Overview
overview
10Static
static
327efa43e16...c1.exe
windows10-2004-x64
102fd7c050fb...83.exe
windows10-2004-x64
1031714e287a...59.exe
windows10-2004-x64
104663b4277c...a5.exe
windows10-2004-x64
104ef1a0149d...77.exe
windows10-2004-x64
1055de348478...bf.exe
windows10-2004-x64
1062e08aa290...71.exe
windows10-2004-x64
107c2b1a4696...86.exe
windows10-2004-x64
109712f3ca55...1a.exe
windows10-2004-x64
10a2578cb8fe...19.exe
windows10-2004-x64
10a2e15ecbc2...3e.exe
windows10-2004-x64
10bc1039ea1a...c2.exe
windows10-2004-x64
10c7a4524e38...ae.exe
windows10-2004-x64
10f47fb04ed8...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2fd7c050fbac5e1af2ffeb7fa80c3d86adca912aa0593a6fcf0ada9f513ba783.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
31714e287ace88f54febd6e8f4714a27d61ad35bc95ab8b019334acebd9cd459.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
4663b4277cecac818e54c11c72e9cf1ad537fe10a266e09ebb9f0026ab9a96a5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4ef1a0149daef80693bc6f0b8f8337399c8687c08ca4792d24e3bdaab9bf6f77.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
55de348478f00c0877bff6a44118e1b412443ef85c1e45f12245fb8483acb6bf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62e08aa2909617f096cde8be4d834830bdad6f0907e76c051970413bb9a81571.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c2b1a4696daa48a0b33a675af61f83d79ca86e3128c3e721bb51e375d18c386.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
a2578cb8fe72f0748c7fe615457b7d6aaf54e7985f27f459156f659d0937f119.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a2e15ecbc2385dacd7bc1a3a58a295213fdccc9cc1f85d38c2a7ab13a599f33e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
bc1039ea1a02cf1e898c7cea2600cac8f44dbf43b2b49c31da3024ffd998a7c2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
c7a4524e38a070acf6ba7d4865de5125063cd4a021a47872adb720277271f3ae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
f47fb04ed8077b20b9ca93eddc8ce4a4f05ca4367177fba67c1d87d2831d1865.exe
Resource
win10v2004-20240426-en
General
-
Target
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe
-
Size
1.2MB
-
MD5
861cdcff71d268dee3580d2ce333ac09
-
SHA1
94be6d1757a7ab5c0d5ebd464cafb71bc1c5d33d
-
SHA256
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1
-
SHA512
b2e905338edbaaf101bd94b91c801972ff30f49a8f0f4740c67faa7e8d3c2be243d0883cec424f9db46bbf7b403ae72b5a6e3201d0861093e9084e920a9f1581
-
SSDEEP
24576:ayE5p8ogugja8IT5+YVQ0SVU97kNQ7hDtYT:hwZgja8G5+k79ANQlDtY
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3700-41-0x0000000000490000-0x00000000004CE000-memory.dmp healer behavioral1/files/0x000700000002343c-46.dat healer behavioral1/memory/1420-48-0x0000000000B50000-0x0000000000B5A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5662532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9621859.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9621859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1948-53-0x0000000000950000-0x00000000009DC000-memory.dmp family_redline behavioral1/memory/1948-60-0x0000000000950000-0x00000000009DC000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 3344 v4706679.exe 4808 v4373698.exe 2180 v5824928.exe 3216 v6920833.exe 3700 a5662532.exe 1420 b9621859.exe 1948 c2955605.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9621859.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5824928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6920833.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4706679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4373698.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3700 a5662532.exe 3700 a5662532.exe 1420 b9621859.exe 1420 b9621859.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3700 a5662532.exe Token: SeDebugPrivilege 1420 b9621859.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3344 2424 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 82 PID 2424 wrote to memory of 3344 2424 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 82 PID 2424 wrote to memory of 3344 2424 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 82 PID 3344 wrote to memory of 4808 3344 v4706679.exe 83 PID 3344 wrote to memory of 4808 3344 v4706679.exe 83 PID 3344 wrote to memory of 4808 3344 v4706679.exe 83 PID 4808 wrote to memory of 2180 4808 v4373698.exe 86 PID 4808 wrote to memory of 2180 4808 v4373698.exe 86 PID 4808 wrote to memory of 2180 4808 v4373698.exe 86 PID 2180 wrote to memory of 3216 2180 v5824928.exe 87 PID 2180 wrote to memory of 3216 2180 v5824928.exe 87 PID 2180 wrote to memory of 3216 2180 v5824928.exe 87 PID 3216 wrote to memory of 3700 3216 v6920833.exe 88 PID 3216 wrote to memory of 3700 3216 v6920833.exe 88 PID 3216 wrote to memory of 3700 3216 v6920833.exe 88 PID 3216 wrote to memory of 1420 3216 v6920833.exe 99 PID 3216 wrote to memory of 1420 3216 v6920833.exe 99 PID 2180 wrote to memory of 1948 2180 v5824928.exe 100 PID 2180 wrote to memory of 1948 2180 v5824928.exe 100 PID 2180 wrote to memory of 1948 2180 v5824928.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe"C:\Users\Admin\AppData\Local\Temp\27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4706679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4706679.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4373698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4373698.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5824928.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5824928.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6920833.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6920833.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5662532.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5662532.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9621859.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9621859.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2955605.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2955605.exe5⤵
- Executes dropped EXE
PID:1948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.0MB
MD5d99c9e8014fd98a5853bb0080066e936
SHA1e237506f5dafe36d584654d17a9d89789e49abbc
SHA2567eef2bc77210dfb371441f3047d2846eab00efa17776e8dd2174dc6cfcc22651
SHA512f0d38b9baae2e87de9c0d0445c7aca43721cd1ff8a37ca8b56a7641cf09e9b1d08a15f83d2750f7c56c6b6e85f44d491d559cf91004102b66910561ba0e02f76
-
Filesize
907KB
MD5f6d64813192fad614a257adbf420648b
SHA171fbc5cf4b03d9835ccf416f6ac9e3c87d023021
SHA256c9efc07dc3d1de7d09ef98482efbab50d57d8536b9e046b68e6390bfa840f5bb
SHA51273c5accc42fc873a26095b0468918d98cf8d5761229903fc08c02008d836bbf84ca89f0c7f3a494138c33e2fd173a57e0437be4f9a5d548071fec946f35afd6f
-
Filesize
724KB
MD5b961bbd078d1fe381fcbc28cf386e581
SHA1cb07ff1e265bf9b3981407b19a3a3b5b6d6f4118
SHA256934e3940690b574644d70bfc00cc2145298402b2db4c227d4ce50a3b4e38b33b
SHA512054e1a710393e2d8943969768b0e0d740eccfa67f011aa70a45b94df493c51693f20f5fff89d985f105ae154a8fc0d0a530d2ef997d514169ebc3bcf1243b4da
-
Filesize
492KB
MD5ac523d21c55d2d2644043c53e75c55f2
SHA1eef365e4a038081b448ca57c1a62442a91337922
SHA256568f3c159a41a0e2bc796dae311399b219263b9cf560c8ee35097e5f82c4a9fd
SHA5120b0f50e108d2a732745b3613fc578d3883747a71b147725db977122e9b9fa52ce56e29ba5b6300da237d7f6e414b4c8b7a4ef296b2539b6e266764a4b1947672
-
Filesize
326KB
MD57fe7107090dd0b3d88aedc6546e1cc4e
SHA147b7e6e0362bcfbeba92920c9d2a97d2d91464e8
SHA256cd505eae50fdf3b4cdf9ca2e8cd92aa71083e5f5f8a5fabdfdffd29a18688182
SHA51211e173dfe65c8594f3fe5095eb0f27115c0048bf6341c09a771234ca5e346dee102fada41f4ec80da3460371e121e12fedacb63547ffc46b6a3fd7d0e068a8b8
-
Filesize
295KB
MD57b9509824ecbc98098a72bd9f82255ef
SHA166b515d756229e615b8c0b3cac95e8189589f4d4
SHA256937c45336dcd8317bbc60a49b4664044624e1090feeb6d64bca4a62d29e825ab
SHA512cec8b69950b259f484f61b63c6300ccfaf2d95daf8a791613514b90dc80a766bf6aae4662555382a0892534b1f0774d0e5794aadb13d78e83f4b049d590287dc
-
Filesize
11KB
MD54bd6694914cb2de0d5e4a1cc0b1c1f74
SHA12f5ad161de0a4735376060d4bac8c58fe8b7107d
SHA25697fe71d12da003907a0b02de0940a32851e8a7052cf5b4070643cc8c136c7408
SHA51254104ccf23ec91c77552527d5e279d8831c83ec5a829a6af5446c49198cefe8c7edc5ffcc97b7cbdff86e3f5925d94966206d3d1c284766c4ed92ecb4b951043