Overview
overview
10Static
static
7082abd50bc...72.exe
windows10-2004-x64
100a70b4612b...f6.exe
windows10-2004-x64
10136b546d35...01.exe
windows10-2004-x64
101ec8ce9ace...96.exe
windows10-2004-x64
1028e73a1086...9a.exe
windows7-x64
728e73a1086...9a.exe
windows10-2004-x64
73a5fd7dfde...92.exe
windows10-2004-x64
1056dbfb10e0...5d.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
10660944c2e2...12.exe
windows10-2004-x64
106b061fa476...e8.exe
windows10-2004-x64
10795a49ee81...4a.exe
windows10-2004-x64
107d1f6eeb31...ef.exe
windows10-2004-x64
1080f298c436...94.exe
windows10-2004-x64
1085555569bb...4d.exe
windows10-2004-x64
10bd2cad4003...26.exe
windows10-2004-x64
10c429566ed4...39.exe
windows10-2004-x64
10c47b15f967...7d.exe
windows10-2004-x64
10ce9f75c073...16.exe
windows10-2004-x64
10cfdc6cd562...d3.exe
windows10-2004-x64
10eb81f341bc...da.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:13
Behavioral task
behavioral1
Sample
082abd50bc322e65df7b85b918d5bc248c652483544b6e4c453e9531969df172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0a70b4612b5a8fdde3e7cb75dcc0caca23c46bd980d396bb52f7efc9d122c8f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1ec8ce9ace042665b07a0abc5b206634b1417b5f2a4a00b4554147d518832396.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
3a5fd7dfdeb2d39f59735a8fd4f3621bef5a632886c19bfffeacac3350c44092.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56dbfb10e07e622006233e2ca432e9b289e276470e18ab3efe037a1c17c40d5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
660944c2e28e356790c36fcc99f1413b6daff34f154aeeda556c351fc695e812.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6b061fa4768c28530459442828163e1c4cf33aa058cd0846566771b57ecf36e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
795a49ee81e6eb25d2140b564c0aa63d165592e4d3b7bb4c29423c619b51334a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7d1f6eeb31bd2e40692c777766b604a0bf50848518f5c931a53d7c48b988e8ef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
80f298c436aec6fc79755a500c4350e1d63215b9088f36710903936de3cedc94.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
85555569bb7d45d357512a0eafac484c22aee485efcb08f16f10d5cba19ad94d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ce9f75c073171b1315c869b550348e6d8c48a986b262a068b33f0833b7a24716.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
cfdc6cd562d69f4233d6d8bcde44d4bd5e6825bd17383e6bb2f76b9fd006ead3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
eb81f341bc6cd2678bd7559862571f5294b6980de5199672afa03b21de0a4dda.exe
Resource
win10v2004-20240508-en
General
-
Target
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe
-
Size
309KB
-
MD5
2b9af2f423ddd5e5022d79ce0fc8ef82
-
SHA1
5e2592a9d3167b27d130b4f054175cf9a4ec407a
-
SHA256
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639
-
SHA512
19274e6cc635c5c8bcd4c48f4859e0d40f023eabf94413d8845c98c4a2d41a676c30129002956e9bbfb0835cc1ec0749df326fd95efdf9dc849d84ab6b1123e4
-
SSDEEP
6144:KDy+bnr+ip0yN90QEx5F5OYc1u31g4TBymqSI6pz9wfWF33OHqK:VMr2y90Rxc1u31TTEYZ3wfWlMqK
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral18/memory/1612-8-0x0000000002200000-0x000000000221A000-memory.dmp healer behavioral18/memory/1612-11-0x0000000005080000-0x0000000005098000-memory.dmp healer behavioral18/memory/1612-12-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-39-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-37-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-35-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-33-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-31-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-29-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-27-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-25-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-23-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-21-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-19-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-17-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-15-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral18/memory/1612-13-0x0000000005080000-0x0000000005092000-memory.dmp healer -
Processes:
a9236674.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9236674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9236674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9236674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9236674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9236674.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9236674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b3995746.exe family_redline behavioral18/memory/3964-46-0x0000000000B30000-0x0000000000B60000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
a9236674.exeb3995746.exepid process 1612 a9236674.exe 3964 b3995746.exe -
Processes:
a9236674.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9236674.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9236674.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a9236674.exepid process 1612 a9236674.exe 1612 a9236674.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a9236674.exedescription pid process Token: SeDebugPrivilege 1612 a9236674.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exedescription pid process target process PID 2668 wrote to memory of 1612 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe a9236674.exe PID 2668 wrote to memory of 1612 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe a9236674.exe PID 2668 wrote to memory of 1612 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe a9236674.exe PID 2668 wrote to memory of 3964 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe b3995746.exe PID 2668 wrote to memory of 3964 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe b3995746.exe PID 2668 wrote to memory of 3964 2668 c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe b3995746.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe"C:\Users\Admin\AppData\Local\Temp\c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a9236674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a9236674.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b3995746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b3995746.exe2⤵
- Executes dropped EXE
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD59d6a6a164c9371fe63996d4ee60608df
SHA1acc572756616ba0cdd302803ade94f4d6f1c447e
SHA256b80f9eb78c1bc9d2e6abcb79000108ca6ca2700ee20d4c1d9e221d30813383e0
SHA512c56e4df370b0d536176c362c49f9664f4a5f49b35034e4cc1c70459bfde95fb3d8ae044b7014323fbc20210313a1f489a42f5ad15957529c6446af93ce17bebf
-
Filesize
168KB
MD572d543112c67db99263bdcdb053c5200
SHA15ed8046e303358157f833bfb8bcb42966f3ab14d
SHA256c7a850a137dec0ca9e361fde39aacb695d98e1165eb401929fbbff687950e0c5
SHA51232e8967b5136d9799fd0de5c324c075dbd5ba3a5506ee0fb9d070a249e3a52b4a18db04d1cc71517fbecb44897cf6a3dc76d4fa175dd54973ecefd6ad99c7a7e