12zw80.exe 87 PID 3652 wrote to memory of 4084 3652 pljb12zw80.exe 87 PID 4084 wrote to memory of 5084 4084 plaK49nV23.exe 89 PID 4084 wrote to memory of 5084 4084 plaK49nV23.exe 89 PID 4084 wrote to memory of 5084 4084 plaK49nV23.exe 89 PID 5084 wrote to memory of 2556 5084 plvm32Km87.exe 90 PID 5084 wrote to memory of 2556 5084 plvm32Km87.exe 90 PID 5084 wrote to memory of 1976 5084 plvm32Km87.exe 97 PID 5084 wrote to memory of 1976 5084 plvm32Km87.exe 97 PID 5084 wrote to memory of 1976 5084 plvm32Km87.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe"C:\Users\Admin\AppData\Local\Temp\1917bd57641f9df5c9f3a1ba47818ebad458c90c2f182201e356c3fb1219dc6d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqr62uO04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plqr62uO04.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pljb12zw80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pljb12zw80.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plaK49nV23.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plaK49nV23.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plvm32Km87.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plvm32Km87.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugu27jw66.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bugu27jw66.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caQs66EQ27.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caQs66EQ27.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5cad738986fa1a4ddbe719c3b18bc2396
SHA11031f89f32d48b74bdcd1d20ec517843205d376a
SHA256039a2cdaa8ede9b701825d5021e6a9783aa9bc24576f9cb67bfef60beed85419
SHA5124663284caa97178450686730e77ed3cc5e7ff127f559f9630e5518e930aa12be746bdcd2cd33a9ec28f2c5144261c88f16ac50ae6c99d39af446ec6e0d337c01
-
Filesize
896KB
MD5831589467a8948c5213665f810cdf875
SHA1ed17d9bdf7598b4772ec83767ea5f385f5968cd1
SHA25696c8985077c306dd196d6aa2630c0cae08cc4adf23df25fc4ef1c6fb30ea9f23
SHA512ed8c0dfbc5db9708fe27b425dec586df65cdc5b0b3b84facf0f6761b21f2f65838f5750566902b41feb6aadb4e60eeb39f179879f9bd357eca2f367a34aac7ab
-
Filesize
669KB
MD50d5e51624222e8a18d60ce506a257213
SHA1a2c5019f7dec2e12b599e65d3598d7caf4504852
SHA25643e66d15d7155bee468a41687f7192d59ab5937ad342629b01d2b7376e4c7ebe
SHA512956f8cf6b83e3b6b099c0ce5ae9e172ee376ba21ae813f8059c523339233761106d42d5d7d67a057de4e032005dcc84e11ddb902d89c889c02a176850b5f7273
-
Filesize
393KB
MD5585ddf0fc78c2187a534bc407638a324
SHA1d4d865896160011b9255b975da1bc00acc8f7409
SHA256a924c3347920b0d98564ec2fbdfd08d3dc786f4c2fd6747cad2360dfadb504b2
SHA51280b8b71ac70595b6b9170032850785404b7495a00e1fd99e50ee364231f8c52c65e16b3a5834d0c7df0a8788d01da2206443447f3a27b79da55dfb321513f1ed
-
Filesize
12KB
MD50236a848d421300bffcb01349f32451d
SHA1e1614604936f0cfa881dc19c13ac98409697fa35
SHA25619fcc02856e1156730a9afcf7ff547ed941f85f9c2334f3f57bc2f14008881e5
SHA5126949c8f5b323fdb727f3dcb9612ecfd3b8f0f920fe098c50cb1c2a4d7b04f7c03f3abd14f5f6dad241b5b17b0bc938d9690c2789a1ffb8930bb1d9265585095d
-
Filesize
304KB
MD5e8a74f8947be8861da483f9a1b725bea
SHA1c9485cc022bb2ee5eb15bc98e1aa5330b1b5c09a
SHA256b27c4b8cc67abed8e257f5b43a656dbfafea50833d2aae5b7fe545ac82d74727
SHA5124ac48c039d81d9b6f5dd9cd4700855bc27efec45bb167fbf0268ec56c238138865a9d9b9575b2e71f2ab204f29da0daff1e78f5ac12cb54d0383766b7c82e2e8