Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe
Resource
win10v2004-20241007-en
General
-
Target
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe
-
Size
667KB
-
MD5
37e7b43f5423953c63c8279248731fb5
-
SHA1
3d08771f53e244826cb9ed662ea4250a494ce06a
-
SHA256
4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50
-
SHA512
92ebc1337fd26b4dfa604ac5e9023b852920143690364fdcbe2564fa3ba3760723a3e07748f18cbc1aa206208006e70d865461b8b6a1e4331ccacf76b2af0c0d
-
SSDEEP
12288:sMrVy90yEiQVa1cbxckb3KYlBljYooxYmnK+IcvMkwaMpe+Y6m6:RydEbVqcRHYvymKnmwpdm6
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7b-12.dat healer behavioral1/memory/2648-15-0x0000000000F70000-0x0000000000F7A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buat03Yn88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buat03Yn88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buat03Yn88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buat03Yn88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buat03Yn88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buat03Yn88.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/944-22-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/944-24-0x0000000004BA0000-0x0000000004BE4000-memory.dmp family_redline behavioral1/memory/944-36-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-38-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-88-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-86-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-84-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-82-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-80-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-78-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-76-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-72-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-70-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-68-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-66-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-65-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-62-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-60-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-58-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-56-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-54-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-52-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-50-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-46-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-44-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-40-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-34-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-32-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-30-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-28-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-74-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-48-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-42-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-25-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline behavioral1/memory/944-26-0x0000000004BA0000-0x0000000004BDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1184 plBm54do45.exe 2648 buat03Yn88.exe 944 caTc74Vh67.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buat03Yn88.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plBm54do45.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plBm54do45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caTc74Vh67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 buat03Yn88.exe 2648 buat03Yn88.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2648 buat03Yn88.exe Token: SeDebugPrivilege 944 caTc74Vh67.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 768 wrote to memory of 1184 768 4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe 85 PID 768 wrote to memory of 1184 768 4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe 85 PID 768 wrote to memory of 1184 768 4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe 85 PID 1184 wrote to memory of 2648 1184 plBm54do45.exe 86 PID 1184 wrote to memory of 2648 1184 plBm54do45.exe 86 PID 1184 wrote to memory of 944 1184 plBm54do45.exe 95 PID 1184 wrote to memory of 944 1184 plBm54do45.exe 95 PID 1184 wrote to memory of 944 1184 plBm54do45.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe"C:\Users\Admin\AppData\Local\Temp\4718d6fdb1c2555cac3892d8c80eb3269e1b6971aa4aa02ca8b2866932673e50.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBm54do45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plBm54do45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buat03Yn88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buat03Yn88.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\caTc74Vh67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\caTc74Vh67.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD57e0b77541c49c74edd12c14d8674cb9f
SHA1826d8fd2bf90f63e8107b664d83d4e5b11431fb8
SHA256463e86ecc99c24a1bbd01757bc30d2cd22939576f8bb680adc7ae6912743e15a
SHA5121c0d497387608fec74a4ab4551fd1717e4cf1e60e1e418adf60b6d613d0e85bb57bc00596b6fe0f07d35ca52bd7518bf0a5caede094029488190729c76012252
-
Filesize
16KB
MD551060fc1282ec928b8157353fba4942d
SHA16b448e44a56d600005358af46e1eef21b21b9626
SHA256df48a1d076764bb284019cef10fec59e7f35589fe25ba6e7c69abe2c05c389f6
SHA5123fd095ddae4a3e1071e61ff5887d8a0bafd2c8e44566577607119d53b13f41d5f1abdbeb948c0e26fc03f5a4c1f3a3dd948411378b28b1c0212753a8854b5460
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23