Overview
overview
10Static
static
303cef1108b...25.exe
windows10-2004-x64
10062bf5eda9...2b.exe
windows10-2004-x64
101c0cc29edf...ac.exe
windows10-2004-x64
101c46e1db34...f7.exe
windows10-2004-x64
1020811d5e08...84.exe
windows10-2004-x64
1028627b3333...c8.exe
windows10-2004-x64
10437213eb4b...b5.exe
windows10-2004-x64
1054a19d5a7a...d8.exe
windows10-2004-x64
106407653fb9...7c.exe
windows10-2004-x64
106dd993cade...4e.exe
windows10-2004-x64
10764d92d88b...5f.exe
windows10-2004-x64
109c51d813e0...74.exe
windows7-x64
39c51d813e0...74.exe
windows10-2004-x64
10b813f799e9...17.exe
windows10-2004-x64
10bc2ed7f926...f9.exe
windows10-2004-x64
10c1a9af1ad6...d5.exe
windows10-2004-x64
10cf90d774fa...01.exe
windows10-2004-x64
10e65fa29126...d8.exe
windows10-2004-x64
10e81854abc9...1a.exe
windows10-2004-x64
10ed835b70d5...6c.exe
windows10-2004-x64
10f48c36cb91...ef.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
03cef1108b01e5304207d3fb3a53f024ec18e0178c6dc16454723a9c7852ab25.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
062bf5eda95fa04c7146882ac1efb5ae43eaee0cd4c121db8c1c2edf9412932b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1c0cc29edf3fda05ac6cd12ee7acdaf9ca6233c60ef212f53b42d088f670c7ac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1c46e1db345610fe8ef6a2fe37c7407b77ab614fd47b00a74971f892275e38f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
20811d5e089d4e2f65301bba6dbb3776615b8a82ea39cd03d088665a7bf27384.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28627b333375a37a072336a76d858a5b0758fe2abe01c16f17f6acfab4c573c8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
437213eb4b67386b44ee8203e45489fe45f788fa215cc4f60982184a2231a6b5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
54a19d5a7a4bbca3496b0edc5d80a240350e944513622d242341964e048d96d8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6dd993cadea9e368a14c0ab840b0e2d0dd3ca3d699734998da4237aed7f2354e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
764d92d88ba9348555a1351396433cb6b93afd1bc3dcf27a5a06c2bb7aed5c5f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c51d813e0b6dfff0694c63e6d13665bb46ddf09cedb2159d701913f09142374.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
9c51d813e0b6dfff0694c63e6d13665bb46ddf09cedb2159d701913f09142374.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b813f799e9c2f3b9ed25625bea968e14cbcad8bb1b3918ebcd79f631192ca017.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc2ed7f9261c39ac6c835adcdf9ff7f4b70696ce459a50a2645194f5597507f9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1a9af1ad640c504ed95e8f26021a55d127de1e35d0794f2bdaddd1451de08d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
cf90d774faa53f828a5c0c7fd9b7693ab9e6a5b59349863524aae5284b993f01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e65fa291263fc43fdfd3ce7a071b11f1ea2a2f55c02321bfd476a1d4c33e7bd8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e81854abc9bd7ae970c918e0839982609691e44919d3a96eee12840676c28e1a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ed835b70d57f3901ebdd0814415cbc64776d5bb9ee43a7077c0894540d7dde6c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
f48c36cb917c3b50876b9e4240a3abaae73007be0713d0630ca8279bfae862ef.exe
Resource
win10v2004-20240426-en
General
-
Target
6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe
-
Size
921KB
-
MD5
23035d801b41b05a6f6df0913478eb81
-
SHA1
c00c74a50b7d973b64d70b10c8793dc0989d8f13
-
SHA256
6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c
-
SHA512
82eba7b6998d46c337d4d731b8e81d9db3dc3193ed218d7c577c3d22928b22d8d25a3bdb714e6c472e6ac2a6f38d67ff906ccb707a0db37f3dab11c8ff7af66d
-
SSDEEP
24576:Byve36Qov9lp/uRuA+QUdJFGmdbXVaI8Ui:0veKQU9DujUvFNbFNj
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral9/memory/3084-28-0x0000000000560000-0x000000000059E000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5425176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5425176.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5425176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5425176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5425176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5425176.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral9/memory/2684-35-0x00000000005E0000-0x000000000066C000-memory.dmp family_redline behavioral9/memory/2684-42-0x00000000005E0000-0x000000000066C000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4692 y4737519.exe 4296 y3747439.exe 3084 k5425176.exe 2684 l7064682.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5425176.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5425176.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4737519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3747439.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3084 k5425176.exe 3084 k5425176.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 k5425176.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4692 3472 6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe 85 PID 3472 wrote to memory of 4692 3472 6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe 85 PID 3472 wrote to memory of 4692 3472 6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe 85 PID 4692 wrote to memory of 4296 4692 y4737519.exe 86 PID 4692 wrote to memory of 4296 4692 y4737519.exe 86 PID 4692 wrote to memory of 4296 4692 y4737519.exe 86 PID 4296 wrote to memory of 3084 4296 y3747439.exe 88 PID 4296 wrote to memory of 3084 4296 y3747439.exe 88 PID 4296 wrote to memory of 3084 4296 y3747439.exe 88 PID 4296 wrote to memory of 2684 4296 y3747439.exe 99 PID 4296 wrote to memory of 2684 4296 y3747439.exe 99 PID 4296 wrote to memory of 2684 4296 y3747439.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe"C:\Users\Admin\AppData\Local\Temp\6407653fb96eb144397cd5292be81f74ffb0eb8949a8d73e1a21ee3c9e85f97c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4737519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4737519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3747439.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3747439.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5425176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5425176.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7064682.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l7064682.exe4⤵
- Executes dropped EXE
PID:2684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
765KB
MD532d65c6b1e1000c4dc8a5ebe7185c674
SHA1ced08457ff41a0d858eb47971bf4d93aa99e8cad
SHA256794a09c855f2991d1d94580bdff9f5e023a4d74bbf7393dadfecc8d2ffe7f084
SHA5122535f92cc94ae882cd63671b604167908c1cd8a9e9bbe2cbed98e97a9954bd8b491269be2f83ef2545f3ecc8445bb02676e2703523928d45e851f6661a6512cd
-
Filesize
582KB
MD524bce780d2a95214232275e393c58ed0
SHA1cdc7f7c67e6c4f46015576330566c0ace748a13e
SHA256b76a1f37300d03c7e10e6c7053db41f37394465dda022a6543ae3f973f9ae58b
SHA512aab1edce1bec560e98b807807c2521a52cd2e33e6c6ecf19187ab3a86760288c0ecda62edb9add08323710f2cdba44b4ba155852b37d0c608f3b02f55b22d133
-
Filesize
293KB
MD5b694ef9945bf398ba650c6f57f31b3bd
SHA1dbe3b60eb4677e90ddb936f0338c590b462f7019
SHA25698bdefbf27bb2a2b21d59dde783a6df6c5b9e1cf3767aa13816ff037ec48b7c4
SHA512b9f16dc82ee3a5d4fdcac50e155422d9634b8efd085ef681513f342d58947ebb9b049a20922ee2ee946ace6e381ca59641447b25ad0e8c14e2fd8bd843cc7f6a
-
Filesize
492KB
MD5c6c408a43874eb69c3359a10b08813fd
SHA194b21b6b8b892434f87c1b6218b7adc20f8a43b8
SHA256df9e9f264090df39cfdfbc6dadb7361ed28732e0fc9a8831eaf5d34f869f0393
SHA512583ffc6bcc9d5338455d2867c88779fafdfa1c69aa5444832813f36d0c64b83c7c939593b49296b6e739c06800ab3a6b54e515079d9a7983a169674f2e5ab3db