Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe
Resource
win10v2004-20241007-en
General
-
Target
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe
-
Size
1.2MB
-
MD5
7a4fec1d8431b18437caa70d74727df1
-
SHA1
7e61cbde9d11554b530704cab3286a3b4f677625
-
SHA256
1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f
-
SHA512
03d06c54b200303600a08c713245e089153a431ae762082cc8a6a8ec17305de789aef6da7728dcdc0cf07218a82bb0da56d73e62fddbb359be34fce7bfac33c3
-
SSDEEP
24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxj:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLE
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca6-34.dat healer behavioral1/memory/4384-35-0x0000000000AC0000-0x0000000000ACA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" butI19XH96.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2304-41-0x0000000004B10000-0x0000000004B56000-memory.dmp family_redline behavioral1/memory/2304-43-0x0000000004D60000-0x0000000004DA4000-memory.dmp family_redline behavioral1/memory/2304-65-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-63-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-107-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-103-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-99-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-97-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-93-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-89-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-87-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-83-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-79-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-77-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-75-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-73-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-71-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-69-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-67-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-61-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-59-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-57-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-55-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-53-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-51-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-49-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-105-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-47-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-101-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-95-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-91-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-85-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-45-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-81-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/2304-44-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1268 plnF62Kc67.exe 4372 plJh45WJ54.exe 3008 plFS22SK58.exe 1824 plYE23yM03.exe 4384 butI19XH96.exe 2304 caBa40bP10.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" butI19XH96.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plnF62Kc67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plJh45WJ54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plFS22SK58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plYE23yM03.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plnF62Kc67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plJh45WJ54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFS22SK58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYE23yM03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caBa40bP10.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 butI19XH96.exe 4384 butI19XH96.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4384 butI19XH96.exe Token: SeDebugPrivilege 2304 caBa40bP10.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 592 wrote to memory of 1268 592 1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe 82 PID 592 wrote to memory of 1268 592 1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe 82 PID 592 wrote to memory of 1268 592 1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe 82 PID 1268 wrote to memory of 4372 1268 plnF62Kc67.exe 83 PID 1268 wrote to memory of 4372 1268 plnF62Kc67.exe 83 PID 1268 wrote to memory of 4372 1268 plnF62Kc67.exe 83 PID 4372 wrote to memory of 3008 4372 plJh45WJ54.exe 84 PID 4372 wrote to memory of 3008 4372 plJh45WJ54.exe 84 PID 4372 wrote to memory of 3008 4372 plJh45WJ54.exe 84 PID 3008 wrote to memory of 1824 3008 plFS22SK58.exe 85 PID 3008 wrote to memory of 1824 3008 plFS22SK58.exe 85 PID 3008 wrote to memory of 1824 3008 plFS22SK58.exe 85 PID 1824 wrote to memory of 4384 1824 plYE23yM03.exe 86 PID 1824 wrote to memory of 4384 1824 plYE23yM03.exe 86 PID 1824 wrote to memory of 2304 1824 plYE23yM03.exe 89 PID 1824 wrote to memory of 2304 1824 plYE23yM03.exe 89 PID 1824 wrote to memory of 2304 1824 plYE23yM03.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe"C:\Users\Admin\AppData\Local\Temp\1ee3271ed9b13e64bddee5516a8f5b96d276a5adefa9654acf97817efc74aa7f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnF62Kc67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnF62Kc67.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plJh45WJ54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plJh45WJ54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFS22SK58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFS22SK58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYE23yM03.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYE23yM03.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butI19XH96.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butI19XH96.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBa40bP10.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBa40bP10.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a6807763ed26f2a95bc522465d1b1209
SHA1149ad7f0189c141766c70d4ae34c0eb5c2989fb2
SHA2562ecf38a6e2d9074f2e881aaa406a6fed25dbb39f3edf17a58a11a6a04a2286cd
SHA512be9f2c31f6f7c3c3f8e445571da70d8814fb483c00a9256c333663518cb38aad134cee800b65f765231e7481bb86133d501b00d8d824a7414e315f0e0cd4a381
-
Filesize
959KB
MD545cf398a08c3e08a0bdaf3bae4f7fceb
SHA1ec7643346e93c666659fba46d5651079f929d3fe
SHA256c54380cbdccb0c3914e56b83c672da50c2ddd0c068528bfbbaada4c6063892d4
SHA512e266557f27415288ab6afa2d0e873a431a568cb24fa19d9c050358e054a856a2e8f88eb174416e637aae318985d8dfcdaf594a13bb7b63514d8059a2d908701b
-
Filesize
682KB
MD5633deec341d829fe7b746bd858002537
SHA16d62b5f2261345387e6053b8faa4416fb1f1ac25
SHA256c3fdccaba034a18810fbf26e82ad5027ef0cb28fc7791717f1631eb1c5f04231
SHA512f41c3ef7b5f83357e3185b1cf570e3bd5d05d658ba87a92782ac7218bf19d4c16fc8565d7c81582d0b14559f5037401ff2c852f49acd1041246e538416c4ddf2
-
Filesize
399KB
MD563aa3fedab8543527cfd4fa481f753c3
SHA188a5abda36bc6a65b99cfbf87d7c40c44506c832
SHA256be5b7e013d097ca96a5e56a8a61d9f943d88c90079c11193c3f5f31097326be7
SHA5123e8da833c35ba5e91eefbbc03504839106b453a7f6e7f6de4bd2e96a87b3633a06179f9b8994db71bb04bc270158e6e1f31064e85f5dea1ccb0262ab42818857
-
Filesize
13KB
MD52b40f957c4264629f1b3edc8d5f76952
SHA1e36c9f272bbaed5586c92b78240c4f16175f6999
SHA256a3bc292c1035c455876546c67737e50793ca5915b15738228031a71cb2c3f9c5
SHA51258db32259c67408f17aec9b7b1a18a9c9c05225acf22fe07b8a50f7c2c9e4cb64d4b09ecd85c8a2febb60b2b3c2516a13c121e465d700f11b1dde7c0695c218e
-
Filesize
374KB
MD5534196314ab3a6ddde9383161e04bb1c
SHA11aada3e9ec093f011c9e1c4c557f2e9da73861cd
SHA256d4eb393c9ee03f90888b37f01abdb6bb09d44416bacdfd5216c29f2739993c7e
SHA5124d134be97ff5f2af6d2b9f8dadff10ace57447cf3a51f13a1d69b933de3a94673bf5c3c3899ff68036a2c4ec579248c015b974c5bdb51488ed8819227950ff8b