Overview
overview
10Static
static
31d90edda9f...51.exe
windows7-x64
31d90edda9f...51.exe
windows10-2004-x64
101e44c41d8d...91.exe
windows10-2004-x64
101ed736973c...3e.exe
windows10-2004-x64
1040d54c2855...14.exe
windows10-2004-x64
1041c3e42a10...04.exe
windows10-2004-x64
10559234fc52...e2.exe
windows10-2004-x64
1055c06ba8dc...48.exe
windows10-2004-x64
1067045db960...01.exe
windows10-2004-x64
106d684b37ca...5c.exe
windows10-2004-x64
10755b6a534e...41.exe
windows10-2004-x64
1077cbabe9fe...cf.exe
windows7-x64
377cbabe9fe...cf.exe
windows10-2004-x64
10b0f8fc9921...32.exe
windows10-2004-x64
10b72cfb2517...df.exe
windows10-2004-x64
10ca6d56a637...da.exe
windows10-2004-x64
10cd303f71ad...fd.exe
windows10-2004-x64
10d7a90d1783...78.exe
windows10-2004-x64
10db14966ca7...cb.exe
windows7-x64
10db14966ca7...cb.exe
windows10-2004-x64
10e800205bb9...fd.exe
windows7-x64
3e800205bb9...fd.exe
windows10-2004-x64
10f8a2da44f9...41.exe
windows10-2004-x64
10fc8b501a18...d3.exe
windows7-x64
3fc8b501a18...d3.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
1d90edda9fc0271748934c0813b8946478823a33b5892d1be2ddf3d383fbc851.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d90edda9fc0271748934c0813b8946478823a33b5892d1be2ddf3d383fbc851.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1e44c41d8d889c0d0e018128db620f95ba933996ae31dd11da4f5d407c764691.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1ed736973ca7eb70129cafb36c292298f34a8a710160e69aeec7ad93760ed83e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
40d54c2855f2d7fa637ffb916d28fb16513aa414f6fd1a641b34f92af0d12f14.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
559234fc528754d07d788aa5eff30aba166a9bab82e9eda45a9737647b0e9fe2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
55c06ba8dc9fb792c52ed9ed716cf4f5500da9f73bb66c9ba720a9cb2b666648.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
67045db9602c0bb02004555fcae5f1c816ba6ebea367c933be035b042c153501.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
6d684b37ca877d403cebced125fab4f36a37e290840da5678e0d43fd35796a5c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
755b6a534ecd54fe181f1ec9de55ba3fba4d9177430ed1586a6ecc6183812e41.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
77cbabe9fe3b8b9ac3422f2b29fbcb0cdb9ee85c7b64b2bde48da25f6ef608cf.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
77cbabe9fe3b8b9ac3422f2b29fbcb0cdb9ee85c7b64b2bde48da25f6ef608cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
b0f8fc992132e7592e37766b35451eaa7dfdbfd3d15abe0b8c692f700870b032.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
b72cfb25178ac78d0dfae350873df231a1f4266a913f47acc5018b87cae84bdf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cd303f71adeaea183389fffb15fb03508d79b98f35d685735ce2273417b6d4fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d7a90d17836776eedb35136022c7ba7fe79203cc0b8c97e790b459c0afd5e578.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db14966ca75480a4e8f9f3d18c7bada2f205a1ac7404dbeda068279afa55b1cb.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
db14966ca75480a4e8f9f3d18c7bada2f205a1ac7404dbeda068279afa55b1cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e800205bb9a5d3866d735915080e828250891d7d9c930245afd8def35dd08dfd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
e800205bb9a5d3866d735915080e828250891d7d9c930245afd8def35dd08dfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
f8a2da44f9c18482323d9e1ed99567d3a35b95656bc1b023d86e12f305565c41.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
fc8b501a1823496ec4685f1c935710517b2ee5331f98bf10c5eb7b69350e59d3.exe
Resource
win7-20240221-en
General
-
Target
41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe
-
Size
921KB
-
MD5
1beb0795600816557ce325b1c1b59324
-
SHA1
acd5093044581410d96d772542ffdc6894a135d6
-
SHA256
41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404
-
SHA512
0b3f9aa94ef91c59bf2247bddb2c481a4cf5bc5bc51a27c48d7ba016027f9b653ee92f77a3575e60061db0201b334e11cfef11e942ebf984dfc6cb7d68545958
-
SSDEEP
24576:Jyp6CnbbnjhaWAaqWc5YbDUAmuHVunxx:8P8faql54Dl3V
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral6/memory/3620-28-0x00000000005B0000-0x00000000005EE000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7883988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7883988.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7883988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7883988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7883988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7883988.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral6/memory/3492-35-0x0000000001FF0000-0x000000000207C000-memory.dmp family_redline behavioral6/memory/3492-42-0x0000000001FF0000-0x000000000207C000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1524 y5659372.exe 1232 y6482541.exe 3620 k7883988.exe 3492 l9973435.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7883988.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7883988.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5659372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6482541.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3620 k7883988.exe 3620 k7883988.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3620 k7883988.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3608 wrote to memory of 1524 3608 41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe 85 PID 3608 wrote to memory of 1524 3608 41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe 85 PID 3608 wrote to memory of 1524 3608 41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe 85 PID 1524 wrote to memory of 1232 1524 y5659372.exe 86 PID 1524 wrote to memory of 1232 1524 y5659372.exe 86 PID 1524 wrote to memory of 1232 1524 y5659372.exe 86 PID 1232 wrote to memory of 3620 1232 y6482541.exe 87 PID 1232 wrote to memory of 3620 1232 y6482541.exe 87 PID 1232 wrote to memory of 3620 1232 y6482541.exe 87 PID 1232 wrote to memory of 3492 1232 y6482541.exe 98 PID 1232 wrote to memory of 3492 1232 y6482541.exe 98 PID 1232 wrote to memory of 3492 1232 y6482541.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe"C:\Users\Admin\AppData\Local\Temp\41c3e42a10f8af49168bee5f6dea01eec1d5e814739aca0229cec79aa4fb5404.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5659372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5659372.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6482541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6482541.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7883988.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7883988.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9973435.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9973435.exe4⤵
- Executes dropped EXE
PID:3492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
765KB
MD595e4a8f41bca6bb2d6a28fefff8a6f14
SHA15e8cc68b5720ee13aeb6419a1fa41bc09b99ec3d
SHA256bb6484b52078d8b2107fd568f7d0c871021ac1c82ec70d295e602e8f50bcb7c8
SHA512e390a6d632aad87666985827761e4c69ac39899845e1f6abb13cda37d1ec1fa8a4ffa0992d885e5415a372a4c5f7755d61ec5122aee4724d9161301041c8ea51
-
Filesize
582KB
MD5ae7dcaf31955b10f6ecba5f649dd83e2
SHA138a7be9d4965aa1866db417951a2a5217f0ebe92
SHA256b8e5590b23a408b05b4bfe00e5eb1c7b8b657f1e9ab6565c6a6d30147ab4f5cb
SHA512d7d6aacde25996ddbd08df92f8e1306ea24abfeb290e985303e7009b889337c2aa2f1080cca2366627feb10de24c903b8cc5db35d2c181fb3837a308072c82bd
-
Filesize
294KB
MD5dd329a91731d29291b0e49aac30b1ade
SHA12e11d485b3a6752b765f9ca9a230b9f611e96579
SHA2566e283bcf7c2fcb9c137ccc493a52dfe1299bb1879c5bd53fed57d015b23724b8
SHA512833ce95679282a3d51dc2d99ae7044ee9db27b0dde6741db74fdd8b8982da303d8ca58c733aff6397fb788067513040a7157227ff2749833bf18f40e7d36e2de
-
Filesize
492KB
MD51e8e5d3012e149936d72e9d2d0ca74d7
SHA1bef43c6355793a6a89d9904dd3ffef9515975d2f
SHA256baed1016d2a42a5e79500e392455218b03840fcfc6b4117ac07cf7580a98b2dd
SHA51293ae2c02a62d985386537943088f252beb26231d7567813695c9664f841a506877329a32b0cd7063327dc22f02348b2192b74760b325f64cb413ab4d9e34aa63