Overview
overview
10Static
static
7082abd50bc...72.exe
windows10-2004-x64
100a70b4612b...f6.exe
windows10-2004-x64
10136b546d35...01.exe
windows10-2004-x64
101ec8ce9ace...96.exe
windows10-2004-x64
1028e73a1086...9a.exe
windows7-x64
728e73a1086...9a.exe
windows10-2004-x64
73a5fd7dfde...92.exe
windows10-2004-x64
1056dbfb10e0...5d.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
10660944c2e2...12.exe
windows10-2004-x64
106b061fa476...e8.exe
windows10-2004-x64
10795a49ee81...4a.exe
windows10-2004-x64
107d1f6eeb31...ef.exe
windows10-2004-x64
1080f298c436...94.exe
windows10-2004-x64
1085555569bb...4d.exe
windows10-2004-x64
10bd2cad4003...26.exe
windows10-2004-x64
10c429566ed4...39.exe
windows10-2004-x64
10c47b15f967...7d.exe
windows10-2004-x64
10ce9f75c073...16.exe
windows10-2004-x64
10cfdc6cd562...d3.exe
windows10-2004-x64
10eb81f341bc...da.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:14
Behavioral task
behavioral1
Sample
082abd50bc322e65df7b85b918d5bc248c652483544b6e4c453e9531969df172.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0a70b4612b5a8fdde3e7cb75dcc0caca23c46bd980d396bb52f7efc9d122c8f6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
136b546d35913e21d69572f169ae203809c1521256619595aa6b15d763436c01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1ec8ce9ace042665b07a0abc5b206634b1417b5f2a4a00b4554147d518832396.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
28e73a10869c3ce55af51de963cb8f48eac48b8f171602308b167d940e58899a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3a5fd7dfdeb2d39f59735a8fd4f3621bef5a632886c19bfffeacac3350c44092.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
56dbfb10e07e622006233e2ca432e9b289e276470e18ab3efe037a1c17c40d5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
660944c2e28e356790c36fcc99f1413b6daff34f154aeeda556c351fc695e812.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
6b061fa4768c28530459442828163e1c4cf33aa058cd0846566771b57ecf36e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
795a49ee81e6eb25d2140b564c0aa63d165592e4d3b7bb4c29423c619b51334a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7d1f6eeb31bd2e40692c777766b604a0bf50848518f5c931a53d7c48b988e8ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
80f298c436aec6fc79755a500c4350e1d63215b9088f36710903936de3cedc94.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
85555569bb7d45d357512a0eafac484c22aee485efcb08f16f10d5cba19ad94d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c429566ed481fe562466b6e87d2cfe6fc492efeb3007819b63dd4cf45594d639.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
c47b15f9672b5795b62a389de76336302127184be510254d08b9b5100134dd7d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ce9f75c073171b1315c869b550348e6d8c48a986b262a068b33f0833b7a24716.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
cfdc6cd562d69f4233d6d8bcde44d4bd5e6825bd17383e6bb2f76b9fd006ead3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
eb81f341bc6cd2678bd7559862571f5294b6980de5199672afa03b21de0a4dda.exe
Resource
win10v2004-20240426-en
General
-
Target
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe
-
Size
828KB
-
MD5
2a32d9865596340119086b9e9d7407d7
-
SHA1
cd4daf419b213c6a34241bb7a791f2b59f4d80d8
-
SHA256
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26
-
SHA512
2bcd417c9bc9e1cd1fb0a63dc62fa1599b78f7ea6b3205f2b6c9b5b9f805183b80318fd0f9ff4dd3ca8b55dfafab6cfd8300c638c97e22269904362434e001b8
-
SSDEEP
24576:9y4zSdEWEkPt03UTE04CiNCAFab9dmcZgf:Y4OEW2rCiUAYJn
Malware Config
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Extracted
redline
muha
83.97.73.129:19068
-
auth_value
3c237e5fecb41481b7af249e79828a46
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral17/memory/3172-42-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral17/memory/3572-29-0x0000000000400000-0x0000000000430000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2700905.exe family_redline behavioral17/memory/2792-50-0x0000000000880000-0x00000000008B0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
Processes:
v9136604.exev7678896.exev0633454.exea9751033.exeb2585981.exec2700905.exepid process 1272 v9136604.exe 3356 v7678896.exe 1716 v0633454.exe 4808 a9751033.exe 1792 b2585981.exe 2792 c2700905.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
v0633454.exebd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exev9136604.exev7678896.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0633454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9136604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7678896.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a9751033.exeb2585981.exedescription pid process target process PID 4808 set thread context of 3572 4808 a9751033.exe AppLaunch.exe PID 1792 set thread context of 3172 1792 b2585981.exe AppLaunch.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1556 4808 WerFault.exe a9751033.exe 4316 1792 WerFault.exe b2585981.exe 2036 1792 WerFault.exe b2585981.exe 4252 1792 WerFault.exe b2585981.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3172 AppLaunch.exe 3172 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3172 AppLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exev9136604.exev7678896.exev0633454.exea9751033.exeb2585981.exedescription pid process target process PID 804 wrote to memory of 1272 804 bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe v9136604.exe PID 804 wrote to memory of 1272 804 bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe v9136604.exe PID 804 wrote to memory of 1272 804 bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe v9136604.exe PID 1272 wrote to memory of 3356 1272 v9136604.exe v7678896.exe PID 1272 wrote to memory of 3356 1272 v9136604.exe v7678896.exe PID 1272 wrote to memory of 3356 1272 v9136604.exe v7678896.exe PID 3356 wrote to memory of 1716 3356 v7678896.exe v0633454.exe PID 3356 wrote to memory of 1716 3356 v7678896.exe v0633454.exe PID 3356 wrote to memory of 1716 3356 v7678896.exe v0633454.exe PID 1716 wrote to memory of 4808 1716 v0633454.exe a9751033.exe PID 1716 wrote to memory of 4808 1716 v0633454.exe a9751033.exe PID 1716 wrote to memory of 4808 1716 v0633454.exe a9751033.exe PID 4808 wrote to memory of 3572 4808 a9751033.exe AppLaunch.exe PID 4808 wrote to memory of 3572 4808 a9751033.exe AppLaunch.exe PID 4808 wrote to memory of 3572 4808 a9751033.exe AppLaunch.exe PID 4808 wrote to memory of 3572 4808 a9751033.exe AppLaunch.exe PID 4808 wrote to memory of 3572 4808 a9751033.exe AppLaunch.exe PID 1716 wrote to memory of 1792 1716 v0633454.exe b2585981.exe PID 1716 wrote to memory of 1792 1716 v0633454.exe b2585981.exe PID 1716 wrote to memory of 1792 1716 v0633454.exe b2585981.exe PID 1792 wrote to memory of 3172 1792 b2585981.exe AppLaunch.exe PID 1792 wrote to memory of 3172 1792 b2585981.exe AppLaunch.exe PID 1792 wrote to memory of 3172 1792 b2585981.exe AppLaunch.exe PID 1792 wrote to memory of 3172 1792 b2585981.exe AppLaunch.exe PID 1792 wrote to memory of 3172 1792 b2585981.exe AppLaunch.exe PID 3356 wrote to memory of 2792 3356 v7678896.exe c2700905.exe PID 3356 wrote to memory of 2792 3356 v7678896.exe c2700905.exe PID 3356 wrote to memory of 2792 3356 v7678896.exe c2700905.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe"C:\Users\Admin\AppData\Local\Temp\bd2cad400370a1839dedfee01ba51651868baedcef41cd34976bcfc1a2ccbf26.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9136604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9136604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7678896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7678896.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0633454.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0633454.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9751033.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9751033.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 1566⤵
- Program crash
PID:1556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2585981.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2585981.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 6166⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 6326⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 6406⤵
- Program crash
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2700905.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2700905.exe4⤵
- Executes dropped EXE
PID:2792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4808 -ip 48081⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1792 -ip 17921⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1792 -ip 17921⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1792 -ip 17921⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD533ff5c1b7ad2169df36e814a2d691161
SHA1e80f0be76be35b9997ecfa24a8efc30748552cbe
SHA256000643ece079f96ed416c42e9dec2e3a647599f99950c60349c52e36cb724e88
SHA512216ceb4f2a265aae0b413964c91da9f4f4f45baabe4ed952da89dc8089932472aeecb7ae2fb42408dfcfc8ae575d3d0b99cd89f55620946b155a41dee6019bd3
-
Filesize
435KB
MD5a76aada563b5fff5cf81824d40e87c25
SHA1b6c50c7d69b765a396e3995642cd3c82ed9eb370
SHA256f25337a343c26cdecd99eb7f095938fd24fb233463a8af3fa69acc5201eed956
SHA512093e3da142ee67a4da1c8f352460e5d90e9565ec60855285a19eb6e2c2f85d8b8ec22e0b5f46194222954ffeb19e1a8451f9d364c8869f1ef8050decc7154a56
-
Filesize
172KB
MD53722a3e958832f918370e3491d62d642
SHA186d28aa415f98a3ffa95279b4ac521e96ab8131a
SHA256fc953ae5ccb8716ad6fa4b015596e010272dc5095fb5cf36fc1fe1ac7ca39db9
SHA512510caffa854da75b5cef2b52ef61dee6670fc684c090911b9bf51678c68144e3f83a2ca2b43364abd0619c6742c03b9f68f29f91d6bb6259c49fc2b8bbaeb791
-
Filesize
280KB
MD57df1e56d4c1a1612ee126463fcf8ceb4
SHA1774ab26898cfa2ace41b0d5fa53538d318e0fa57
SHA256a62a548ffb1dcb9166d2336968bea9011a44039f391a1a7ef70364f4a0e131a0
SHA512a84427f66c991496b014e82a1e52a969da9b627d6dfebdb93b74acdda4907df02b7b7d17b25cb732999e4a01e7f6e327be630b93b6dd6c55ed78e3d920ccae15
-
Filesize
302KB
MD5c0e3f771bcbb789d734e7d3e1b1f4e65
SHA102e6e5e508188955181ac98bb1b9c414d2c1aa9e
SHA25653b6f1fa7f2466210d99ea5bba427014f08b5656339d05d1dc0d120b7c6a3b02
SHA512c983b76772a50aece42107a39c828abfa768fc33c8865df73de57e1beca2919e8cc7b8afe1d5ae3e7556273519e311d5e49ed6d52eaf895c3c3d7c34608d2118
-
Filesize
141KB
MD5cd5a529d645436b72dc72ebc19950ef3
SHA15f571b5fce5b5e210e812e28dad02b80bb1f5d80
SHA256887d08bb7735494fa22a46935055d0c2d612f70e97ecdd07bccf427d8e49efa3
SHA512b314a9d61340e1cafd67aef45b5151721a6100ca0f7d6ec787e4fc4d83d1cdb571cfafcd1cc1cee681f3016bfb3fc8074681633607221711163e7da2c2e6b123