Overview
overview
10Static
static
7082abd50bc...72.exe
windows10-2004-x64
100a70b4612b...f6.exe
windows10-2004-x64
10136b546d35...01.exe
windows10-2004-x64
101ec8ce9ace...96.exe
windows10-2004-x64
1028e73a1086...9a.exe
windows7-x64
728e73a1086...9a.exe
windows10-2004-x64
73a5fd7dfde...92.exe
windows10-2004-x64
1056dbfb10e0...5d.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
10660944c2e2...12.exe
windows10-2004-x64
106b061fa476...e8.exe
windows10-2004-x64
10795a49ee81...4a.exe
windows10-2004-x64
107d1f6eeb31...ef.exe
windows10-2004-x64
1080f298c436...94.exe
windows10-2004-x64
1085555569bb...4d.exe
windows10-2004-x64
10bd2cad4003...26.exe
windows10-2004-x64
10c429566ed4...39.exe
windows10-2004-x64
10c47b15f967...7d.exe
windows10-2004-x64
10ce9f75c073...16.exe
windows10-2004-x64
10cfdc6cd562...d3.exe
windows10-2004-x64
10eb81f341bc...da.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:13
Behavioral task
behavioral1
Sample
082abd50bc322e65df7b85b918d5bc248c652483544b6e4c453e9531969df172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0a70b4612b5a8fdde3e7cb75dcc0caca23c46bd980d396bb52f7efc9d122c8f6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1ec8ce9ace042665b07a0abc5b206634b1417b5f2a4a00b4554147d518832396.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
3a5fd7dfdeb2d39f59735a8fd4f3621bef5a632886c19bfffeacac3350c44092.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56dbfb10e07e622006233e2ca432e9b289e276470e18ab3efe037a1c17c40d5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
660944c2e28e356790c36fcc99f1413b6daff34f154aeeda556c351fc695e812.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6b061fa4768c28530459442828163e1c4cf33aa058cd0846566771b57ecf36e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
795a49ee81e6eb25d2140b564c0aa63d165592e4d3b7bb4c29423c619b51334a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7d1f6eeb31bd2e40692c777766b604a0bf50848518f5c931a53d7c48b988e8ef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
80f298c436aec6fc79755a500c4350e1d63215b9088f36710903936de3cedc94.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
85555569bb7d45d357512a0eafac484c22aee485efcb08f16f10d5cba19ad94d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
ce9f75c073171b1315c869b550348e6d8c48a986b262a068b33f0833b7a24716.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
cfdc6cd562d69f4233d6d8bcde44d4bd5e6825bd17383e6bb2f76b9fd006ead3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
eb81f341bc6cd2678bd7559862571f5294b6980de5199672afa03b21de0a4dda.exe
Resource
win10v2004-20240508-en
General
-
Target
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe
-
Size
309KB
-
MD5
29b6f7f057eac5b191f6c8afd570de01
-
SHA1
42d70940116df9fd978d8c6c8429c125fc421670
-
SHA256
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d
-
SHA512
08da0693b309a1b7549610f10e1f90e47deb87033a78403caa0220e916ffb2f4126f07848d7a8c1f94c947ce2915933ad205cb4e5ba54f5d0d560cf486642207
-
SSDEEP
6144:KHy+bnr+Up0yN90QE05F5OYc1u31g4TByPS6C+jIQpO56Iw:9MrEy90uxc1u31TTEP/7vxd
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral19/memory/1800-8-0x0000000002490000-0x00000000024AA000-memory.dmp healer behavioral19/memory/1800-11-0x00000000050A0000-0x00000000050B8000-memory.dmp healer behavioral19/memory/1800-39-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-37-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-35-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-33-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-31-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-29-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-27-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-25-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-23-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-21-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-19-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-17-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-15-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-13-0x00000000050A0000-0x00000000050B2000-memory.dmp healer behavioral19/memory/1800-12-0x00000000050A0000-0x00000000050B2000-memory.dmp healer -
Processes:
a3027297.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3027297.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b5851738.exe family_redline behavioral19/memory/2044-46-0x00000000009A0000-0x00000000009D0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
a3027297.exeb5851738.exepid process 1800 a3027297.exe 2044 b5851738.exe -
Processes:
a3027297.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3027297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3027297.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a3027297.exepid process 1800 a3027297.exe 1800 a3027297.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a3027297.exedescription pid process Token: SeDebugPrivilege 1800 a3027297.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exedescription pid process target process PID 5056 wrote to memory of 1800 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe a3027297.exe PID 5056 wrote to memory of 1800 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe a3027297.exe PID 5056 wrote to memory of 1800 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe a3027297.exe PID 5056 wrote to memory of 2044 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe b5851738.exe PID 5056 wrote to memory of 2044 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe b5851738.exe PID 5056 wrote to memory of 2044 5056 c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe b5851738.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe"C:\Users\Admin\AppData\Local\Temp\c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3027297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3027297.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b5851738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b5851738.exe2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5a92537fedf49fd467c41d80bde9ba55d
SHA1685abba2395ef1a3405f91e849e452ee4aa99226
SHA256a0e9f5fb78ce13719eba331ddc31e1c9e0c7712c8466692695331657658ff404
SHA512c90ceefe96baeb9583e1834ec1b3b058785cf466a2d998c32e3e644413e9ad515359ccccb87c8575af0120be27af3dd167dcdbe01c3246fb451b6d321c80282f
-
Filesize
168KB
MD5a71b72e1859bd9a5c048a3c5ee5dfc7b
SHA199896b37b82091d11c534ec59e0c4204f4cd0fcc
SHA256141b7eea951585dfd88dbdcd219722d2d8307fc7cbf8c720bd23e3b897966d60
SHA512b970d9a52df7a0f34e53515f0a6ca9f6cd01d6b1efefc0c4ccbd08a789281251a57181f813e2c2ddef1d679e73f15357842367307052dd25204c16904c605ce1