Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe
Resource
win10v2004-20241007-en
General
-
Target
fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe
-
Size
560KB
-
MD5
e4df728bd78378a279e5071a0e4dcd54
-
SHA1
0341bc0f984ed934982e1d24f395b0f91495ebd2
-
SHA256
fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190
-
SHA512
b86c9629305c3f3e77f9111e938f4ec4b4d6dd03632231d98a10dcb6dc4d2ac7c32c15af239f354b656646dc09ad67ba6c7544631987041bbd9f2ef0b8693e36
-
SSDEEP
12288:/Mriy902PRmXN25sKXItBPPZcBd8uptvHCG5XOwldm:NyfPvswWBHKGuptvHhXOCI
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b77-12.dat healer behavioral1/memory/1944-15-0x0000000000D90000-0x0000000000D9A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf41ko64Aq57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf41ko64Aq57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf41ko64Aq57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf41ko64Aq57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf41ko64Aq57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf41ko64Aq57.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3568-22-0x0000000007280000-0x00000000072C6000-memory.dmp family_redline behavioral1/memory/3568-24-0x0000000007300000-0x0000000007344000-memory.dmp family_redline behavioral1/memory/3568-62-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-74-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-88-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-86-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-84-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-82-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-78-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-76-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-72-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-70-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-68-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-66-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-64-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-60-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-58-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-56-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-54-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-52-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-50-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-46-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-45-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-42-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-40-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-38-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-36-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-34-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-33-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-30-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-80-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-48-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-28-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-26-0x0000000007300000-0x000000000733E000-memory.dmp family_redline behavioral1/memory/3568-25-0x0000000007300000-0x000000000733E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3344 vhgI2517Sk.exe 1944 sf41ko64Aq57.exe 3568 tf34wv38iq07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf41ko64Aq57.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhgI2517Sk.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhgI2517Sk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf34wv38iq07.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 sf41ko64Aq57.exe 1944 sf41ko64Aq57.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1944 sf41ko64Aq57.exe Token: SeDebugPrivilege 3568 tf34wv38iq07.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3344 3488 fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe 83 PID 3488 wrote to memory of 3344 3488 fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe 83 PID 3488 wrote to memory of 3344 3488 fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe 83 PID 3344 wrote to memory of 1944 3344 vhgI2517Sk.exe 84 PID 3344 wrote to memory of 1944 3344 vhgI2517Sk.exe 84 PID 3344 wrote to memory of 3568 3344 vhgI2517Sk.exe 94 PID 3344 wrote to memory of 3568 3344 vhgI2517Sk.exe 94 PID 3344 wrote to memory of 3568 3344 vhgI2517Sk.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe"C:\Users\Admin\AppData\Local\Temp\fa0fe11aa79e23050d2c0b66418962ca8c5982f4be96accca73efb54a4209190.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgI2517Sk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhgI2517Sk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf41ko64Aq57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf41ko64Aq57.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf34wv38iq07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf34wv38iq07.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD54ecdfed2b7a3d7ece15bbcbbea819e30
SHA170952757371e7fd15d79ec72e9e30f1302de57ef
SHA2568efa864cc42388b7469aa4dc5f9966f5162ebd1216d01de7144ba4922b2897bc
SHA5120f5134208b86ae177afad2865c667f4c96f27be4233f648d717fb3b0dc07e885c911bf31a40e8ee675fd8d472bd926e44edcc3b55c2841e3506e10d6bbf0151f
-
Filesize
11KB
MD5525f2877025f4601fad910e03a03123a
SHA19ac0f2f990da8d7752a298112df16ba66086ac66
SHA256189a6717d550109af9558a5e98fda7a1447cb446b0c61deaf6c27dd23c03a67a
SHA5125feccd1a28267f78ae46f2c59c64e499220080650e95b513ca6cc5cadf3f78b0b268ed39a648a0fbca77ac7b31c56bb0e6a92c6bac0a49973a88d32d357ebf0d
-
Filesize
415KB
MD579645f4c4f6de9b74ca0120b7a2ff217
SHA1e093a94b5415be8ebbc90a52807b811eb339823e
SHA256cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a
SHA51213ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0