Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe
Resource
win10v2004-20241007-en
General
-
Target
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe
-
Size
1.4MB
-
MD5
53aa81febf2a02eacec433f578f405c5
-
SHA1
06293f2171bc4b11cdabdfc4589c7b0229683ef9
-
SHA256
156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f
-
SHA512
a355f6c20f0fa48de61795da00e59bef6dbbf3dfd481b596e59959e82d96f5905209e2da8fcec30f14dd14a91e17537d165581cf465456313f6b1183bb18cee0
-
SSDEEP
24576:ey4+wf0Lk/wz8MYL89D511xQy0REXbMNgFlTNcutRMbkNSllXfSOi:tBsHw8MF570EMNgPNcARMb3LaO
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c87-39.dat healer behavioral1/memory/1792-42-0x0000000000900000-0x000000000090A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iYC44TA23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iYC44TA23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iYC44TA23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iYC44TA23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iYC44TA23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iYC44TA23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4952-48-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/4952-50-0x0000000004D30000-0x0000000004D74000-memory.dmp family_redline behavioral1/memory/4952-74-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-72-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-114-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-112-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-108-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-106-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-104-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-102-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-100-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-96-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-94-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-92-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-90-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-88-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-84-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-82-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-80-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-78-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-76-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-70-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-68-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-66-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-64-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-60-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-58-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-56-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-110-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-98-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-86-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-62-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-54-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-52-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4952-51-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 7 IoCs
pid Process 1328 vmGN06pa30.exe 2756 vmqs86Qs87.exe 2096 vmhv64te00.exe 4972 vmky99Hu71.exe 2088 vmqa19AP55.exe 1792 iYC44TA23.exe 4952 kjj64Hh43.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iYC44TA23.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmGN06pa30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmqs86Qs87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmhv64te00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmky99Hu71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmqa19AP55.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmGN06pa30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmqs86Qs87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmhv64te00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmky99Hu71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmqa19AP55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjj64Hh43.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 iYC44TA23.exe 1792 iYC44TA23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1792 iYC44TA23.exe Token: SeDebugPrivilege 4952 kjj64Hh43.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1328 3308 156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe 83 PID 3308 wrote to memory of 1328 3308 156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe 83 PID 3308 wrote to memory of 1328 3308 156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe 83 PID 1328 wrote to memory of 2756 1328 vmGN06pa30.exe 85 PID 1328 wrote to memory of 2756 1328 vmGN06pa30.exe 85 PID 1328 wrote to memory of 2756 1328 vmGN06pa30.exe 85 PID 2756 wrote to memory of 2096 2756 vmqs86Qs87.exe 86 PID 2756 wrote to memory of 2096 2756 vmqs86Qs87.exe 86 PID 2756 wrote to memory of 2096 2756 vmqs86Qs87.exe 86 PID 2096 wrote to memory of 4972 2096 vmhv64te00.exe 88 PID 2096 wrote to memory of 4972 2096 vmhv64te00.exe 88 PID 2096 wrote to memory of 4972 2096 vmhv64te00.exe 88 PID 4972 wrote to memory of 2088 4972 vmky99Hu71.exe 89 PID 4972 wrote to memory of 2088 4972 vmky99Hu71.exe 89 PID 4972 wrote to memory of 2088 4972 vmky99Hu71.exe 89 PID 2088 wrote to memory of 1792 2088 vmqa19AP55.exe 90 PID 2088 wrote to memory of 1792 2088 vmqa19AP55.exe 90 PID 2088 wrote to memory of 4952 2088 vmqa19AP55.exe 96 PID 2088 wrote to memory of 4952 2088 vmqa19AP55.exe 96 PID 2088 wrote to memory of 4952 2088 vmqa19AP55.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe"C:\Users\Admin\AppData\Local\Temp\156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN06pa30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN06pa30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqs86Qs87.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqs86Qs87.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmhv64te00.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmhv64te00.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmky99Hu71.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmky99Hu71.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmqa19AP55.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmqa19AP55.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iYC44TA23.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iYC44TA23.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kjj64Hh43.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kjj64Hh43.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e756827cb637f452f22a0be2ee274740
SHA1dee27bdc76dc4f4d1fa70d546e5d4423366da15f
SHA2565d2b38d743702472b6531244f90d9992935d9e3c0052054210e401965ec26c38
SHA512bf29675b96206235488464bb1242d78adaa8746eee210fa9238fad60147dd95dabe53c8eebb9a5c3b6d648640deb15056c0d306d86007e9d51a30d90d7ff4972
-
Filesize
1.0MB
MD510945df9a07485518c67727b39a8082f
SHA18ddc658f3a5ce2c178ad969ed038cf5da299d1df
SHA25611c97de17381c9cecd1819174e0fdda9c6bfcd813b8c43e1221d2156210ee275
SHA5125210b959e502bd21282e417cbf17318b415d727b9f0d48d04e2a5236598676bcae429ff2c79d1e4f52489e1da7221043c0b61b0628f3958d50932886a4f4c2d0
-
Filesize
969KB
MD527278c6ef8dc03f13eeb50186d9cf0fb
SHA150c4f98826ac58a122bad7112bc14a8122e6e7e8
SHA256b452f126d05fe759bcf8377cba18f8a058aed230a9fb90898059a78334a800d7
SHA512098a81660f0870e153f0a84df65b5cfff5a010752fdfb672acae9c2dbf297c5cfaf774597cd8db38800818979e1a9a9b4192e72a21d6cb1dfe883dcef7c863b4
-
Filesize
689KB
MD5938cb61fa94ab199a5e1f1df146241a2
SHA1dd33ca022b612a617f0652c9a9e19da156a0c577
SHA25633dbcd31e7a25b927eeec2c43b5c4a0a3c16f75c8e636c3b63676c21d8e8b876
SHA512dc5dfd17aa6c321938aeff6d6238b4f08578e23e6fd3a4ea7a02fde656c79a0197cd492143f5e767a80f489c783d28c8d727d6243621ca04e13ddad6bdd1369c
-
Filesize
404KB
MD56bac600c54a683adb67331a6c169af17
SHA195de8b93497acc9d35d6ea6178a7291c0d417076
SHA2563a710e9366c934be71d7d5114d86ccbdb75679b959bb57bdd71dd8ce24b5bceb
SHA512d0676a5596c7bf7603594e88dcabb93f673710c82baaaa5d16e73255984ae8050157c7c53b0e8b8b9fa69085cff5165e092beaabef6a6cdef68cf159860bd5cb
-
Filesize
15KB
MD5acc23556c09597b1481c68f178b6a193
SHA1b934009fca742e9723c8f359f383a30a0f38527d
SHA25674f7aecb49a321ffad49d08ea486a6ab50e964d54e383edcc4954c9c9ce5fda1
SHA5123a2576090272a8d6d38ea50cdf789d55ad140f87a21db1efd8bf2d5e4fb023db0024d7e03015fac96811c08645c6471d3a8afbc7e0579c219f89fc3c08c7cd13
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4