Overview
overview
10Static
static
30e13a10fd6...cb.exe
windows10-2004-x64
101d089addfe...b5.exe
windows10-2004-x64
1035d50aca92...42.exe
windows10-2004-x64
103ab23a3036...c6.exe
windows10-2004-x64
1058ac39bbc6...9e.exe
windows10-2004-x64
1064792ffeec...35.exe
windows10-2004-x64
10654aa4d5e8...3b.exe
windows10-2004-x64
10677afbc183...fd.exe
windows7-x64
3677afbc183...fd.exe
windows10-2004-x64
1071d1420ff1...80.exe
windows10-2004-x64
107a08e2a624...2b.exe
windows10-2004-x64
108c7a2623ea...7d.exe
windows10-2004-x64
10c64d3873d4...2e.exe
windows10-2004-x64
10cbd8058875...48.exe
windows7-x64
3cbd8058875...48.exe
windows10-2004-x64
10ec20c35511...9b.exe
windows10-2004-x64
10eca60134d9...3f.exe
windows10-2004-x64
10ecc005f21f...de.exe
windows10-2004-x64
f0fb625894...03.exe
windows10-2004-x64
10f66a0103e4...71.exe
windows10-2004-x64
10ffa14d4c0b...02.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3ab23a30366cb3cfeded88ccba1999ff26ead2bcde69af9aad7e2ed1fa054cc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
58ac39bbc629fc59614b3b5578967a587814d2de70f8a9cba5090cdfbbfb469e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64792ffeeccbab6bb3d100eb7b35cb61c8c90b802e42d83350baf6d1ceefbb35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
654aa4d5e8d49043a4c5b40ef9c1b2fde8bd371386fd43ed6b7c1d719f41533b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
71d1420ff1b7b7e37d536b943d3ba7e0a2fa5972fce4156cbbc73c7416d49d80.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7a08e2a624c497b3986fed503c84dd39612ab1fdda740280e5a1514c1aac802b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
cbd8058875fbf90f6f6a3c6825fab01a2bac4ffb1903f2a0405d451060ea1a48.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ec20c355119abdb18d4433dc95969146db3a558e4e316a175b184ea42d45f89b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eca60134d922b4bca2cb5060841b6d45581f33e04f763a9c118fc9f22e289e3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ecc005f21f15aefcf4a4280bfeddf37e7a9066e1fede069eb10a19bfaf62dade.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f0fb625894c32db0094ce88fe51ad9ddb2db188124af7a638cf184eccf3d1203.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f66a0103e4528b09122b55cb248c3007154afc26e699fa5ddf5d3f200e810a71.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102.exe
Resource
win10v2004-20240508-en
General
-
Target
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe
-
Size
307KB
-
MD5
406420c14aa174852320d385d123709e
-
SHA1
7d024d2fa2371bafadc17f0f0b6f99e27066f96a
-
SHA256
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5
-
SHA512
854da09f5d7affd56b0053dee765ae569ddb42cdbb80b5290bf1671630b9e0e938b04e5a26c04ba9cd7f4721918eaa487858497bdd241417d92339b6a938a859
-
SSDEEP
6144:KPy+bnr+rp0yN90QEg5F5OYc1u31g4TByzpGJqadn6ffBCe:BMrDy90Gxc1u31TTEN0Z56f8e
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral2/memory/4656-8-0x00000000021B0000-0x00000000021CA000-memory.dmp healer behavioral2/memory/4656-11-0x0000000004F60000-0x0000000004F78000-memory.dmp healer behavioral2/memory/4656-22-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-40-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-38-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-37-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-34-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-32-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-30-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-28-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-26-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-25-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-20-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-18-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-16-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-14-0x0000000004F60000-0x0000000004F72000-memory.dmp healer behavioral2/memory/4656-13-0x0000000004F60000-0x0000000004F72000-memory.dmp healer -
Processes:
k7524738.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7524738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7524738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7524738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7524738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7524738.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7524738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exe family_redline behavioral2/memory/2920-47-0x0000000000730000-0x0000000000760000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
k7524738.exel6214693.exepid process 4656 k7524738.exe 2920 l6214693.exe -
Processes:
k7524738.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7524738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7524738.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4908 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
k7524738.exepid process 4656 k7524738.exe 4656 k7524738.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
k7524738.exedescription pid process Token: SeDebugPrivilege 4656 k7524738.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exedescription pid process target process PID 4196 wrote to memory of 4656 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe k7524738.exe PID 4196 wrote to memory of 4656 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe k7524738.exe PID 4196 wrote to memory of 4656 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe k7524738.exe PID 4196 wrote to memory of 2920 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe l6214693.exe PID 4196 wrote to memory of 2920 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe l6214693.exe PID 4196 wrote to memory of 2920 4196 1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe l6214693.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe"C:\Users\Admin\AppData\Local\Temp\1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k7524738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k7524738.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exe2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD59dc0807b30c631ad82b81ba142523486
SHA11abbe8774d500395400fd74965a6613fb8c160e1
SHA25616e9b0845926d775d75d6f8090b0de172e527cd99fe864ce5f8ed5844b47c0ec
SHA51277f28af63b0eb0fb734972d1dc3ac9490602bbad42f214a42542fcc6fbc93148ff81ea92a2c61d1bbdc099ed12cf5dc287c1b66c7cf575ecbab82b972dc1cb3c
-
Filesize
168KB
MD568d7c4353d6992f4549ec4f6796dea6b
SHA1134bffa471475a5b69a1abf3eea257f4076bd410
SHA25698448fa312818534ead0262898b26bb51e4c6c6331d5a3044cd96142774ae697
SHA512c2bbc566aed57c93a2a7d5edc9bec915225e5bd6695d9d953a66f839d01a1c3a7a0825ea2866157d4ba9b0bb2bae0b86599a5e1d55352efb1b29d6e5092e276f