Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe
Resource
win10v2004-20241007-en
General
-
Target
5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe
-
Size
1.0MB
-
MD5
3127054c5b4b44e4dc850dccf4e5b360
-
SHA1
179f841cec5235eec9757a684dcc67fcaba752fd
-
SHA256
5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2f
-
SHA512
66fdaf6920897496b6218340f8222fbcfa4e92c1d9bffe6a6e237698aa6b4dae425da7958455cf9d0386f24b66624bb390f6a051e3ad4005d7ee64e316262a0c
-
SSDEEP
24576:jyaYJ6ppZDs0R+8OKs61Med2flhJPH06KVUyOnlEJmjmB4HDA:2T6pI7CsaMo0JP06eUjlEJum
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc5-25.dat healer behavioral1/memory/948-28-0x00000000002B0000-0x00000000002BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buXe87wc58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buXe87wc58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buXe87wc58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buXe87wc58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buXe87wc58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buXe87wc58.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3916-34-0x00000000049D0000-0x0000000004A16000-memory.dmp family_redline behavioral1/memory/3916-36-0x0000000004E40000-0x0000000004E84000-memory.dmp family_redline behavioral1/memory/3916-42-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-40-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-38-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-37-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-48-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-100-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-99-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-96-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-94-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-92-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-90-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-88-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-86-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-84-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-82-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-80-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-78-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-76-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-74-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-72-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-70-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-68-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-66-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-64-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-60-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-59-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-56-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-55-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-52-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-50-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-46-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-44-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline behavioral1/memory/3916-62-0x0000000004E40000-0x0000000004E7E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 1424 plJz64tu80.exe 1840 pltK38bo62.exe 100 plBy12oU66.exe 948 buXe87wc58.exe 3916 caLM67VB39.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buXe87wc58.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pltK38bo62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plBy12oU66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plJz64tu80.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caLM67VB39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plJz64tu80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pltK38bo62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plBy12oU66.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 buXe87wc58.exe 948 buXe87wc58.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 948 buXe87wc58.exe Token: SeDebugPrivilege 3916 caLM67VB39.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3804 wrote to memory of 1424 3804 5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe 85 PID 3804 wrote to memory of 1424 3804 5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe 85 PID 3804 wrote to memory of 1424 3804 5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe 85 PID 1424 wrote to memory of 1840 1424 plJz64tu80.exe 86 PID 1424 wrote to memory of 1840 1424 plJz64tu80.exe 86 PID 1424 wrote to memory of 1840 1424 plJz64tu80.exe 86 PID 1840 wrote to memory of 100 1840 pltK38bo62.exe 88 PID 1840 wrote to memory of 100 1840 pltK38bo62.exe 88 PID 1840 wrote to memory of 100 1840 pltK38bo62.exe 88 PID 100 wrote to memory of 948 100 plBy12oU66.exe 89 PID 100 wrote to memory of 948 100 plBy12oU66.exe 89 PID 100 wrote to memory of 3916 100 plBy12oU66.exe 99 PID 100 wrote to memory of 3916 100 plBy12oU66.exe 99 PID 100 wrote to memory of 3916 100 plBy12oU66.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe"C:\Users\Admin\AppData\Local\Temp\5b5d694ea6bd5757e7809d9d17d018044026afc7eee0d0f4e7a0d019535d2a2fN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJz64tu80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plJz64tu80.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pltK38bo62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pltK38bo62.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plBy12oU66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plBy12oU66.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buXe87wc58.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buXe87wc58.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caLM67VB39.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caLM67VB39.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD5856445a5aa87d51027a87a9e85e0934c
SHA19d7c43409a36b1d6c1a14ae7b27d5b99833021bc
SHA256cd029135232af48fd2dbe5b1690505ef6278b4ca8c881ffb38229a42d400e973
SHA512c9d60b5167b276fa87645ec97c6c07907d3822dfbbc21b588829dcd732d887837bec42f265269e8701b208d3fd0ba3677af04f28f2d937da60f721116731be84
-
Filesize
683KB
MD52739a893f21d232501063a6f11d58e27
SHA1e848d2656b8a5ff367b4cabb176afd5c35c4ec15
SHA25678ef5428b014281d43dd3986c3d8972eb3b1b73c50ed9b13bc4cbc722b06d10d
SHA512bad8ffc762ab760cbbf3b242bbc051797a3179282cc03f4c28329c50731ad6207b64f16034cf5c1b998fd734afcf9c0b93fc4f2639cf8108223c567c8e62f518
-
Filesize
399KB
MD5d030d249e6bbe46abd98f37496bbef43
SHA18e845fb10f85d6487a0558540e8a5036f31fbfac
SHA2561ebcaea65540c90545c6bc2743f0ac17a20385e936a65a6ef77481d7e1138882
SHA512fcac91e189cafc197a29dd9440108589e4899b1955bead8b4274b484cc20b518c90664e3f634ef8ade6c9201f0db318e6b573118021ab037d97da1ed692f853e
-
Filesize
12KB
MD58849c6d58014323fdc478b0d1bad79d9
SHA11a651d78a607dc6982160fab18ea9026c08145c6
SHA256672444102ead4e271f6036c72c19c9b23bec51aff2bcccf01bccedcca8fbbf6f
SHA5124f3c32dab92b3fc5b553839769687f49cfef427d5363259759d434c8812b0cf6c7633427f1af976b2659629af0cbf05f7506475723660fbd109ec404d2ae9405
-
Filesize
375KB
MD5e7158d94c200533e4ab41107e5e183b1
SHA18779fa2f2b5eba6b4daf9d9540d62e523a3d5c17
SHA2560d984f1c04ed6c099eca650cedf4d4307881bb3de0d44fdab9e76436eb016704
SHA5129919a210608661b1d18929d4dbe1590ef75b667547d82cc750256f6e3a15d1097a59047fab842678d5a83adb0a7748d84fba8dba98f61fedb6fd8ab3320a4e19