Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe
Resource
win10v2004-20241007-en
General
-
Target
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe
-
Size
1.0MB
-
MD5
92dbab2af1099e1b23e30495f16d8673
-
SHA1
7b0b3d0ebbf9c563c0f67272145034be6c7018d5
-
SHA256
cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9
-
SHA512
f37793f8707cec27d4d035df75df581081ea7e8c824850cbbf15debdf7250f3915e2a5a47c9961ceafbd4a03646f7253804e23dec4ef0bbd1759e690eeeaf5c0
-
SSDEEP
24576:Uy+MgtZT8C2RC/IyxiHlvNvkhN2MgixQMiqAo9AL7:jN+ARCXiUMSxWrNP
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba0-26.dat healer behavioral1/memory/2768-28-0x00000000004A0000-0x00000000004AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buFc37sk23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buFc37sk23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buFc37sk23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1908-34-0x0000000004A70000-0x0000000004AB6000-memory.dmp family_redline behavioral1/memory/1908-36-0x0000000004B30000-0x0000000004B74000-memory.dmp family_redline behavioral1/memory/1908-38-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-52-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-100-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-98-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-96-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-94-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-90-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-88-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-86-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-84-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-82-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-80-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-78-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-76-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-74-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-73-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-70-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-68-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-66-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-64-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-63-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-61-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-58-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-56-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-54-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-50-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-48-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-46-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-45-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-42-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-40-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-92-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/1908-37-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3468 plXl12rw54.exe 3448 plFE32nv69.exe 3440 plLU89ry57.exe 2768 buFc37sk23.exe 1908 caDQ06VW66.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buFc37sk23.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plLU89ry57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plXl12rw54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plFE32nv69.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plXl12rw54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFE32nv69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plLU89ry57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caDQ06VW66.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 buFc37sk23.exe 2768 buFc37sk23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 buFc37sk23.exe Token: SeDebugPrivilege 1908 caDQ06VW66.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3468 3972 cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe 84 PID 3972 wrote to memory of 3468 3972 cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe 84 PID 3972 wrote to memory of 3468 3972 cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe 84 PID 3468 wrote to memory of 3448 3468 plXl12rw54.exe 85 PID 3468 wrote to memory of 3448 3468 plXl12rw54.exe 85 PID 3468 wrote to memory of 3448 3468 plXl12rw54.exe 85 PID 3448 wrote to memory of 3440 3448 plFE32nv69.exe 87 PID 3448 wrote to memory of 3440 3448 plFE32nv69.exe 87 PID 3448 wrote to memory of 3440 3448 plFE32nv69.exe 87 PID 3440 wrote to memory of 2768 3440 plLU89ry57.exe 88 PID 3440 wrote to memory of 2768 3440 plLU89ry57.exe 88 PID 3440 wrote to memory of 1908 3440 plLU89ry57.exe 98 PID 3440 wrote to memory of 1908 3440 plLU89ry57.exe 98 PID 3440 wrote to memory of 1908 3440 plLU89ry57.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe"C:\Users\Admin\AppData\Local\Temp\cc85e344525d0c2840a5aaa9976f791fdf6ac56c4cfa065c655ce200bc0f93b9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plXl12rw54.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plXl12rw54.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plFE32nv69.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plFE32nv69.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLU89ry57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLU89ry57.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buFc37sk23.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buFc37sk23.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caDQ06VW66.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caDQ06VW66.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD5bfc3188ff3c301a7675c20a269cdd027
SHA131cd9eb5b7dd724341815307126b894423bd3042
SHA25699b3e52e54794c7cc1c00f0387590798baa20e912d54b3bdc73d4d5789bd8a7c
SHA512f8265862d33d63cd9d279a770c92a2afe610513bb1ea0ef1c0510348f1feb70498e66759df88bae7cece9a77fe9d7caf76fb532f04c113c899593fd2fbfb5e37
-
Filesize
682KB
MD57ccdcb4b3a89400b62bac896815d3530
SHA1ee240d6a8fdd13be2a14f9864cd1dce7bebefc3e
SHA25610160cdc2b732e188bf80f857772a0b3a25be83f148d0b1231b526cec727deac
SHA5123ef8db9c54d44d1605d85bb89c6daf7fdc5f9da1f7b82a2c2f9bf00cd46bbb43957ee3a88201fa8c2095eeae1b90b06425ab48f88a91054a96e453d840440f1c
-
Filesize
399KB
MD588456b2650c614c922a2a2fc427eb304
SHA1c24973785dc5daf47d73da4409c68ca3ec4871b7
SHA256fbd179bd4f12c73763f975a72c9bf8ee5d262644a55ad71659b77f63fc307600
SHA512aa404218578fa1700ac805390a8a6936e4872292d7b99ca64742ddc39ab666b6899b3bc8f7fcf099fc2bf615855ae34a358c21a5c37e78f8aeab98211605ab9e
-
Filesize
12KB
MD502595d51f070d5dada6cac6aa01ec92c
SHA1c040fa02a68ff05c2b299c895ef5c6af9b05e375
SHA256c507e5f10787e8b8ad3972176be29b62149960cc9de1869c96b2d7f860c599f3
SHA512fc892b286b4ddb2decdb4a001c954c6cf766d69f6aa205ae6b09421b67b1062deaf006609b7e9ce7f961c1576cea7398c126d3b820a9a79a7973b9f63520deed
-
Filesize
375KB
MD5ce2e3c06ecc57dfaaedf2a841a62527f
SHA166af3d09ea9b71c92abf98be71a029e6e7befce5
SHA25683d112bac5fdb229efc38ac14bf64da2e1b4e273d7e7a48934aabc238e658c50
SHA512f080a5e39a58e6125adb9061de3314a7019db4a88204973db369754ce22a5e6c88adba33d639b88f1ec7b54ad77c6eff337c2041e1ebdb239ce7b0c70a9bbdec