Overview
overview
10Static
static
301aa1629bc...16.exe
windows10-2004-x64
100f8698fea9...71.exe
windows7-x64
30f8698fea9...71.exe
windows10-2004-x64
1010c3a4b3e3...62.exe
windows10-2004-x64
1012d321d9a6...0f.exe
windows10-2004-x64
101e8cbc4567...96.exe
windows7-x64
31e8cbc4567...96.exe
windows10-2004-x64
1027efa43e16...c1.exe
windows10-2004-x64
102a2e3be04e...f7.exe
windows10-2004-x64
102d2e176ff1...1c.exe
windows10-2004-x64
104ef1a0149d...77.exe
windows10-2004-x64
1051b44e7fef...e7.exe
windows7-x64
351b44e7fef...e7.exe
windows10-2004-x64
1051d640efcf...44.exe
windows10-2004-x64
107073615f2b...d4.exe
windows10-2004-x64
1085963051ec...13.exe
windows10-2004-x64
91764c20cb...1b.exe
windows10-2004-x64
10c7a4524e38...ae.exe
windows10-2004-x64
10cc6d978c1f...21.exe
windows10-2004-x64
10d71ef74d32...a8.exe
windows7-x64
3d71ef74d32...a8.exe
windows10-2004-x64
10de0b656af4...69.exe
windows10-2004-x64
10e5410c580a...b5.exe
windows7-x64
1e5410c580a...b5.exe
windows10-2004-x64
1f47fb04ed8...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
01aa1629bce01d1d882c10d835fa7765f2a247f51bcbf0d46b77b87362877916.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f8698fea90dbf665be173be76a450cd2e77e0ffc44993fbed40dba923374671.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0f8698fea90dbf665be173be76a450cd2e77e0ffc44993fbed40dba923374671.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
10c3a4b3e37a803bd0aa6309c39158c1cdc781b3496a972f062f1fe958597862.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
12d321d9a66bfb909ca6ae3097f6aba39263be25c619d424b1dbefd373b20d0f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
1e8cbc456786daa6da93242154f714f7e224f45514a9556e7a644f39934e3196.exe
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
1e8cbc456786daa6da93242154f714f7e224f45514a9556e7a644f39934e3196.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
2a2e3be04e8391170c3a71e198b45f6e45c085dff086c4e7b09748919fbeaef7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
2d2e176ff101b33e0adec2558415b76c1425ba9502c4b652c64b4751dd11181c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4ef1a0149daef80693bc6f0b8f8337399c8687c08ca4792d24e3bdaab9bf6f77.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
51b44e7fef51fc7ece012253c1667cd5cb95636d10007d0e2be5e98e7fd405e7.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
51b44e7fef51fc7ece012253c1667cd5cb95636d10007d0e2be5e98e7fd405e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
51d640efcf425557c7e898a690d229994ff2fc0610138596398e8cdd60583244.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
7073615f2bb8bdde4bddb204be08de240462e36b437993850d9ebcaa68dc66d4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
85963051ece1830904f1352feb417a21d0483c9ef3735855d49b257c6278df13.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
91764c20cbe482b1a5b8aa8c305a606675ac822cf3322e1b30d15c022219581b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
c7a4524e38a070acf6ba7d4865de5125063cd4a021a47872adb720277271f3ae.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
cc6d978c1f4f3ff1c9f85ac715299464b6b106c70aeb9adce32b6d355ba45721.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d71ef74d3278f53c23c7f004992b27f41fcafdbf8bf24ae61339ef1fded7d1a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
d71ef74d3278f53c23c7f004992b27f41fcafdbf8bf24ae61339ef1fded7d1a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
de0b656af41759ffa8477cd8c387f71b8e3cbddbc718028139d53bc1c6b95d69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
e5410c580a81399010c4afd0cb43116c8c6e79ed10a16ace6ca24b1180f130b5.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
e5410c580a81399010c4afd0cb43116c8c6e79ed10a16ace6ca24b1180f130b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
f47fb04ed8077b20b9ca93eddc8ce4a4f05ca4367177fba67c1d87d2831d1865.exe
Resource
win10v2004-20240508-en
General
-
Target
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe
-
Size
1.2MB
-
MD5
861cdcff71d268dee3580d2ce333ac09
-
SHA1
94be6d1757a7ab5c0d5ebd464cafb71bc1c5d33d
-
SHA256
27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1
-
SHA512
b2e905338edbaaf101bd94b91c801972ff30f49a8f0f4740c67faa7e8d3c2be243d0883cec424f9db46bbf7b403ae72b5a6e3201d0861093e9084e920a9f1581
-
SSDEEP
24576:ayE5p8ogugja8IT5+YVQ0SVU97kNQ7hDtYT:hwZgja8G5+k79ANQlDtY
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral8/memory/3692-41-0x0000000000580000-0x00000000005BE000-memory.dmp healer behavioral8/files/0x000700000002344e-46.dat healer behavioral8/memory/856-48-0x00000000000C0000-0x00000000000CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9621859.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5662532.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9621859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9621859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral8/memory/3260-54-0x0000000000520000-0x00000000005AC000-memory.dmp family_redline behavioral8/memory/3260-60-0x0000000000520000-0x00000000005AC000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4896 v4706679.exe 2088 v4373698.exe 3732 v5824928.exe 4364 v6920833.exe 3692 a5662532.exe 856 b9621859.exe 3260 c2955605.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5662532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9621859.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4706679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4373698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5824928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6920833.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3692 a5662532.exe 3692 a5662532.exe 856 b9621859.exe 856 b9621859.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3692 a5662532.exe Token: SeDebugPrivilege 856 b9621859.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4896 1268 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 85 PID 1268 wrote to memory of 4896 1268 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 85 PID 1268 wrote to memory of 4896 1268 27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe 85 PID 4896 wrote to memory of 2088 4896 v4706679.exe 86 PID 4896 wrote to memory of 2088 4896 v4706679.exe 86 PID 4896 wrote to memory of 2088 4896 v4706679.exe 86 PID 2088 wrote to memory of 3732 2088 v4373698.exe 87 PID 2088 wrote to memory of 3732 2088 v4373698.exe 87 PID 2088 wrote to memory of 3732 2088 v4373698.exe 87 PID 3732 wrote to memory of 4364 3732 v5824928.exe 88 PID 3732 wrote to memory of 4364 3732 v5824928.exe 88 PID 3732 wrote to memory of 4364 3732 v5824928.exe 88 PID 4364 wrote to memory of 3692 4364 v6920833.exe 89 PID 4364 wrote to memory of 3692 4364 v6920833.exe 89 PID 4364 wrote to memory of 3692 4364 v6920833.exe 89 PID 4364 wrote to memory of 856 4364 v6920833.exe 100 PID 4364 wrote to memory of 856 4364 v6920833.exe 100 PID 3732 wrote to memory of 3260 3732 v5824928.exe 101 PID 3732 wrote to memory of 3260 3732 v5824928.exe 101 PID 3732 wrote to memory of 3260 3732 v5824928.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe"C:\Users\Admin\AppData\Local\Temp\27efa43e160a77456643b18b13206f1f8a13410ef51729dbe8fa2997f36694c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4706679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4706679.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4373698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4373698.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5824928.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5824928.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6920833.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6920833.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5662532.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5662532.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9621859.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9621859.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2955605.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2955605.exe5⤵
- Executes dropped EXE
PID:3260
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.0MB
MD5d99c9e8014fd98a5853bb0080066e936
SHA1e237506f5dafe36d584654d17a9d89789e49abbc
SHA2567eef2bc77210dfb371441f3047d2846eab00efa17776e8dd2174dc6cfcc22651
SHA512f0d38b9baae2e87de9c0d0445c7aca43721cd1ff8a37ca8b56a7641cf09e9b1d08a15f83d2750f7c56c6b6e85f44d491d559cf91004102b66910561ba0e02f76
-
Filesize
907KB
MD5f6d64813192fad614a257adbf420648b
SHA171fbc5cf4b03d9835ccf416f6ac9e3c87d023021
SHA256c9efc07dc3d1de7d09ef98482efbab50d57d8536b9e046b68e6390bfa840f5bb
SHA51273c5accc42fc873a26095b0468918d98cf8d5761229903fc08c02008d836bbf84ca89f0c7f3a494138c33e2fd173a57e0437be4f9a5d548071fec946f35afd6f
-
Filesize
724KB
MD5b961bbd078d1fe381fcbc28cf386e581
SHA1cb07ff1e265bf9b3981407b19a3a3b5b6d6f4118
SHA256934e3940690b574644d70bfc00cc2145298402b2db4c227d4ce50a3b4e38b33b
SHA512054e1a710393e2d8943969768b0e0d740eccfa67f011aa70a45b94df493c51693f20f5fff89d985f105ae154a8fc0d0a530d2ef997d514169ebc3bcf1243b4da
-
Filesize
492KB
MD5ac523d21c55d2d2644043c53e75c55f2
SHA1eef365e4a038081b448ca57c1a62442a91337922
SHA256568f3c159a41a0e2bc796dae311399b219263b9cf560c8ee35097e5f82c4a9fd
SHA5120b0f50e108d2a732745b3613fc578d3883747a71b147725db977122e9b9fa52ce56e29ba5b6300da237d7f6e414b4c8b7a4ef296b2539b6e266764a4b1947672
-
Filesize
326KB
MD57fe7107090dd0b3d88aedc6546e1cc4e
SHA147b7e6e0362bcfbeba92920c9d2a97d2d91464e8
SHA256cd505eae50fdf3b4cdf9ca2e8cd92aa71083e5f5f8a5fabdfdffd29a18688182
SHA51211e173dfe65c8594f3fe5095eb0f27115c0048bf6341c09a771234ca5e346dee102fada41f4ec80da3460371e121e12fedacb63547ffc46b6a3fd7d0e068a8b8
-
Filesize
295KB
MD57b9509824ecbc98098a72bd9f82255ef
SHA166b515d756229e615b8c0b3cac95e8189589f4d4
SHA256937c45336dcd8317bbc60a49b4664044624e1090feeb6d64bca4a62d29e825ab
SHA512cec8b69950b259f484f61b63c6300ccfaf2d95daf8a791613514b90dc80a766bf6aae4662555382a0892534b1f0774d0e5794aadb13d78e83f4b049d590287dc
-
Filesize
11KB
MD54bd6694914cb2de0d5e4a1cc0b1c1f74
SHA12f5ad161de0a4735376060d4bac8c58fe8b7107d
SHA25697fe71d12da003907a0b02de0940a32851e8a7052cf5b4070643cc8c136c7408
SHA51254104ccf23ec91c77552527d5e279d8831c83ec5a829a6af5446c49198cefe8c7edc5ffcc97b7cbdff86e3f5925d94966206d3d1c284766c4ed92ecb4b951043