Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe
Resource
win10v2004-20241007-en
General
-
Target
1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe
-
Size
1.2MB
-
MD5
1ed6f0b555ae2699936479ebd191e607
-
SHA1
dc5dc3d32c7956237369d78b435cf210cdeeb220
-
SHA256
1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2
-
SHA512
53a513401536c05062d63a93ebaa468f5713e65bfb60125aa562aa62c6967f27da5e70058932f4308698e7dfea8e361407e8c1c8af50576dbd2283011d15a639
-
SSDEEP
24576:dyI5/EbN1yap4ORISJYoq2dNwIZwMhEJvUI3aDW:4g/EbN174OR8oBdJP+ZUI6
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c70-32.dat healer behavioral1/memory/3668-35-0x00000000003F0000-0x00000000003FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buGA49CR20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buGA49CR20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buGA49CR20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buGA49CR20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buGA49CR20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buGA49CR20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1360-41-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/1360-43-0x0000000004B60000-0x0000000004BA4000-memory.dmp family_redline behavioral1/memory/1360-91-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-105-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-103-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-101-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-99-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-98-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-95-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-93-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-89-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-87-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-85-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-83-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-81-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-79-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-75-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-73-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-71-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-69-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-67-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-63-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-61-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-59-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-57-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-55-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-107-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-77-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-65-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-53-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-51-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-49-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-47-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-45-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1360-44-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3508 plEQ38Eg99.exe 2976 plvX91Kw82.exe 3640 plsv36dc44.exe 2400 ploy87dU19.exe 3668 buGA49CR20.exe 1360 caRn70Om17.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buGA49CR20.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plEQ38Eg99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plvX91Kw82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plsv36dc44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ploy87dU19.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5984 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ploy87dU19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caRn70Om17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plEQ38Eg99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plvX91Kw82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plsv36dc44.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 buGA49CR20.exe 3668 buGA49CR20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3668 buGA49CR20.exe Token: SeDebugPrivilege 1360 caRn70Om17.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3508 2484 1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe 83 PID 2484 wrote to memory of 3508 2484 1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe 83 PID 2484 wrote to memory of 3508 2484 1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe 83 PID 3508 wrote to memory of 2976 3508 plEQ38Eg99.exe 85 PID 3508 wrote to memory of 2976 3508 plEQ38Eg99.exe 85 PID 3508 wrote to memory of 2976 3508 plEQ38Eg99.exe 85 PID 2976 wrote to memory of 3640 2976 plvX91Kw82.exe 86 PID 2976 wrote to memory of 3640 2976 plvX91Kw82.exe 86 PID 2976 wrote to memory of 3640 2976 plvX91Kw82.exe 86 PID 3640 wrote to memory of 2400 3640 plsv36dc44.exe 87 PID 3640 wrote to memory of 2400 3640 plsv36dc44.exe 87 PID 3640 wrote to memory of 2400 3640 plsv36dc44.exe 87 PID 2400 wrote to memory of 3668 2400 ploy87dU19.exe 89 PID 2400 wrote to memory of 3668 2400 ploy87dU19.exe 89 PID 2400 wrote to memory of 1360 2400 ploy87dU19.exe 96 PID 2400 wrote to memory of 1360 2400 ploy87dU19.exe 96 PID 2400 wrote to memory of 1360 2400 ploy87dU19.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe"C:\Users\Admin\AppData\Local\Temp\1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plEQ38Eg99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plEQ38Eg99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plvX91Kw82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plvX91Kw82.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plsv36dc44.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plsv36dc44.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploy87dU19.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploy87dU19.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGA49CR20.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGA49CR20.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRn70Om17.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRn70Om17.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5dfe1b99c22373b5db1ddbd8a2f1999ed
SHA11c3089e7feab4e3d2fc40b50550a08c6331364ed
SHA256b9648c41bec9df400b0e125080299cd35b5702d24237d9474da58e5465f82142
SHA512bd4dd2a72e0aaf9b10d3ca11a729f2226ce3bfdeea22117ace502c0e56e1e07c527a957ebb98166726d238b6991614c428293dcf5669d077406fed234d9897cb
-
Filesize
937KB
MD5d8830e3d3c3ccac241abac5ebefa6365
SHA103548b97f74835fe30435a821cfb55114e29dac4
SHA256410bf4f76920b56bf346381393631d107a2f64ccfcdd2728b67972cebba501ee
SHA512cdc9eab0127c641aa42f973b6873f5518764c64c99040ec0d4027efa98661c2a3c51a9b01f6b5ff1a8c9c5e142f5e1fdbc1dd1f211fbbc4f15b11bbe60faf375
-
Filesize
668KB
MD51b245ce24d0ec9972c1a995ab5327be7
SHA161a7114639a1db63828ebe7ed2c908e3b2ace272
SHA256cea81a7f546957f27c42666587e528512f9beab0cfb30ddf6d00c7b339c5e614
SHA5128634fbdd154dd0219bf2945f02e8598c3b10ac610ab7db0e604ef09acd6d318c1ed09d76199f41182c3b6edc7f3d9c5ff9305dc5cb3d8540b7f945a98844e9bf
-
Filesize
392KB
MD5426caa05a6ead15b3300cf6934afda5b
SHA1d380004e2bd95ffdae3ef149c1873b0209ee7aa6
SHA2563f499450b8176992774832db44e46fca207a9442f16b09113867dc55f71ce2a9
SHA5123929ab97a2806b369aaecd8ac1dbb143eb1411f23913aab19e1b92ff6c9a737361c4fbdff5a119ce805f955a0b0015c8db51b71fc01a63a2af2a5e6c2cfedb51
-
Filesize
12KB
MD50b2d0fce7b606187272ea91e36b4af19
SHA13ae126fc5122e2f88f7c361895f06c0c45a9fb28
SHA2562129d8e890f8c824f37e23fd2ccb1ef81531e5eed619c2afbefea9c696504165
SHA512ad2027c46cf51718f15f7a6df4d2f81ec0daddbd3a89c4bb8f72428bb312ea03d63a4312b96d4c263c785efa24c248730ddb994d1d7fe27218c2c4a79f326108
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06