Overview
overview
10Static
static
3000643ece0...88.exe
windows10-2004-x64
100e413fa969...3c.exe
windows10-2004-x64
10123830f5ad...0f.exe
windows10-2004-x64
10189bf8b11d...e3.exe
windows10-2004-x64
1030781e91d6...0c.exe
windows7-x64
330781e91d6...0c.exe
windows10-2004-x64
104312b77e60...ce.exe
windows10-2004-x64
1055a2613b91...ce.exe
windows10-2004-x64
1057e17d171c...0b.exe
windows10-2004-x64
10604b676155...8c.exe
windows10-2004-x64
10617783538b...1f.exe
windows10-2004-x64
10729187837b...ea.exe
windows10-2004-x64
10747238b5bd...97.exe
windows10-2004-x64
107ec0dcfd62...a1.exe
windows7-x64
37ec0dcfd62...a1.exe
windows10-2004-x64
108468f46bfb...d1.exe
windows10-2004-x64
108e6dae5587...22.exe
windows10-2004-x64
109966ddcefb...d8.exe
windows10-2004-x64
10b7dd4fa2a0...d9.exe
windows7-x64
3b7dd4fa2a0...d9.exe
windows10-2004-x64
10dd86e508d3...d9.exe
windows10-2004-x64
7e500bee084...71.exe
windows10-2004-x64
10ff54e8ca62...50.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
000643ece079f96ed416c42e9dec2e3a647599f99950c60349c52e36cb724e88.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0e413fa9690c02a45dc95f1ea020874ed2745670117fed803aea439be9b8683c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
123830f5adc2114333a361b752e02a6ae770080082ba2b79c984aaf2debf810f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
30781e91d68861344f162ee5566cedc2c3c10246b4ec0c14b8f23cffe8bc9c0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
30781e91d68861344f162ee5566cedc2c3c10246b4ec0c14b8f23cffe8bc9c0c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4312b77e6031b30312b6c5c30180fca1895d4c065914103fa2e4ca9e8da9a0ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
55a2613b9117beb668b5eda94de72151952cc566a09c80460e6169cfe1e7edce.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
57e17d171cef6609925870e83612ab3f4cb883b2bac745d2a500d5e839fada0b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
604b676155ad58fa6826907866dfba9510268d91c3cbfa0df8706492c47c0f8c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
617783538bdab4bd7c8fbacae9e8749b50cd02e596dc328612ea1d600c11dc1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
729187837b6282872fd853df135ab03458edda808d089983498f29a635b978ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
747238b5bd007fbf264cbd66b42a3fa3d6c54ccb6a1d0ce2c79715650a55d097.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7ec0dcfd6246ae153473783715a6fcdc5d5b76379404002057ad04b8746c7aa1.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
7ec0dcfd6246ae153473783715a6fcdc5d5b76379404002057ad04b8746c7aa1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8468f46bfbde3077ec27b4d06b0b5617a8dec77c7537ca26f5b248d5def7dad1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
8e6dae5587d0150e1fa568f6ff42d2f6790750c017c08f86cff2c14b18de7422.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9966ddcefba77b1337606836fd7507a61fc0f6488163d75c6c426d9c488139d8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
b7dd4fa2a0deaf6b70cea7aaf1292a2e835aef45edb5a190cc515d98cf60a8d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
b7dd4fa2a0deaf6b70cea7aaf1292a2e835aef45edb5a190cc515d98cf60a8d9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dd86e508d33a5b71e82ab1b41a8dd7c49009ac65ba2191c467d7c58267e8ead9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
e500bee084b2757ef23283d465255eeb1eed61d9ed67171a24f814de66cf3b71.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe
Resource
win10v2004-20240426-en
General
-
Target
189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe
-
Size
309KB
-
MD5
342b1816c9b8d3e94affca15effaa80e
-
SHA1
d335bae1ffead340c29b008bb61e3c353520eb8b
-
SHA256
189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3
-
SHA512
c119ef28e0b35fb48c36e3cf24855056eb0d2ab4cd94af312e33f7ca2bef26563ba46b12783177ff9dbb4e0c9a8982527163ee73e5ac35b4388d02dc673b3269
-
SSDEEP
6144:Kry+bnr+gp0yN90QEV5F5OYc1u31g4TBy0LfkL3+GeOIq7bB4bz:xMr0y90Nxc1u31TTE0LcL3lZ7bB4
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral4/memory/556-8-0x0000000000860000-0x000000000087A000-memory.dmp healer behavioral4/memory/556-11-0x0000000002530000-0x0000000002548000-memory.dmp healer behavioral4/memory/556-19-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-13-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-39-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-37-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-35-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-33-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-31-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-29-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-27-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-25-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-23-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-21-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-12-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-17-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral4/memory/556-15-0x0000000002530000-0x0000000002542000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3252242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/files/0x000700000002341a-45.dat family_redline behavioral4/memory/2252-48-0x0000000000E30000-0x0000000000E60000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 556 a3252242.exe 2252 b2630465.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3252242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3252242.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 556 a3252242.exe 556 a3252242.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 556 a3252242.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4776 wrote to memory of 556 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 84 PID 4776 wrote to memory of 556 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 84 PID 4776 wrote to memory of 556 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 84 PID 4776 wrote to memory of 2252 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 88 PID 4776 wrote to memory of 2252 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 88 PID 4776 wrote to memory of 2252 4776 189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe"C:\Users\Admin\AppData\Local\Temp\189bf8b11dee99ed7e1e469dc473e6a36cc501c81db6093fdae6c031c37139e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3252242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3252242.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2630465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b2630465.exe2⤵
- Executes dropped EXE
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD512a050bebc4ee3e342a8201d7980c888
SHA1a9bf8ead7baa337173f676549de30df7ec1eb6e8
SHA2567a6996e3e255f8c534550ce0697812ec907d0654d93797c9eb4af101dd33d72e
SHA512974a54fe5f1049f5994bc576cc3643d4c28e97ead6c5bac09288bcd0c6ff206b4c8eaec2909ccc4755565cf6a978af8d599d7a29372016662d183b305ab5f7f2
-
Filesize
168KB
MD5c06cddf22cb66dfd43c6a46444fca4f2
SHA1f5ee4fbe06f1d18575e60017b08c9f1eae211744
SHA256f8d5814bf1c7514646359fa5f322ba3b7868804a61ee50605232e1b315a649af
SHA512091513d35ea23d63491af13edb83d976aa795e334ead4cfda23420b5778307c980cac5f7498981d47c1835b1baf383b86d5278731ad5e719f20b8370a28240df