Overview
overview
10Static
static
31d90edda9f...51.exe
windows7-x64
31d90edda9f...51.exe
windows10-2004-x64
101e44c41d8d...91.exe
windows10-2004-x64
101ed736973c...3e.exe
windows10-2004-x64
1040d54c2855...14.exe
windows10-2004-x64
1041c3e42a10...04.exe
windows10-2004-x64
10559234fc52...e2.exe
windows10-2004-x64
1055c06ba8dc...48.exe
windows10-2004-x64
1067045db960...01.exe
windows10-2004-x64
106d684b37ca...5c.exe
windows10-2004-x64
10755b6a534e...41.exe
windows10-2004-x64
1077cbabe9fe...cf.exe
windows7-x64
377cbabe9fe...cf.exe
windows10-2004-x64
10b0f8fc9921...32.exe
windows10-2004-x64
10b72cfb2517...df.exe
windows10-2004-x64
10ca6d56a637...da.exe
windows10-2004-x64
10cd303f71ad...fd.exe
windows10-2004-x64
10d7a90d1783...78.exe
windows10-2004-x64
10db14966ca7...cb.exe
windows7-x64
10db14966ca7...cb.exe
windows10-2004-x64
10e800205bb9...fd.exe
windows7-x64
3e800205bb9...fd.exe
windows10-2004-x64
10f8a2da44f9...41.exe
windows10-2004-x64
10fc8b501a18...d3.exe
windows7-x64
3fc8b501a18...d3.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
1d90edda9fc0271748934c0813b8946478823a33b5892d1be2ddf3d383fbc851.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d90edda9fc0271748934c0813b8946478823a33b5892d1be2ddf3d383fbc851.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1e44c41d8d889c0d0e018128db620f95ba933996ae31dd11da4f5d407c764691.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1ed736973ca7eb70129cafb36c292298f34a8a710160e69aeec7ad93760ed83e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
40d54c2855f2d7fa637ffb916d28fb16513aa414f6fd1a641b34f92af0d12f14.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
559234fc528754d07d788aa5eff30aba166a9bab82e9eda45a9737647b0e9fe2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
55c06ba8dc9fb792c52ed9ed716cf4f5500da9f73bb66c9ba720a9cb2b666648.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
67045db9602c0bb02004555fcae5f1c816ba6ebea367c933be035b042c153501.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
6d684b37ca877d403cebced125fab4f36a37e290840da5678e0d43fd35796a5c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
77cbabe9fe3b8b9ac3422f2b29fbcb0cdb9ee85c7b64b2bde48da25f6ef608cf.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
77cbabe9fe3b8b9ac3422f2b29fbcb0cdb9ee85c7b64b2bde48da25f6ef608cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b0f8fc992132e7592e37766b35451eaa7dfdbfd3d15abe0b8c692f700870b032.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cd303f71adeaea183389fffb15fb03508d79b98f35d685735ce2273417b6d4fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d7a90d17836776eedb35136022c7ba7fe79203cc0b8c97e790b459c0afd5e578.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db14966ca75480a4e8f9f3d18c7bada2f205a1ac7404dbeda068279afa55b1cb.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
db14966ca75480a4e8f9f3d18c7bada2f205a1ac7404dbeda068279afa55b1cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e800205bb9a5d3866d735915080e828250891d7d9c930245afd8def35dd08dfd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
e800205bb9a5d3866d735915080e828250891d7d9c930245afd8def35dd08dfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
f8a2da44f9c18482323d9e1ed99567d3a35b95656bc1b023d86e12f305565c41.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
fc8b501a1823496ec4685f1c935710517b2ee5331f98bf10c5eb7b69350e59d3.exe
Resource
win7-20240221-en
General
-
Target
755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe
-
Size
1.5MB
-
MD5
1bb75354d6a880535e819b8fdf2c8d44
-
SHA1
94e0291d9d7edf7ccd5f353aa0ada8e05e6c8dd4
-
SHA256
755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41
-
SHA512
006930c07e78a96131c1a339f014a82ce92ca1ecdacb6a23415316fb89a3f0394cd8379958278e8482483730d5435bea8f6bd81411ca84ac4a69ed31952aef21
-
SSDEEP
24576:iyVX5loIiP1DgjsZYPlJ4HIpTuWNMrNMbKXtmwHHRe6YYZDQQDljvq8Ek:JVXAvPKIELmUTXNMrnRReFY5QQJjvq8
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral11/memory/1788-28-0x0000000000420000-0x000000000042A000-memory.dmp healer behavioral11/files/0x000700000002342f-35.dat healer behavioral11/memory/4008-37-0x0000000000490000-0x000000000049A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6285919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6285919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6285919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8252631.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6285919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6285919.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6285919.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral11/memory/432-43-0x0000000000440000-0x0000000000470000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4232 v2323350.exe 1480 v4949453.exe 1540 v6321787.exe 1788 a8252631.exe 4008 b6285919.exe 432 c9599982.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6285919.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8252631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8252631.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2323350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4949453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6321787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1788 a8252631.exe 1788 a8252631.exe 4008 b6285919.exe 4008 b6285919.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1788 a8252631.exe Token: SeDebugPrivilege 4008 b6285919.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4232 3380 755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe 82 PID 3380 wrote to memory of 4232 3380 755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe 82 PID 3380 wrote to memory of 4232 3380 755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe 82 PID 4232 wrote to memory of 1480 4232 v2323350.exe 83 PID 4232 wrote to memory of 1480 4232 v2323350.exe 83 PID 4232 wrote to memory of 1480 4232 v2323350.exe 83 PID 1480 wrote to memory of 1540 1480 v4949453.exe 84 PID 1480 wrote to memory of 1540 1480 v4949453.exe 84 PID 1480 wrote to memory of 1540 1480 v4949453.exe 84 PID 1540 wrote to memory of 1788 1540 v6321787.exe 85 PID 1540 wrote to memory of 1788 1540 v6321787.exe 85 PID 1540 wrote to memory of 1788 1540 v6321787.exe 85 PID 1540 wrote to memory of 4008 1540 v6321787.exe 97 PID 1540 wrote to memory of 4008 1540 v6321787.exe 97 PID 1480 wrote to memory of 432 1480 v4949453.exe 98 PID 1480 wrote to memory of 432 1480 v4949453.exe 98 PID 1480 wrote to memory of 432 1480 v4949453.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe"C:\Users\Admin\AppData\Local\Temp\755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2323350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2323350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4949453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4949453.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6321787.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6321787.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8252631.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8252631.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6285919.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6285919.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9599982.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9599982.exe4⤵
- Executes dropped EXE
PID:432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.4MB
MD50d85fc69da9324944242e79dbc1eefde
SHA1395ff38307e576a0b6620f3af95ce1a6a661bcad
SHA2562c0c54f060489cc82a15e95c8c2819583482cc493d3c58341453a173e8d87bb9
SHA5127ca13450dfc269e0e858eeba715d8f191d98d36de1e9ade4f52ee415cc61ee31f0ecc7f92525ab058e4e057b97e0c229af58805c7d4d77fa049e4f3a3e8aa35f
-
Filesize
1.2MB
MD573c53ab529c8a6fa83de95bf5ebb304b
SHA1c063d1e63fb64d020da7582a67e17a3357d2a819
SHA2565be2d1bcc4d9ee4f6e33bee68338b55812fe96d3f854b6d950ea43fd16290d69
SHA512884949c9e742b3c15268808da62d6323510159fc1066a6eee00f602731b6cd0e336638ea6e35410dbe9fdd057bfe28f746e69d23d0e3471ea49d60f4e4924a13
-
Filesize
692KB
MD5475d0ecc8694f7095508c0bd5b0ae28e
SHA1dc069c0912dcfbefd45a500cb3278e39c67c955e
SHA2568712754417238e8bccd196c9235446c7bc25b95be69774d359b49057325e4f8d
SHA512b11a2067a2f103df629fc030a32ceff4d0bdbbe040b01411fc060925225486a9a1c6a0a1cd72eb987bd8d0e3e64bf88d1938e7214cf365ffdc8a2b0edc1b26e9
-
Filesize
620KB
MD55ad3b8790bf7d920f98f4d64ff7c7412
SHA1e999531a09f6856535a3adc0d90d796486a33b99
SHA25642c8992894c5db50511241661e52512a2c55078102f8693fd4f229a1d868aec2
SHA512f8ff9fa3cc42dccb6628b991b2ce1d37474f5e05d0f4dc8497a77d7c30d155862e4bc18626b95f9e08e0b6c814a31abf2870ee2feb605ebf4db918cf93ff78d5
-
Filesize
530KB
MD5d74cb65d452b63e69711a30e3f15ff47
SHA1030a72a4b9dae5e353d720068c5eb7ef6080bdb3
SHA25693b8bbb8698f84222d85143b6580eae2e743572ea364378b0322fe17f2400da2
SHA512d038a10ac29af26469b85783072851390918de10dfb285ad794f034d4deef5c2e860ec16750685a11fde5ce2c886016bddbef8097db9f8f59fcd94a98fe47acd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91