Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe
Resource
win10v2004-20241007-en
General
-
Target
9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe
-
Size
955KB
-
MD5
ca1c395095005fd1eec0d73aee1311a0
-
SHA1
4b64467a9d43c55f82b26809f690ab688f67686d
-
SHA256
9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8
-
SHA512
9747d22b34cbb79ce67c31f12a0120ae6dbae21a40b43d35ed0a1f217e11b22a244a3456855fe1616d8abfe402a6ba95c8eb1000456203ef9d0426b87b3d2b5e
-
SSDEEP
24576:7yl3lTgF4pZ+y1g1nIqyzo12Cf/YiyiKCNS:upyFC4I10n/YIKS
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b84-19.dat healer behavioral1/memory/1040-22-0x0000000000100000-0x000000000010A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bucn12CT38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bucn12CT38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bucn12CT38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bucn12CT38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bucn12CT38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bucn12CT38.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4468-29-0x0000000004BC0000-0x0000000004C06000-memory.dmp family_redline behavioral1/memory/4468-31-0x0000000004D50000-0x0000000004D94000-memory.dmp family_redline behavioral1/memory/4468-33-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-43-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-93-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-91-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-89-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-87-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-85-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-83-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-79-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-77-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-75-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-73-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-71-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-69-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-65-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-63-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-61-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-59-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-57-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-55-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-53-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-51-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-49-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-47-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-41-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-40-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-37-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-35-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-95-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-81-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-67-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-45-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4468-32-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1188 plTk79GA55.exe 3988 plUz75CY08.exe 1040 bucn12CT38.exe 4468 caNy73Fa31.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bucn12CT38.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plUz75CY08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plTk79GA55.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plTk79GA55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plUz75CY08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caNy73Fa31.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1040 bucn12CT38.exe 1040 bucn12CT38.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 bucn12CT38.exe Token: SeDebugPrivilege 4468 caNy73Fa31.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1188 1520 9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe 83 PID 1520 wrote to memory of 1188 1520 9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe 83 PID 1520 wrote to memory of 1188 1520 9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe 83 PID 1188 wrote to memory of 3988 1188 plTk79GA55.exe 84 PID 1188 wrote to memory of 3988 1188 plTk79GA55.exe 84 PID 1188 wrote to memory of 3988 1188 plTk79GA55.exe 84 PID 3988 wrote to memory of 1040 3988 plUz75CY08.exe 86 PID 3988 wrote to memory of 1040 3988 plUz75CY08.exe 86 PID 3988 wrote to memory of 4468 3988 plUz75CY08.exe 93 PID 3988 wrote to memory of 4468 3988 plUz75CY08.exe 93 PID 3988 wrote to memory of 4468 3988 plUz75CY08.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe"C:\Users\Admin\AppData\Local\Temp\9ed03ad65284bb9bf3d565bff3accc1b7c2141fcc4c7918db51edf44d78518f8N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plTk79GA55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plTk79GA55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUz75CY08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUz75CY08.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bucn12CT38.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bucn12CT38.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\caNy73Fa31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\caNy73Fa31.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679KB
MD5b248fe2c7c373d179c9fbb2e71a18ecb
SHA17e5834a8d95c18099eeddf781b965247b2dba820
SHA2568c00418ed31d136bc581f7798e8789d41d11b224748b0911152d73edd73fa27e
SHA512480ddd7f146b5316de01d37c4efd557953d559bd3d780e7c35b21c6471e0c332aa360e8da0aa657482cadef1835d3b8b5e9e679aad94eb2c6d15f6e1a189f747
-
Filesize
398KB
MD5976492bde7d2815b0e08fb72c5331cc5
SHA16b5d9a41eeed4eea652ad57ce3102f4420267dd5
SHA25611119ef77f2ca2de5df9b8fca383ee464ff41a57883d39a839bdf48571c36cd4
SHA5127b05aa6181deb1b7d3d6cb5214f501dcc960566419d8624ae7177a8fac71c1befb03536ff12d5082ceaf60c151d5ab46edcf9ea77bd57f7ab698b312ae47fe62
-
Filesize
14KB
MD524fca3ea4b121f03dcb63924705510a9
SHA1e0c3344727421ce345c709bb75fe6a4dcbe70563
SHA256ee53a5084a3d3ca1aa4f077f3ae843a18f47edd77f7491a7394598cdc94ba6e0
SHA512104e8ae70869f9ac524f531805aca971d07ec703deddb162c878c275bb774f4190b13af56eb0dfb70727558c65234535d4872de2aa8d5809ef65398b6c5bf17b
-
Filesize
367KB
MD51d723ff94958004611f8d9036d32a484
SHA1494b2b1df04dd00bd4a6582ca026b45ed1e26f5e
SHA256ce58c79e2d8396ebc000387ba86ec87273d28bd7dfa8310c49c59b22c7de42af
SHA5129738bf0e92ad9b1f526a48a4262410186a961e0aa9e04ef1ecc4769b29d92339f46e331a65810ce72b27df319260ac8aba0636742690e95bc34f6d59fbf2ff61