Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe
Resource
win10v2004-20241007-en
General
-
Target
02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe
-
Size
561KB
-
MD5
c0a33f777ca1d3a4bd5ccae1a8f30ef3
-
SHA1
31cbfdeb56114d3a1188e39653ddb396d3b99067
-
SHA256
02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3
-
SHA512
0714f34e634235e849443cc4e3faedd76a6f4297e6ec8d067824253327b2200c1d6d2af1ab870bd79ce286c86fb57e26968a622b0b60d520822e760b88519445
-
SSDEEP
12288:yMrwy90iHCyAvCYo565Bi715D4y9b9iXh6rQ6/I:GypiyCm65I715DL9b9Uh4QP
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b66-12.dat healer behavioral1/memory/4860-15-0x0000000000CE0000-0x0000000000CEA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf71Rn69il95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf71Rn69il95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf71Rn69il95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf71Rn69il95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf71Rn69il95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf71Rn69il95.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3248-22-0x0000000004D50000-0x0000000004D96000-memory.dmp family_redline behavioral1/memory/3248-24-0x0000000007340000-0x0000000007384000-memory.dmp family_redline behavioral1/memory/3248-84-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-88-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-86-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-82-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-80-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-78-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-76-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-75-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-72-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-70-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-69-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-66-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-64-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-63-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-60-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-58-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-56-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-54-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-52-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-50-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-48-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-46-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-44-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-40-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-38-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-36-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-34-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-32-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-42-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-30-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-28-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-26-0x0000000007340000-0x000000000737E000-memory.dmp family_redline behavioral1/memory/3248-25-0x0000000007340000-0x000000000737E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1576 vhSs7435mY.exe 4860 sf71Rn69il95.exe 3248 tf32mq12aS31.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf71Rn69il95.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhSs7435mY.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhSs7435mY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf32mq12aS31.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4860 sf71Rn69il95.exe 4860 sf71Rn69il95.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4860 sf71Rn69il95.exe Token: SeDebugPrivilege 3248 tf32mq12aS31.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 384 wrote to memory of 1576 384 02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe 83 PID 384 wrote to memory of 1576 384 02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe 83 PID 384 wrote to memory of 1576 384 02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe 83 PID 1576 wrote to memory of 4860 1576 vhSs7435mY.exe 84 PID 1576 wrote to memory of 4860 1576 vhSs7435mY.exe 84 PID 1576 wrote to memory of 3248 1576 vhSs7435mY.exe 95 PID 1576 wrote to memory of 3248 1576 vhSs7435mY.exe 95 PID 1576 wrote to memory of 3248 1576 vhSs7435mY.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe"C:\Users\Admin\AppData\Local\Temp\02808bf83418f79b1069efc2cb6d08b43a644324edde7b6b21844c96652feff3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSs7435mY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSs7435mY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf71Rn69il95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf71Rn69il95.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf32mq12aS31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf32mq12aS31.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD51d1a4d3ab3b160acb5e900b6cbb93050
SHA18ace785a049987da6a70a2e22f9a0f7780b2d037
SHA2568b2bf3d9795bef744716440204c886dfdbdd8862ec0910ac955c49781d09b6d7
SHA512d8872e3d8b0381e2a1b85216527ad387c8f4e611da5fabc638831f8b0ebec9714d24b7df82c08487d6a2770be7eda2a017ec8516895611e56cb50b0f951695f3
-
Filesize
11KB
MD5d212b2211164b92758273e4adbaec531
SHA18dd9e9b2e05cb83583ee50fddc4248a4e05915c0
SHA25654a8d5920f45830bc26e78548dd5de7887282cc91d3da0f54fb3826cad306111
SHA512976ead1194cb07bef15877dfcdcade11e1fc86a48f2a07ce552e999f5805ff2b1ebc6ca7614534f449214b7e467fd09b8bfd6dd2b89f2b9dc757dc82a5bd4d85
-
Filesize
416KB
MD53298bce398b0b8db15538825fc22ec70
SHA197382a7c1ec70bd6549554c69ae3a8b18daddc9c
SHA256c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd
SHA5124bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737