Overview
overview
10Static
static
3000643ece0...88.exe
windows10-2004-x64
100e413fa969...3c.exe
windows10-2004-x64
10123830f5ad...0f.exe
windows10-2004-x64
10189bf8b11d...e3.exe
windows10-2004-x64
1030781e91d6...0c.exe
windows7-x64
330781e91d6...0c.exe
windows10-2004-x64
104312b77e60...ce.exe
windows10-2004-x64
1055a2613b91...ce.exe
windows10-2004-x64
1057e17d171c...0b.exe
windows10-2004-x64
10604b676155...8c.exe
windows10-2004-x64
10617783538b...1f.exe
windows10-2004-x64
10729187837b...ea.exe
windows10-2004-x64
10747238b5bd...97.exe
windows10-2004-x64
107ec0dcfd62...a1.exe
windows7-x64
37ec0dcfd62...a1.exe
windows10-2004-x64
108468f46bfb...d1.exe
windows10-2004-x64
108e6dae5587...22.exe
windows10-2004-x64
109966ddcefb...d8.exe
windows10-2004-x64
10b7dd4fa2a0...d9.exe
windows7-x64
3b7dd4fa2a0...d9.exe
windows10-2004-x64
10dd86e508d3...d9.exe
windows10-2004-x64
7e500bee084...71.exe
windows10-2004-x64
10ff54e8ca62...50.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
000643ece079f96ed416c42e9dec2e3a647599f99950c60349c52e36cb724e88.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0e413fa9690c02a45dc95f1ea020874ed2745670117fed803aea439be9b8683c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
123830f5adc2114333a361b752e02a6ae770080082ba2b79c984aaf2debf810f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
30781e91d68861344f162ee5566cedc2c3c10246b4ec0c14b8f23cffe8bc9c0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
30781e91d68861344f162ee5566cedc2c3c10246b4ec0c14b8f23cffe8bc9c0c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4312b77e6031b30312b6c5c30180fca1895d4c065914103fa2e4ca9e8da9a0ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
55a2613b9117beb668b5eda94de72151952cc566a09c80460e6169cfe1e7edce.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
57e17d171cef6609925870e83612ab3f4cb883b2bac745d2a500d5e839fada0b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
604b676155ad58fa6826907866dfba9510268d91c3cbfa0df8706492c47c0f8c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
617783538bdab4bd7c8fbacae9e8749b50cd02e596dc328612ea1d600c11dc1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
729187837b6282872fd853df135ab03458edda808d089983498f29a635b978ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
747238b5bd007fbf264cbd66b42a3fa3d6c54ccb6a1d0ce2c79715650a55d097.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7ec0dcfd6246ae153473783715a6fcdc5d5b76379404002057ad04b8746c7aa1.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
7ec0dcfd6246ae153473783715a6fcdc5d5b76379404002057ad04b8746c7aa1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8468f46bfbde3077ec27b4d06b0b5617a8dec77c7537ca26f5b248d5def7dad1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
8e6dae5587d0150e1fa568f6ff42d2f6790750c017c08f86cff2c14b18de7422.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9966ddcefba77b1337606836fd7507a61fc0f6488163d75c6c426d9c488139d8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
b7dd4fa2a0deaf6b70cea7aaf1292a2e835aef45edb5a190cc515d98cf60a8d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
b7dd4fa2a0deaf6b70cea7aaf1292a2e835aef45edb5a190cc515d98cf60a8d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dd86e508d33a5b71e82ab1b41a8dd7c49009ac65ba2191c467d7c58267e8ead9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
e500bee084b2757ef23283d465255eeb1eed61d9ed67171a24f814de66cf3b71.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe
Resource
win10v2004-20240426-en
General
-
Target
ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe
-
Size
307KB
-
MD5
367ff3cd17fe97143cd8cb5f9e323046
-
SHA1
0a213bcb8d4e658992d1e083b0b206ac3650ba69
-
SHA256
ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50
-
SHA512
9c2fd4077ecd277d91e83160a5c2a0a3bcc2c8774dda670dad8566a789fef7be158a87397cf2fa7360fda1916fac8331b61c55add4d4018ae2dfacbba6a32894
-
SSDEEP
6144:KYy+bnr+gp0yN90QE85F5OYc1u31g4TByrF8wtc54DgJ:EMrsy90exc1u31TTETt/EJ
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral23/memory/1852-8-0x0000000002570000-0x000000000258A000-memory.dmp healer behavioral23/memory/1852-11-0x0000000004990000-0x00000000049A8000-memory.dmp healer behavioral23/memory/1852-33-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-39-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-37-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-35-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-27-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-25-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-23-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-21-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-20-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-17-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-15-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-13-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-12-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-31-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral23/memory/1852-29-0x0000000004990000-0x00000000049A2000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1520744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1520744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1520744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1520744.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1520744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1520744.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral23/files/0x0007000000023436-46.dat family_redline behavioral23/memory/5000-47-0x00000000008B0000-0x00000000008E0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 1852 k1520744.exe 5000 l4036908.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1520744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1520744.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3168 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 k1520744.exe 1852 k1520744.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1852 k1520744.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1852 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 83 PID 3056 wrote to memory of 1852 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 83 PID 3056 wrote to memory of 1852 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 83 PID 3056 wrote to memory of 5000 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 94 PID 3056 wrote to memory of 5000 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 94 PID 3056 wrote to memory of 5000 3056 ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe"C:\Users\Admin\AppData\Local\Temp\ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k1520744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k1520744.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l4036908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l4036908.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD57ae5c9c884c8a206085a31b28559a56e
SHA162ee3946087638f78cb879cec7873e931c3ea386
SHA256d78fc25515b72db855c730b5e4a5bd2db040c857f8921ddead622d646bd6c98e
SHA51254270113c6f8671b4ccd236e096f673dd8d0ca10f61bb90b798288c1340812893bb6db49db40d9e204f864c60091446603f1e1e2e6e4eb5233615cee8c0847e9
-
Filesize
168KB
MD5faa7957999bc9ed6a221c8c19b9d09f0
SHA1eef2368343aa03127958ec5a7cc507e469b5a028
SHA2569bf4ace7974b14c0c0d4b9913f95ebcd3a4512c54dd4a04281af685ba1bdd895
SHA512d9e747f865ecd24b5f95369cc5cc824a14cfbd827615331639c0d99ae512a2e18479c10e17f1368f4f96da741f4129e6bfd426f82f44346edd384d2bca5789c8