Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe
Resource
win10v2004-20241007-en
General
-
Target
5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe
-
Size
1.0MB
-
MD5
d407723d85865f2ecaacf5d960deb280
-
SHA1
db1df9a5e3e6ff87045848e404a1afcceb54e6b8
-
SHA256
5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7dd
-
SHA512
b59c6da3cccdc8d1267fdade110956435ad1d449cbf5a760600f4d8c1ef3ac962988da8f57276b64801095c2143143f98794f27653aea4e5f81c7b699349c8cd
-
SSDEEP
24576:ayZ1XIWfI1bF/E21jDJ1fnaMpMzOv+FecyKheTAgwne7/4EsM:hZC3j1vbPaM+e+LO2nI4E
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b90-25.dat healer behavioral1/memory/3704-28-0x00000000003C0000-0x00000000003CA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beBq41cn92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beBq41cn92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beBq41cn92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beBq41cn92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beBq41cn92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beBq41cn92.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/64-34-0x0000000002760000-0x00000000027A6000-memory.dmp family_redline behavioral1/memory/64-36-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/64-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-70-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-62-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-40-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-38-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-100-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-98-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-97-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-94-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-92-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-91-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-88-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-86-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-80-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-68-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-64-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-60-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-58-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-52-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-50-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/64-46-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3120 ptBE1705lQ.exe 2428 ptWI1188zO.exe 4348 ptxw1625lv.exe 3704 beBq41cn92.exe 64 cuVf00PI73.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beBq41cn92.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptBE1705lQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptWI1188zO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptxw1625lv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptWI1188zO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptxw1625lv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuVf00PI73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptBE1705lQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3704 beBq41cn92.exe 3704 beBq41cn92.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3704 beBq41cn92.exe Token: SeDebugPrivilege 64 cuVf00PI73.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 920 wrote to memory of 3120 920 5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe 83 PID 920 wrote to memory of 3120 920 5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe 83 PID 920 wrote to memory of 3120 920 5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe 83 PID 3120 wrote to memory of 2428 3120 ptBE1705lQ.exe 84 PID 3120 wrote to memory of 2428 3120 ptBE1705lQ.exe 84 PID 3120 wrote to memory of 2428 3120 ptBE1705lQ.exe 84 PID 2428 wrote to memory of 4348 2428 ptWI1188zO.exe 85 PID 2428 wrote to memory of 4348 2428 ptWI1188zO.exe 85 PID 2428 wrote to memory of 4348 2428 ptWI1188zO.exe 85 PID 4348 wrote to memory of 3704 4348 ptxw1625lv.exe 87 PID 4348 wrote to memory of 3704 4348 ptxw1625lv.exe 87 PID 4348 wrote to memory of 64 4348 ptxw1625lv.exe 100 PID 4348 wrote to memory of 64 4348 ptxw1625lv.exe 100 PID 4348 wrote to memory of 64 4348 ptxw1625lv.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe"C:\Users\Admin\AppData\Local\Temp\5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptBE1705lQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptBE1705lQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWI1188zO.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWI1188zO.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxw1625lv.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxw1625lv.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beBq41cn92.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beBq41cn92.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cuVf00PI73.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cuVf00PI73.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD599b4c46ab6c2e74cb4420cf6a37cf7ed
SHA17168715c75c96b94c9f7a2be99b6b80142718561
SHA2564c9aed95952b6446ac8960b6b837bab84ea05ea1bbefde1c3b935766e19dd6a3
SHA512ee7aa53145b1803de8c13a1d99361b9909137666ffed7344745f9b58de67252053bdc770a0fc58ee8c77657faeec07c65e7900de91ff44f0554df48210239fb9
-
Filesize
667KB
MD5441cd6cafea8f5b4b37aaa363e521d43
SHA160bdccdd66251a759d7ee9397e7da87b88444536
SHA2564aec930e016c3b5b557f467e6ad28032e913c129406768c4686655ef86dbc0fc
SHA512747390dc2308bb236ebc2a42ba4ad84e7e44f896a3babb31c5136a3f9d3feaf2575082ac309bfccd2122980e53830ee9406aa3c1ee924a70010762d1cfadebe9
-
Filesize
391KB
MD5c898632e50ae4d02eaa06c07502461ea
SHA1f7ce95b84e29ca5e1883383fd4b5d38d09481b77
SHA256d3b06f368acb8274001cbaef40b3742eb49edc24de2af4c43dabe2301eb49840
SHA512bbc4d72e81476ecffeb4c8ae72c385f40faf08db810ecb2c459131cfd16a65cba01ee9443a36ee70a122561c2a46d8222f78c09b1b31f5a64896cd7de194ba29
-
Filesize
11KB
MD503de47a528e4b7d3f0b33b2b7ddf07eb
SHA19380f4bdd2e3d73b89ae5066f037224b5774f43e
SHA256e1c229ec6ba698c85f32fdd6d765f619d53e469643d0a68242c446779bd0ba46
SHA51247dd68f5eea5a337fdbdfcc2cf6a459339afd193d10f31e9f6e3ec66347cccd554952631d6c7846620836531921bd055333bc3d33b6bc75ffda12f2cfc7e5ffb
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd