Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe
Resource
win10v2004-20241007-en
General
-
Target
112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe
-
Size
1.2MB
-
MD5
5ba58f88e971aeaa74356ed861020f70
-
SHA1
60fc11f3f90bb1362c4ae218813b5d5333f45790
-
SHA256
112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed
-
SHA512
1e09a8d721e30cdc716625732eb541fb22438a9307920ab5491cf6f682abd6c2e3c6aa4ac15d1bdb2bd4f062d2e9aed82b63cc245effccd4712742382d612d3a
-
SSDEEP
24576:0yF6IMWNz6KmLTvcIFREFO8W4MxAUNpWVQmn6Y7J:DFA4mhcIEO8W3AUNpWVQmnL
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6e-32.dat healer behavioral1/memory/3828-35-0x0000000000940000-0x000000000094A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" butE60TT27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" butE60TT27.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection butE60TT27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" butE60TT27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" butE60TT27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" butE60TT27.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5052-41-0x00000000071A0000-0x00000000071E6000-memory.dmp family_redline behavioral1/memory/5052-43-0x0000000007220000-0x0000000007264000-memory.dmp family_redline behavioral1/memory/5052-59-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-107-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-103-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-99-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-95-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-89-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-85-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-81-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-77-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-71-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-57-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-55-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-53-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-51-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-49-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-47-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-45-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-44-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-105-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-101-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-97-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-93-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-91-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-87-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-83-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-79-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-75-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-73-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-69-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-67-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-65-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-63-0x0000000007220000-0x000000000725E000-memory.dmp family_redline behavioral1/memory/5052-61-0x0000000007220000-0x000000000725E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 2472 plOc28Dz20.exe 548 plpW62Dk01.exe 3496 plyl54Lr34.exe 4008 plPi11hk82.exe 3828 butE60TT27.exe 5052 cafl01bh01.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" butE60TT27.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plOc28Dz20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plpW62Dk01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plyl54Lr34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plPi11hk82.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plpW62Dk01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plyl54Lr34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plPi11hk82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cafl01bh01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plOc28Dz20.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 butE60TT27.exe 3828 butE60TT27.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3828 butE60TT27.exe Token: SeDebugPrivilege 5052 cafl01bh01.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3960 wrote to memory of 2472 3960 112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe 84 PID 3960 wrote to memory of 2472 3960 112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe 84 PID 3960 wrote to memory of 2472 3960 112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe 84 PID 2472 wrote to memory of 548 2472 plOc28Dz20.exe 86 PID 2472 wrote to memory of 548 2472 plOc28Dz20.exe 86 PID 2472 wrote to memory of 548 2472 plOc28Dz20.exe 86 PID 548 wrote to memory of 3496 548 plpW62Dk01.exe 87 PID 548 wrote to memory of 3496 548 plpW62Dk01.exe 87 PID 548 wrote to memory of 3496 548 plpW62Dk01.exe 87 PID 3496 wrote to memory of 4008 3496 plyl54Lr34.exe 88 PID 3496 wrote to memory of 4008 3496 plyl54Lr34.exe 88 PID 3496 wrote to memory of 4008 3496 plyl54Lr34.exe 88 PID 4008 wrote to memory of 3828 4008 plPi11hk82.exe 89 PID 4008 wrote to memory of 3828 4008 plPi11hk82.exe 89 PID 4008 wrote to memory of 5052 4008 plPi11hk82.exe 96 PID 4008 wrote to memory of 5052 4008 plPi11hk82.exe 96 PID 4008 wrote to memory of 5052 4008 plPi11hk82.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe"C:\Users\Admin\AppData\Local\Temp\112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOc28Dz20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOc28Dz20.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plpW62Dk01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plpW62Dk01.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyl54Lr34.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyl54Lr34.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plPi11hk82.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plPi11hk82.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butE60TT27.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butE60TT27.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cafl01bh01.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cafl01bh01.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5038964ab68edecce24761a26e64f16e7
SHA1feca591f7b0e2da5250e7a8409771488543395b2
SHA256a6fa4932f95d29b668e37652c6037d686768e19634488cb6d759303bd44786a3
SHA5122490fac0ea4bfb88daefb19e5edf4105c2d43a24217376daa8fe385e54871cd43064f163595fb972726e16996ed28813759ee2f793b61b2dd2ba2e7262e66a8e
-
Filesize
968KB
MD5f8ee75f0e912fd17a2080799016f30b1
SHA1496c85577d85da41e06b0ea26a611dafe29b1562
SHA256eeca7a806d60cefc0fbb4bc7a0f8b8be313dd01777be4564a1a867206f93f45e
SHA5120cf732a79f3f514f6df46d5c703fe77d49300ba87f9590514e0293b5d3513c150d403dfe9daf022474179831376a071a0ccdc340c38edd6914b932a9459f76e2
-
Filesize
688KB
MD5af30dd400db1ecbc0e2b96c93d1006bf
SHA1b378212b3c337f28cb3bf8be392ca341fbbefa96
SHA256b20676abc4831d47054ae36c8d50a3bec7b28a3ddeb965bf7c670478b7fdbb07
SHA512a19a98abe7d174d0a5bb57af7a36c237d5c1463dd326379b78827d3f069352ad504350ba4a1a79563b49d994688d0a4cf4df54fa2480044061c615fd42d90cd1
-
Filesize
403KB
MD5fce71c75231026507bd696dad9520ed5
SHA1040f22883769fa029af52b6d26c9f4a619713c1d
SHA256ffef87e9c9f4f52a270764b415e9a6d4c20fc34c7f575828a0c07bdfe6e28830
SHA5124f723371343bfd0919a9720c7514261a874b794fcec8e325325a84ac99915d1def08c35f06359a542ce29a993e3eded7f095ef0fe7e3a6ebfdd95b4b390aa2dc
-
Filesize
15KB
MD561fade53c503e4f34734e184946d0d1b
SHA142ec3d18afa90ca5a92e81eac30bec43224f5538
SHA2567fa491ab038fd82ec3487194cd4291b17d006ad128ff544722d1fbeda093bbcb
SHA512bea2c5c7fe1568049688fc8e0aef2d340ea451f69bc3a6a2df16cd0f6ee5c404aa350164be2662e74ce820b4f934db57d0eb191bb2967dc17304f9f45296804a
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4