Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe
Resource
win10v2004-20241007-en
General
-
Target
2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe
-
Size
1.2MB
-
MD5
4d3b49d1786dbcd9ee3c809dfae17a20
-
SHA1
87c30697b5a2621d05dfbfc3e4c80c21522acdab
-
SHA256
2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9f
-
SHA512
914148ee76d79a66d0ad5c265cbaf094a364e39d550e0c45981f1c9d0e2977cc5c9ca2d435bb987c38fa9a12cd3817e75dc2b7026dfea50c00313ae90dec8d90
-
SSDEEP
24576:1y8CI6ejP2HKUVxh4nhfaAuELGGsLm1PytSq+XSWNBL6SQRwU9/pj3L+fZVXunxY:QG6u2HKUfh4nhf0ELBsLm1P+v0SWNBLI
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9c-32.dat healer behavioral1/memory/4008-35-0x0000000000950000-0x000000000095A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" butI19XH96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" butI19XH96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection butI19XH96.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4684-41-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/4684-43-0x00000000071B0000-0x00000000071F4000-memory.dmp family_redline behavioral1/memory/4684-57-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-59-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-105-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-103-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-102-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-97-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-95-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-93-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-91-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-89-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-87-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-85-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-83-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-81-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-77-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-75-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-73-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-71-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-69-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-67-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-65-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-63-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-61-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-55-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-53-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-51-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-49-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-107-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-99-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-79-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-47-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-45-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline behavioral1/memory/4684-44-0x00000000071B0000-0x00000000071EE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1224 plnF62Kc67.exe 2648 plJh45WJ54.exe 3800 plFS22SK58.exe 2176 plYE23yM03.exe 4008 butI19XH96.exe 4684 caBa40bP10.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" butI19XH96.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plYE23yM03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plnF62Kc67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plJh45WJ54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plFS22SK58.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plnF62Kc67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plJh45WJ54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plFS22SK58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plYE23yM03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caBa40bP10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4008 butI19XH96.exe 4008 butI19XH96.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4008 butI19XH96.exe Token: SeDebugPrivilege 4684 caBa40bP10.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1224 4676 2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe 82 PID 4676 wrote to memory of 1224 4676 2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe 82 PID 4676 wrote to memory of 1224 4676 2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe 82 PID 1224 wrote to memory of 2648 1224 plnF62Kc67.exe 83 PID 1224 wrote to memory of 2648 1224 plnF62Kc67.exe 83 PID 1224 wrote to memory of 2648 1224 plnF62Kc67.exe 83 PID 2648 wrote to memory of 3800 2648 plJh45WJ54.exe 84 PID 2648 wrote to memory of 3800 2648 plJh45WJ54.exe 84 PID 2648 wrote to memory of 3800 2648 plJh45WJ54.exe 84 PID 3800 wrote to memory of 2176 3800 plFS22SK58.exe 85 PID 3800 wrote to memory of 2176 3800 plFS22SK58.exe 85 PID 3800 wrote to memory of 2176 3800 plFS22SK58.exe 85 PID 2176 wrote to memory of 4008 2176 plYE23yM03.exe 86 PID 2176 wrote to memory of 4008 2176 plYE23yM03.exe 86 PID 2176 wrote to memory of 4684 2176 plYE23yM03.exe 89 PID 2176 wrote to memory of 4684 2176 plYE23yM03.exe 89 PID 2176 wrote to memory of 4684 2176 plYE23yM03.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe"C:\Users\Admin\AppData\Local\Temp\2f372451475e9948333db6038af6adcd608276a3331b259e13a4434ffd33cb9fN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnF62Kc67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plnF62Kc67.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plJh45WJ54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plJh45WJ54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFS22SK58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plFS22SK58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYE23yM03.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYE23yM03.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butI19XH96.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butI19XH96.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBa40bP10.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caBa40bP10.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a6807763ed26f2a95bc522465d1b1209
SHA1149ad7f0189c141766c70d4ae34c0eb5c2989fb2
SHA2562ecf38a6e2d9074f2e881aaa406a6fed25dbb39f3edf17a58a11a6a04a2286cd
SHA512be9f2c31f6f7c3c3f8e445571da70d8814fb483c00a9256c333663518cb38aad134cee800b65f765231e7481bb86133d501b00d8d824a7414e315f0e0cd4a381
-
Filesize
959KB
MD545cf398a08c3e08a0bdaf3bae4f7fceb
SHA1ec7643346e93c666659fba46d5651079f929d3fe
SHA256c54380cbdccb0c3914e56b83c672da50c2ddd0c068528bfbbaada4c6063892d4
SHA512e266557f27415288ab6afa2d0e873a431a568cb24fa19d9c050358e054a856a2e8f88eb174416e637aae318985d8dfcdaf594a13bb7b63514d8059a2d908701b
-
Filesize
682KB
MD5633deec341d829fe7b746bd858002537
SHA16d62b5f2261345387e6053b8faa4416fb1f1ac25
SHA256c3fdccaba034a18810fbf26e82ad5027ef0cb28fc7791717f1631eb1c5f04231
SHA512f41c3ef7b5f83357e3185b1cf570e3bd5d05d658ba87a92782ac7218bf19d4c16fc8565d7c81582d0b14559f5037401ff2c852f49acd1041246e538416c4ddf2
-
Filesize
399KB
MD563aa3fedab8543527cfd4fa481f753c3
SHA188a5abda36bc6a65b99cfbf87d7c40c44506c832
SHA256be5b7e013d097ca96a5e56a8a61d9f943d88c90079c11193c3f5f31097326be7
SHA5123e8da833c35ba5e91eefbbc03504839106b453a7f6e7f6de4bd2e96a87b3633a06179f9b8994db71bb04bc270158e6e1f31064e85f5dea1ccb0262ab42818857
-
Filesize
13KB
MD52b40f957c4264629f1b3edc8d5f76952
SHA1e36c9f272bbaed5586c92b78240c4f16175f6999
SHA256a3bc292c1035c455876546c67737e50793ca5915b15738228031a71cb2c3f9c5
SHA51258db32259c67408f17aec9b7b1a18a9c9c05225acf22fe07b8a50f7c2c9e4cb64d4b09ecd85c8a2febb60b2b3c2516a13c121e465d700f11b1dde7c0695c218e
-
Filesize
374KB
MD5534196314ab3a6ddde9383161e04bb1c
SHA11aada3e9ec093f011c9e1c4c557f2e9da73861cd
SHA256d4eb393c9ee03f90888b37f01abdb6bb09d44416bacdfd5216c29f2739993c7e
SHA5124d134be97ff5f2af6d2b9f8dadff10ace57447cf3a51f13a1d69b933de3a94673bf5c3c3899ff68036a2c4ec579248c015b974c5bdb51488ed8819227950ff8b