Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe
Resource
win10v2004-20241007-en
General
-
Target
5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe
-
Size
1.0MB
-
MD5
2cd22c6dea37cc8e5cb71be6fb233240
-
SHA1
ef64b92708af06c5c66321d02be91f6be478cbab
-
SHA256
5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292
-
SHA512
8840b17889440d4cbd0d1e3f8a2cbb093d880b91d2f5f412f4e2cab6aab0bf7c170a449a4f397f997e2d21fa3ae492edaf853fec485f176509572647dca4ba43
-
SSDEEP
24576:Uy+MgtZT8C2RC/IyxiHlvNvkhN2MgixQMiqAo9AL:jN+ARCXiUMSxWrN
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b88-25.dat healer behavioral1/memory/3524-28-0x0000000000240000-0x000000000024A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buFc37sk23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buFc37sk23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2096-34-0x0000000004CC0000-0x0000000004D06000-memory.dmp family_redline behavioral1/memory/2096-36-0x0000000004E50000-0x0000000004E94000-memory.dmp family_redline behavioral1/memory/2096-64-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-68-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-100-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-96-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-94-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-92-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-90-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-88-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-86-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-82-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-80-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-78-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-77-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-74-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-72-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-70-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-66-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-62-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-60-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-58-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-56-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-54-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-52-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-48-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-46-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-44-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-42-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-98-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-84-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-50-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-40-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-38-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/2096-37-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 1836 plXl12rw54.exe 2176 plFE32nv69.exe 760 plLU89ry57.exe 3524 buFc37sk23.exe 2096 caDQ06VW66.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buFc37sk23.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plFE32nv69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plLU89ry57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plXl12rw54.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plXl12rw54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFE32nv69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plLU89ry57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caDQ06VW66.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3524 buFc37sk23.exe 3524 buFc37sk23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3524 buFc37sk23.exe Token: SeDebugPrivilege 2096 caDQ06VW66.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4860 wrote to memory of 1836 4860 5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe 83 PID 4860 wrote to memory of 1836 4860 5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe 83 PID 4860 wrote to memory of 1836 4860 5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe 83 PID 1836 wrote to memory of 2176 1836 plXl12rw54.exe 84 PID 1836 wrote to memory of 2176 1836 plXl12rw54.exe 84 PID 1836 wrote to memory of 2176 1836 plXl12rw54.exe 84 PID 2176 wrote to memory of 760 2176 plFE32nv69.exe 86 PID 2176 wrote to memory of 760 2176 plFE32nv69.exe 86 PID 2176 wrote to memory of 760 2176 plFE32nv69.exe 86 PID 760 wrote to memory of 3524 760 plLU89ry57.exe 88 PID 760 wrote to memory of 3524 760 plLU89ry57.exe 88 PID 760 wrote to memory of 2096 760 plLU89ry57.exe 94 PID 760 wrote to memory of 2096 760 plLU89ry57.exe 94 PID 760 wrote to memory of 2096 760 plLU89ry57.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe"C:\Users\Admin\AppData\Local\Temp\5b2aae826758bc718b7b03d7b55f2553f934abcb4a0977502094eadaab7e1292N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plXl12rw54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plXl12rw54.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plFE32nv69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plFE32nv69.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLU89ry57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLU89ry57.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buFc37sk23.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buFc37sk23.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caDQ06VW66.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caDQ06VW66.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD5bfc3188ff3c301a7675c20a269cdd027
SHA131cd9eb5b7dd724341815307126b894423bd3042
SHA25699b3e52e54794c7cc1c00f0387590798baa20e912d54b3bdc73d4d5789bd8a7c
SHA512f8265862d33d63cd9d279a770c92a2afe610513bb1ea0ef1c0510348f1feb70498e66759df88bae7cece9a77fe9d7caf76fb532f04c113c899593fd2fbfb5e37
-
Filesize
682KB
MD57ccdcb4b3a89400b62bac896815d3530
SHA1ee240d6a8fdd13be2a14f9864cd1dce7bebefc3e
SHA25610160cdc2b732e188bf80f857772a0b3a25be83f148d0b1231b526cec727deac
SHA5123ef8db9c54d44d1605d85bb89c6daf7fdc5f9da1f7b82a2c2f9bf00cd46bbb43957ee3a88201fa8c2095eeae1b90b06425ab48f88a91054a96e453d840440f1c
-
Filesize
399KB
MD588456b2650c614c922a2a2fc427eb304
SHA1c24973785dc5daf47d73da4409c68ca3ec4871b7
SHA256fbd179bd4f12c73763f975a72c9bf8ee5d262644a55ad71659b77f63fc307600
SHA512aa404218578fa1700ac805390a8a6936e4872292d7b99ca64742ddc39ab666b6899b3bc8f7fcf099fc2bf615855ae34a358c21a5c37e78f8aeab98211605ab9e
-
Filesize
12KB
MD502595d51f070d5dada6cac6aa01ec92c
SHA1c040fa02a68ff05c2b299c895ef5c6af9b05e375
SHA256c507e5f10787e8b8ad3972176be29b62149960cc9de1869c96b2d7f860c599f3
SHA512fc892b286b4ddb2decdb4a001c954c6cf766d69f6aa205ae6b09421b67b1062deaf006609b7e9ce7f961c1576cea7398c126d3b820a9a79a7973b9f63520deed
-
Filesize
375KB
MD5ce2e3c06ecc57dfaaedf2a841a62527f
SHA166af3d09ea9b71c92abf98be71a029e6e7befce5
SHA25683d112bac5fdb229efc38ac14bf64da2e1b4e273d7e7a48934aabc238e658c50
SHA512f080a5e39a58e6125adb9061de3314a7019db4a88204973db369754ce22a5e6c88adba33d639b88f1ec7b54ad77c6eff337c2041e1ebdb239ce7b0c70a9bbdec