Overview
overview
10Static
static
305b48b2909...29.exe
windows10-2004-x64
1018c3050e5a...e4.exe
windows10-2004-x64
102577bd2a22...1d.exe
windows10-2004-x64
1028839ba22b...c4.exe
windows10-2004-x64
104efca8805f...a2.exe
windows10-2004-x64
106603f1832a...ef.exe
windows10-2004-x64
106ba0db3b66...b3.exe
windows10-2004-x64
1074fe770b34...18.exe
windows10-2004-x64
10b6b53c7022...c9.exe
windows10-2004-x64
10eedc883713...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
18c3050e5ad727d8fc6d2b16a53db9904ba34d7413ce2abfe2cd0baa2cd5dce4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2577bd2a22a0df03082a3d61b193668ccfa94a1aef60cb7bb0a7a5123c552c1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
28839ba22be16cab09b3664b34397e918be834c1459cde49048ffd421d2876c4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
6603f1832a5054b7e8305ef7814111e74fc6f8356ae86cc81f0bd306722236ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6ba0db3b66f5f3df269e1eb1b3241575d1ec8d58b19767274aae0af44946bbb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
74fe770b3414b7af5432877eaaf1d2520b875a38c461d63983c77f7c1b39d918.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
b6b53c7022ec83f58037dc5fee6d8a5dd71ff675b2851d1ebdaac02d608ebac9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
eedc883713775fd0c74224f0bedec2b1e88a105737c823318fc8ba819901d991.exe
Resource
win10v2004-20240508-en
General
-
Target
4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe
-
Size
920KB
-
MD5
324cb7ed10920e1912c6c390c5179a1d
-
SHA1
2cb736bf107171b3047cb7b0ae7085a09704e68f
-
SHA256
4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2
-
SHA512
7575bdf3c2e403de7deae4f0fc663fb6ccd612365da6c59b98fc47f37d42c1bda0aef9b272edd10ea4105a9fb17c992af21ea38c2acf1ca527620e17d795a6cf
-
SSDEEP
12288:8Mr5y90BC08ZhZRpWsDWMuTYKrTDcVl4JRh/+pnKuLp611/cNOaK+oyrfYGzfD+Q:lyTn/qMnHAhWpKuLM7B+VrfvpaG
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral5/memory/1252-28-0x0000000000790000-0x00000000007CE000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4403231.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral5/memory/1168-35-0x00000000005C0000-0x000000000064C000-memory.dmp family_redline behavioral5/memory/1168-42-0x00000000005C0000-0x000000000064C000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4288 y9899703.exe 4652 y8857049.exe 1252 k4403231.exe 1168 l3487692.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4403231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4403231.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9899703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8857049.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1252 k4403231.exe 1252 k4403231.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1252 k4403231.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 432 wrote to memory of 4288 432 4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe 83 PID 432 wrote to memory of 4288 432 4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe 83 PID 432 wrote to memory of 4288 432 4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe 83 PID 4288 wrote to memory of 4652 4288 y9899703.exe 84 PID 4288 wrote to memory of 4652 4288 y9899703.exe 84 PID 4288 wrote to memory of 4652 4288 y9899703.exe 84 PID 4652 wrote to memory of 1252 4652 y8857049.exe 85 PID 4652 wrote to memory of 1252 4652 y8857049.exe 85 PID 4652 wrote to memory of 1252 4652 y8857049.exe 85 PID 4652 wrote to memory of 1168 4652 y8857049.exe 98 PID 4652 wrote to memory of 1168 4652 y8857049.exe 98 PID 4652 wrote to memory of 1168 4652 y8857049.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe"C:\Users\Admin\AppData\Local\Temp\4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9899703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9899703.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8857049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8857049.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4403231.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4403231.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3487692.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3487692.exe4⤵
- Executes dropped EXE
PID:1168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
765KB
MD526dae5d4d05d23028b52c4c7e0d9e320
SHA1e9e6d919072fe394b4048afc8347767dc9c4537e
SHA256a4a82ed5acbefbefaaa605b8f0185acabd756156ce61048890bfc9f925879ca7
SHA512a38cedc65adb6ad51a0d0734803654be11b7e54a2b06e8f71da49a1591b59375cc1146d646cd6571a4b909e6ba8081285ccfec1ab61404362a51578ee6e1c06e
-
Filesize
582KB
MD53597e5b94ee01b55bf51cc13e1e5680a
SHA1a393a16b6d18b53aec4dbc22080009973e1ae894
SHA256f512d47dac15860a182bb26fcb3d05ac6ccf8da19de78c934b2bf2d012a4f6a6
SHA5129d21e10b8722a56d967d3fbafd1c393922fb42658c1a106d88d43f0981b04ebf6abf4a9c372c19fe391694f221aebd613952ff36d0a4ec089f5e8659a50268e3
-
Filesize
294KB
MD5068c37a137de97b4569270eb0fd08b27
SHA19cef9ddd66a3c3a18a6993eff25304d29e95bf6d
SHA256f9adeb967c811f699984b5a9d12d7d5c7090827a0c1ab3bea159c7d04f41286b
SHA51298f1d6795cadb5ffe4f95c05fa3590832fe64cf1ea539199557fba0b4183c50ec7c0fdd210af23d4c769beb1158eca495e5b176d883ee29501334e88c0139cf1
-
Filesize
492KB
MD5da6ff81c6f67611413531f823ea93e2b
SHA18e4244fe534ab3ae1ea22dc12f0665bcec0db34a
SHA25669220a693e0059f35711ed1e66ec35c9b62de85afe4cdb9c282c2d24d9483193
SHA512f4af9745c5dab137c04b0e86f34fc696c1a9d7fcb9ca9733fcd75256981aa6835f3aeffd4f3fc1fce1c07109096c2835a2b6c83bc246ccfd719372059ebe5d36