Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe
Resource
win10v2004-20241007-en
General
-
Target
bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe
-
Size
892KB
-
MD5
ddd6b0e04cac63797ecd86b384e5bd2d
-
SHA1
a043c296b148dec1d6c3870aaf83dc0d3bde00e1
-
SHA256
bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3
-
SHA512
c36358770c28cdd6c178484c502c622b3435114a7e90ae97b90c8f93710b731f87c78aa7c8d6569e267660b6e44d0c93c071c13c007e7e1c6b0a273b975a5253
-
SSDEEP
24576:HyTVIeVseiQhEWkWmEiO+5pIqqDRRFBBP:STd+QGomO+5pIDDrFz
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9b-19.dat healer behavioral1/memory/2168-22-0x0000000000DB0000-0x0000000000DBA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buFu08TB72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buFu08TB72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buFu08TB72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buFu08TB72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buFu08TB72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buFu08TB72.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1056-29-0x0000000002550000-0x0000000002596000-memory.dmp family_redline behavioral1/memory/1056-31-0x0000000004B70000-0x0000000004BB4000-memory.dmp family_redline behavioral1/memory/1056-35-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-45-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-95-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-91-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-90-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-87-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-85-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-83-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-81-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-79-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-77-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-75-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-73-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-71-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-67-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-66-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-63-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-61-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-59-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-57-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-53-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-51-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-49-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-43-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-41-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-39-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-37-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-93-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-69-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-55-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-47-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-33-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1056-32-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2996 plYj99yU64.exe 1052 plgo54Bs54.exe 2168 buFu08TB72.exe 1056 caPw43FI20.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buFu08TB72.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plYj99yU64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plgo54Bs54.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caPw43FI20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYj99yU64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plgo54Bs54.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 buFu08TB72.exe 2168 buFu08TB72.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 buFu08TB72.exe Token: SeDebugPrivilege 1056 caPw43FI20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2996 1836 bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe 83 PID 1836 wrote to memory of 2996 1836 bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe 83 PID 1836 wrote to memory of 2996 1836 bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe 83 PID 2996 wrote to memory of 1052 2996 plYj99yU64.exe 84 PID 2996 wrote to memory of 1052 2996 plYj99yU64.exe 84 PID 2996 wrote to memory of 1052 2996 plYj99yU64.exe 84 PID 1052 wrote to memory of 2168 1052 plgo54Bs54.exe 86 PID 1052 wrote to memory of 2168 1052 plgo54Bs54.exe 86 PID 1052 wrote to memory of 1056 1052 plgo54Bs54.exe 96 PID 1052 wrote to memory of 1056 1052 plgo54Bs54.exe 96 PID 1052 wrote to memory of 1056 1052 plgo54Bs54.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe"C:\Users\Admin\AppData\Local\Temp\bf16bbb7eac4948954fe630c5bdbd735709d64a22fe0f05911fccdbcc04076c3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plYj99yU64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plYj99yU64.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plgo54Bs54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plgo54Bs54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buFu08TB72.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buFu08TB72.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\caPw43FI20.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\caPw43FI20.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
666KB
MD5dc090634d891b390fcc405eb1ae07e31
SHA11bc44e11e516fbac7aaea7d231ed48e886121343
SHA256c1c9cb28cd77dd9d7c6db44193f19d41fd3a7a7975774137e1b796091c9e65db
SHA512adf7582f0ff6fe36ceec987e84cfc79e81d5bf3a0cbfaa0d2c29ded70ef965f97c3e825b74faf4a125d8db685010c375809e9de8bc4e37c64a29202cfcbd3d58
-
Filesize
391KB
MD5ab9ba35b3e63ef8172119185871d932f
SHA1536f6e3f9e8c0524d0caa6294afc5153da7cb664
SHA256bf3897673cb40b99acee4323b6312b151effe71701472ab6a6997029b7229560
SHA5120ef4f78b010bcb5136ac77b66b7b2040827b0c71b534a2f4bab2875dfa9bedea637d22918ec40634ba240744822ea6d1343bc67e0d9d2cd5fc0e24c48cb6f6b2
-
Filesize
11KB
MD59701167b684bb3444be08e5420a0ebc0
SHA1a9fb1474e1eaa4386f948dabb1e36fc2dfdf645c
SHA256a74777dcfe14a02d92a4f832cc03763aa6902c88774977ad010c5a1a1160649b
SHA512af6bfd56fb13d5f0099e8e4a53b56814fd3d843a2416a1cd90a30be5018769337a661dbaab181bcb3b0d62adc681dc876bb1a9347ccf88cbc7727db987a7906e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e