Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe
Resource
win10v2004-20241007-en
General
-
Target
b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe
-
Size
548KB
-
MD5
e28c453cba40b0848177b4fae6899952
-
SHA1
e8ad9b42dda168bc2a982fe78134240f2fbffa7f
-
SHA256
b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61
-
SHA512
0bcf5f4867ced4a34dbda044c8893aca3e8cfddde992de20904a561e9490bb7663090e9f9d8c3acfd8a8d92b0c0f0cced468d41d2c3de514c188659a63cca25a
-
SSDEEP
12288:4Mrhy90+YfTgSdbPBfAYqjAqMCaWdmXLfgew6UrG:5yBgPNmrFk79UrG
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b77-12.dat healer behavioral1/memory/4504-15-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw69xO12ep63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw69xO12ep63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw69xO12ep63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw69xO12ep63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw69xO12ep63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw69xO12ep63.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1220-22-0x0000000004AA0000-0x0000000004AE6000-memory.dmp family_redline behavioral1/memory/1220-24-0x0000000004D80000-0x0000000004DC4000-memory.dmp family_redline behavioral1/memory/1220-84-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-60-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-48-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-88-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-86-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-82-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-80-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-78-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-77-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-74-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-72-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-70-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-68-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-66-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-64-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-62-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-58-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-56-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-54-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-52-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-50-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-46-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-44-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-42-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-41-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-38-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-36-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-34-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-32-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-30-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-28-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-26-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline behavioral1/memory/1220-25-0x0000000004D80000-0x0000000004DBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4736 vOe3629FW.exe 4504 sw69xO12ep63.exe 1220 tej30Tf31.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw69xO12ep63.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vOe3629FW.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vOe3629FW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tej30Tf31.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4504 sw69xO12ep63.exe 4504 sw69xO12ep63.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4504 sw69xO12ep63.exe Token: SeDebugPrivilege 1220 tej30Tf31.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4736 3800 b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe 83 PID 3800 wrote to memory of 4736 3800 b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe 83 PID 3800 wrote to memory of 4736 3800 b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe 83 PID 4736 wrote to memory of 4504 4736 vOe3629FW.exe 84 PID 4736 wrote to memory of 4504 4736 vOe3629FW.exe 84 PID 4736 wrote to memory of 1220 4736 vOe3629FW.exe 92 PID 4736 wrote to memory of 1220 4736 vOe3629FW.exe 92 PID 4736 wrote to memory of 1220 4736 vOe3629FW.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe"C:\Users\Admin\AppData\Local\Temp\b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vOe3629FW.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vOe3629FW.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw69xO12ep63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw69xO12ep63.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tej30Tf31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tej30Tf31.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD56a52a0845364f08e1f94433b22ac6112
SHA1e16965838eecf847ad3b64c7df6e005969e2b31d
SHA256b1ce3b37a6114e9611881952eddcdf2264618270e0c9041fe45e4b70415bcd9b
SHA512b665803a690d4fd41369084d57545c1a4fbba0d3d93efbfd1cbe6f0106ba96a58cff00aa276b241fd3a63900dddfaea779d3f5f1a1bde3bb230faab8c41df941
-
Filesize
15KB
MD550b7a7a971e4cd9c844954c12013894d
SHA1f1b51fc2770484eade0755b61314acb833f40e16
SHA2562d2a52d5a6c151989ab4c64fb4b90db3518a2756f3d893892cb9900516397338
SHA512cd68d6407a106bb158a98892b8339d85164a3e46a9290b864d47ec64b1881276dc2ec9bb7b5d14d45939a69886a7e3ec00a6298c2396192843b3c99077e53791
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd