Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe
Resource
win10v2004-20241007-en
General
-
Target
5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe
-
Size
550KB
-
MD5
e20e1fa097ce26e117e46cfd25be2562
-
SHA1
97b9b9c73a52461585976ce81fe8ef8f9f83b376
-
SHA256
5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78
-
SHA512
d34e4fcee1399f99dad225ddb9e33d6bf1c44f1c8151c80aba6791b0ff26079e871d8dd14e507e6e56e5cb42630df5f61c10f80fbab62f890cb267bc051bc995
-
SSDEEP
12288:5Mr/y90RhTAO6b4aDTNmiWxwpCayBukIb+tpAUA3TIl/zP/:2yKTb6E+TUidCNMkIVUA3SP/
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c99-12.dat healer behavioral1/memory/5088-15-0x0000000000820000-0x000000000082A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw14kt75nN72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw14kt75nN72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw14kt75nN72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw14kt75nN72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw14kt75nN72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw14kt75nN72.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3780-22-0x0000000004CF0000-0x0000000004D36000-memory.dmp family_redline behavioral1/memory/3780-24-0x00000000071D0000-0x0000000007214000-memory.dmp family_redline behavioral1/memory/3780-34-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-28-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-26-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-25-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-48-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-89-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-86-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-84-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-82-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-78-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-76-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-74-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-72-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-71-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-68-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-66-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-65-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-62-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-60-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-59-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-56-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-54-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-53-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-50-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-46-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-44-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-42-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-40-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-38-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-36-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-32-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-30-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline behavioral1/memory/3780-80-0x00000000071D0000-0x000000000720E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4860 vYg0109XG.exe 5088 sw14kt75nN72.exe 3780 tlW89Zd54.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw14kt75nN72.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vYg0109XG.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2260 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vYg0109XG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlW89Zd54.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5088 sw14kt75nN72.exe 5088 sw14kt75nN72.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5088 sw14kt75nN72.exe Token: SeDebugPrivilege 3780 tlW89Zd54.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4860 4908 5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe 83 PID 4908 wrote to memory of 4860 4908 5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe 83 PID 4908 wrote to memory of 4860 4908 5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe 83 PID 4860 wrote to memory of 5088 4860 vYg0109XG.exe 85 PID 4860 wrote to memory of 5088 4860 vYg0109XG.exe 85 PID 4860 wrote to memory of 3780 4860 vYg0109XG.exe 95 PID 4860 wrote to memory of 3780 4860 vYg0109XG.exe 95 PID 4860 wrote to memory of 3780 4860 vYg0109XG.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe"C:\Users\Admin\AppData\Local\Temp\5bfe8c0b1165728138b514dc6a632e44e99eee129155781d9ca75de5f0193d78.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYg0109XG.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYg0109XG.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14kt75nN72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14kt75nN72.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlW89Zd54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tlW89Zd54.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD54cbd1dd2ca6fdf1c6259d2371221b9b4
SHA168847e0fb6377631f0ffa7da6de2d8adf085ca7e
SHA256ac93cc230f4bd5d026ea773eae7fd99ef65d4f3f2851cf8bfa499ef0e285f9d7
SHA512ad20928173e45b56afb5a141bf7c8f159f8b47702509fe080e614037235b5d72f26c318c03d13cef7bd9f0d30381d90cf703dbf189f4a1c1ccb04d9c82a338d8
-
Filesize
12KB
MD50b20e745695a9617add91a7fddb02e2f
SHA1bf1eec94f695d6cd34eb690e610eeb7dfd05731c
SHA256dd9c25ae5f6057483501ef0661864759541ae332cd4782450040fed537e242cd
SHA512a8058fe6d3d7038c5ac2a607877e9d5a5c3057df27d7e453b6b21ed4de4ad59aa32abb0fa5209f78317dfd24b0b43a9ffb32e01210fa5e19c23245f75b20f897
-
Filesize
381KB
MD54662b9b6434d05f758ed7c02d2523e12
SHA1e829ac10779358a8ca4d1baaca5bbb306b93355f
SHA256183e845988632d8990fd81690172e5ac410b3f9ca03f1f8df71d8e79b8278b3b
SHA51267b75afdcb37f56552a51242ea6121ed075c027e6e28c35dbcbf20ad22377154b90089a56055515cff02cf5329e9db67729343ae40bad3758b6f15dcd9341c93