Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe
Resource
win10v2004-20241007-en
General
-
Target
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe
-
Size
1.1MB
-
MD5
ae931ffc22f5d1af5e7483e22ce7e974
-
SHA1
91a74cd8efd82f000dd81a5aa10d89a189d3affb
-
SHA256
d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8
-
SHA512
f38b1644ebc7c592f6eca226b970712679714858620be808a2bd523c463238740265f56283121c39b407e5f029e22c2eba5ef755bfae3b115d50ff5972c7a20d
-
SSDEEP
24576:DyHXwrfmp0sT9jY9xteh220t1yIzRVmEUc:WH8Hs9YdY220+IzREE
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-33.dat healer behavioral1/memory/1460-35-0x0000000000F50000-0x0000000000F5A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buOV76iH24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buOV76iH24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buOV76iH24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buOV76iH24.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buOV76iH24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buOV76iH24.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2148-41-0x00000000025E0000-0x0000000002626000-memory.dmp family_redline behavioral1/memory/2148-43-0x0000000004BE0000-0x0000000004C24000-memory.dmp family_redline behavioral1/memory/2148-59-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-69-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-107-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-103-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-101-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-99-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-97-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-93-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-91-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-89-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-87-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-85-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-83-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-79-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-77-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-75-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-73-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-67-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-65-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-63-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-61-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-57-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-55-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-53-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-51-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-49-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-105-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-95-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-81-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-71-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-47-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-45-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/2148-44-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1956 plIC97dt23.exe 1376 plUF68BS80.exe 4976 plZi58PF71.exe 412 plWS33Vb48.exe 1460 buOV76iH24.exe 2148 caWp53lX33.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buOV76iH24.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plZi58PF71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plWS33Vb48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plIC97dt23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plUF68BS80.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6140 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plIC97dt23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plUF68BS80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plZi58PF71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plWS33Vb48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caWp53lX33.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1460 buOV76iH24.exe 1460 buOV76iH24.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1460 buOV76iH24.exe Token: SeDebugPrivilege 2148 caWp53lX33.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1956 2884 d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe 83 PID 2884 wrote to memory of 1956 2884 d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe 83 PID 2884 wrote to memory of 1956 2884 d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe 83 PID 1956 wrote to memory of 1376 1956 plIC97dt23.exe 84 PID 1956 wrote to memory of 1376 1956 plIC97dt23.exe 84 PID 1956 wrote to memory of 1376 1956 plIC97dt23.exe 84 PID 1376 wrote to memory of 4976 1376 plUF68BS80.exe 85 PID 1376 wrote to memory of 4976 1376 plUF68BS80.exe 85 PID 1376 wrote to memory of 4976 1376 plUF68BS80.exe 85 PID 4976 wrote to memory of 412 4976 plZi58PF71.exe 88 PID 4976 wrote to memory of 412 4976 plZi58PF71.exe 88 PID 4976 wrote to memory of 412 4976 plZi58PF71.exe 88 PID 412 wrote to memory of 1460 412 plWS33Vb48.exe 89 PID 412 wrote to memory of 1460 412 plWS33Vb48.exe 89 PID 412 wrote to memory of 2148 412 plWS33Vb48.exe 98 PID 412 wrote to memory of 2148 412 plWS33Vb48.exe 98 PID 412 wrote to memory of 2148 412 plWS33Vb48.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe"C:\Users\Admin\AppData\Local\Temp\d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plIC97dt23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plIC97dt23.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUF68BS80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUF68BS80.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plZi58PF71.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plZi58PF71.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plWS33Vb48.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plWS33Vb48.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buOV76iH24.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buOV76iH24.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWp53lX33.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWp53lX33.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52c9bd590a819430d1b83a8c078d73278
SHA187c506b038cb5b0ea828491da8627a986ab28cdc
SHA256a9f8dea888083b9ea4ebba3c910bbf5b82761d357e36d1b40408cc2f889a73d0
SHA5127a6631102c5cb95033d236630e01310979fc4ce3f70b1e2fc470deb0a875c12033d3966a751a7733807a3f6a71f91d58e23919f0bfdef9e4d4b913f538e1f9b3
-
Filesize
936KB
MD5fbbe3d8fc8b9fc35ac801fdc171f57df
SHA1a4e5656b80828deade5c81c130af39d996aa109e
SHA256e1284660bc7ff1dc4abf807f7ca89d35b0fb31bbe961b93d14139a920901f373
SHA512b58e3a0daeb01c111b005efc6dcfe9a777b737e439b65954dbac99646e91c10c8eece764d3b32515560a056043052109f0dc09019a239f68ea6e8d3d980f723b
-
Filesize
667KB
MD5bf908bac68c6d3b1a720d4e65dd49c0f
SHA1def4ff20f6df958db4c9a971fdd4eb16c24b6c2c
SHA2568115f0b5f8ee3bd2255eb9c346b6146cc7e6c3672ecf88392a656e1ff3304757
SHA512e09bb338f085bccff706b6014c2126ed561e14b2a50e5385c33c6fcda77559eb95c7de72d09c9dcdbc8f5e38e888eb509d95858e1840edf2eec27d6f36019883
-
Filesize
391KB
MD5a0316ad2190c4b2650b492d7ea3eaac1
SHA17db2738200de48e7a443860db6d01ef03d046890
SHA25656848b9aba8f6a31fc280593c4aed4d7587e7ac9d0b21e61bf16a406b2befc07
SHA5124fc070de108f344b3f712e80a07b6fd126877d2e5b071f6490b5f5c672f58ff69445e7fd2e102df492141679381900488ca60b1189ffaa4f0d87ec806ecdea69
-
Filesize
17KB
MD5c107a7544d234a8885c1890c96c54fc6
SHA1d889167c2c6d5103493d44189ae0143452b6d504
SHA256d81950b5e1fc9fc9bc4b173bffcb6ba22cc6b94e34d928b4c5dd37378ed7ffb3
SHA51216e38e650f6257e085754a8c6a2eb387df718018e18bc40ac9fefa7527cb57cdd6b97ec28f563eaaaaf7e1838e9fd4b88ea091a1097336bab23129236f92761a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a