Overview
overview
10Static
static
330b55fc29e...75.exe
windows10-2004-x64
104f6b8faa68...86.exe
windows10-2004-x64
1068c37c8307...6a.exe
windows10-2004-x64
10699bfc597d...1d.exe
windows10-2004-x64
10844b5b7693...ab.exe
windows10-2004-x64
1086a6beb680...62.exe
windows10-2004-x64
109cf3d2bf3c...cb.exe
windows10-2004-x64
10ca9f078739...a4.exe
windows10-2004-x64
10d0ab8687e3...e2.exe
windows10-2004-x64
10fb468a211d...c3.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
4f6b8faa6814b26627c6c8eac0bc9c5237229efaec31a93ac5634db12970f986.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
699bfc597d56fb4ed7153a5a4fe2851361b9e27b9b8c3109277f0c5a54afbe1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
86a6beb6802f9ec2aa387143ba41461fb82783226223ba68b44e49b21c8d3d62.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
9cf3d2bf3c4df3cc22948e45de303aec0f5ffce78a74c453774be0f6f060f6cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
ca9f07873920ecd0518ecf148ae1351a8ecb3ce1fe033aa44b45de07f87202a4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe
Resource
win10v2004-20240426-en
General
-
Target
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe
-
Size
1.5MB
-
MD5
81ea008f898bb51262018817b54fa84a
-
SHA1
df835f5a494bbd56fabb7130b8a9a82d7841f442
-
SHA256
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab
-
SHA512
4b2f570869aa81eaf5fd7ba232fc080de0797d3c7f99e6f83a9e5da93fe6c5fa317078cd6f72d7e00e3009dc67981638147679f6479fe8183070fef6d0518265
-
SSDEEP
24576:Tyr5T2KzBFhNW2AYXX5BMzudjFcDnuJnRP9pJ7lyel+C4hIa8XCGKysC8F:mxVvhYY/BFcnuJh9jZyxCKOSFyr8
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral5/memory/2624-28-0x0000000000420000-0x000000000042A000-memory.dmp healer behavioral5/files/0x0007000000023435-35.dat healer behavioral5/memory/4824-37-0x0000000000230000-0x000000000023A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8325876.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2765561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2765561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2765561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2765561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2765561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2765561.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral5/memory/1168-43-0x0000000000520000-0x0000000000550000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4864 v6205559.exe 4848 v7919191.exe 2052 v1172693.exe 2624 a8325876.exe 4824 b2765561.exe 1168 c7155504.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8325876.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2765561.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6205559.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7919191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1172693.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2624 a8325876.exe 2624 a8325876.exe 4824 b2765561.exe 4824 b2765561.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2624 a8325876.exe Token: SeDebugPrivilege 4824 b2765561.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4864 4480 844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe 82 PID 4480 wrote to memory of 4864 4480 844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe 82 PID 4480 wrote to memory of 4864 4480 844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe 82 PID 4864 wrote to memory of 4848 4864 v6205559.exe 83 PID 4864 wrote to memory of 4848 4864 v6205559.exe 83 PID 4864 wrote to memory of 4848 4864 v6205559.exe 83 PID 4848 wrote to memory of 2052 4848 v7919191.exe 84 PID 4848 wrote to memory of 2052 4848 v7919191.exe 84 PID 4848 wrote to memory of 2052 4848 v7919191.exe 84 PID 2052 wrote to memory of 2624 2052 v1172693.exe 85 PID 2052 wrote to memory of 2624 2052 v1172693.exe 85 PID 2052 wrote to memory of 2624 2052 v1172693.exe 85 PID 2052 wrote to memory of 4824 2052 v1172693.exe 97 PID 2052 wrote to memory of 4824 2052 v1172693.exe 97 PID 4848 wrote to memory of 1168 4848 v7919191.exe 98 PID 4848 wrote to memory of 1168 4848 v7919191.exe 98 PID 4848 wrote to memory of 1168 4848 v7919191.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe"C:\Users\Admin\AppData\Local\Temp\844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6205559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6205559.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7919191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7919191.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1172693.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1172693.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8325876.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8325876.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765561.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2765561.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7155504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7155504.exe4⤵
- Executes dropped EXE
PID:1168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.3MB
MD5088e87133ee678a8b31b0d7bbb951c02
SHA1325f430bbc59fd3ff123f2f4d34dd214c1c889ec
SHA2566d52a07c3772ac6446969c4d8274e818055f73f6bb281ef5a37ad52e0258c575
SHA5124436b9d28876888b6ecfd0addb5271628b7f203385c11821040c36edb70a73f7c2d41bbc39a680fd1c30f6c83717132c398e94c97d42b886e9bf3c189f99c761
-
Filesize
1.2MB
MD58a33e531826f517c8c47a87bc964ecfa
SHA198307298753791fa2db99202295e2b4dcea03ce9
SHA2567bf34c5225e719b7cd23083c0f928af79494fc3989398529722851ac2b7a9218
SHA5129630d116fd597f05b91816ef281c190023e1cf90fa4726f75a4cb85011b44d73e2536f8e0e61d22acd3da27f83a27f647c6bc6993126ec6c55285938a3cc4392
-
Filesize
691KB
MD50e6ae50e619cd27c3be7dd5e0d0470d9
SHA1966d3d9e8620f8c6ee53bab1a199c417816f31e8
SHA25698ed2c4dfcadc878a5e304dda49c41d447568987665fc2a8ab6d52e8da7ebc61
SHA51277b0adc9810df719df683d87a51b38f203b633a1ddf84f236f01a9799ebeb221adc52e2efa349e0cfdb0c404b74b9cce7b29d53f65b8d1dabe65a66cafea6657
-
Filesize
619KB
MD5244fa5db56a8d8a66dd74760a4f86238
SHA13391d935288848c9a3cc345453cf1862cf6a7eca
SHA2561bee181c1474a31c880e539118c43f9e9d0cba1fff75e94fe79336d02fd65e97
SHA512227c2de03946d9ff074c2e7c929a68aa2a42382a0def297cffc6ee688c3b218809f9fd91a7207f4886b53c9bd633b6ef8e2819808448ae3d7ca946a3fd8a27db
-
Filesize
530KB
MD5abeb534b362dfb9b8421850442516a17
SHA12b8b0de64fb3ecf726206bb0fc7224788d98f78e
SHA2561963a5127acbfa67b1133acb3279ac8765ec2b021be43036bfcfe5b6c8dc366d
SHA51276788eb2296c5e644aaefcb28b83494bdd41c4535be1a49ddf2b1ac52d3b5bd6eb2cc745cb843adf662e59bada6211cff6fdc04f89c31519b2c93f7a910d3e7c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91