Overview
overview
10Static
static
300dc3a43dd...78.exe
windows10-2004-x64
10061669c83b...c0.exe
windows10-2004-x64
100cc30df7f6...35.exe
windows10-2004-x64
101b26ae68f4...45.exe
windows10-2004-x64
103b9256f691...90.exe
windows7-x64
33b9256f691...90.exe
windows10-2004-x64
103ddd80ba69...8c.exe
windows7-x64
33ddd80ba69...8c.exe
windows10-2004-x64
103ff55c48fd...c7.exe
windows10-2004-x64
1050be51fdd5...4b.exe
windows10-2004-x64
10565e580e21...f4.exe
windows7-x64
1565e580e21...f4.exe
windows10-2004-x64
15f157bb7f5...80.exe
windows10-2004-x64
106c066f3c43...19.exe
windows10-2004-x64
108355a17b5f...ac.exe
windows10-2004-x64
109a3f5d3f84...b2.exe
windows10-2004-x64
10ae66f2f071...07.exe
windows10-2004-x64
10b0fef95ff5...7c.exe
windows10-2004-x64
10b11b1b57a3...06.exe
windows10-2004-x64
10cd9de412cd...04.exe
windows7-x64
10cd9de412cd...04.exe
windows10-2004-x64
10db84115968...f3.exe
windows10-2004-x64
10dce60a71ca...cc.exe
windows10-2004-x64
f5bf417643...17.exe
windows7-x64
3f5bf417643...17.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
00dc3a43dda255a61bd370ebbf0fc0431112da3c176a205489b4a2113c396878.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
061669c83be149e85a977dfd41981b6115bf335e8f5bf4a2c696247dbf3999c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0cc30df7f6ff94fab7858c7361a84798ffe5198fda1df8e7320f4e14124fd535.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b26ae68f4d9a6a0bfd1a8c92489c6dcdb1a4e6ca483442c2b307329cdfb9345.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
3b9256f691d67ac85ae3172971e615fc85a2927279e384650e0e5d73e6201d90.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
3b9256f691d67ac85ae3172971e615fc85a2927279e384650e0e5d73e6201d90.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
3ddd80ba692516ca1977cdf6eb25ad59de7b9e87f447a412e2468a77ad1bbd8c.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
3ddd80ba692516ca1977cdf6eb25ad59de7b9e87f447a412e2468a77ad1bbd8c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3ff55c48fddf370349ae0853c3e33d313791cbfb7239e43b70ad977035a132c7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
50be51fdd59dbf4ac078600bca6c8481f0e5baf0010085e6e0ce8d763e87da4b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
565e580e2113d8503456c9416021bb7200f7fedadd8020c6d19340c32be7e1f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
565e580e2113d8503456c9416021bb7200f7fedadd8020c6d19340c32be7e1f4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
5f157bb7f5af6f00c288774953e6950cbcecbf52dfbf7a910b167c511b237980.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
6c066f3c43054e87d83f1b9983162f080d1fb4f01c5d81ac389dad5406dc5119.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
9a3f5d3f84858840f8bdd8879b66a6c1ccb772e507f7f09dfe1c5a88e2d33db2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
ae66f2f0715075257fd7cda872646950fd845087e7735d1171fc72267d7c4707.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
b0fef95ff5abebcb9510c61f55646bd6731822877d3e350e98dcbd957727547c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
b11b1b57a3bb5f7ea58bd5b191ab3813432fcc41e7f4e321fa61b848d8c86606.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
cd9de412cda28c677351594338bc352dbcafb8652328624f624263b71bac3604.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
cd9de412cda28c677351594338bc352dbcafb8652328624f624263b71bac3604.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
db8411596845ee0bb667106c06caf801537d732f8726ab81f03248be803038f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
dce60a71ca88a61a579b58be67a969e9f1f6620feaff4c7102883b680d0162cc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
f5bf4176434a177447cba0b0c44a2aa84c6964ac958276a5f3d28429824e6a17.exe
Resource
win7-20231129-en
General
-
Target
8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe
-
Size
309KB
-
MD5
b9b102e068106e1bb5ee1ec690f7e363
-
SHA1
0f162bff994a065fb08f224be4b5dc4eca2b73f9
-
SHA256
8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac
-
SHA512
88aa7fb366e047aa081f60e457f39233e805459025119bc3e9826449fd7db155bba0db3c560272104342cd52ed8d5b8a79de589b4acbe9e99727df23a54c1870
-
SSDEEP
6144:KDy+bnr+tp0yN90QE75F5OYc1u31g4TByMPCKIRuOJIk/:xMrZy90jxc1u31TTEPKqDb
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral15/memory/4640-8-0x00000000021D0000-0x00000000021EA000-memory.dmp healer behavioral15/memory/4640-11-0x0000000002770000-0x0000000002788000-memory.dmp healer behavioral15/memory/4640-40-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-38-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-34-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-32-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-30-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-26-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-24-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-22-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-18-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-17-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-36-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-14-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-28-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-20-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral15/memory/4640-13-0x0000000002770000-0x0000000002782000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0632699.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0632699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0632699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0632699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0632699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0632699.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x000700000002344f-45.dat family_redline behavioral15/memory/4212-47-0x0000000000550000-0x0000000000580000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 4640 a0632699.exe 4212 b0788774.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0632699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0632699.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4640 a0632699.exe 4640 a0632699.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4640 a0632699.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4640 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 85 PID 4700 wrote to memory of 4640 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 85 PID 4700 wrote to memory of 4640 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 85 PID 4700 wrote to memory of 4212 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 100 PID 4700 wrote to memory of 4212 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 100 PID 4700 wrote to memory of 4212 4700 8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe"C:\Users\Admin\AppData\Local\Temp\8355a17b5fec607c779bf1f01bc6596fc82dd876042977ec7aba895db3f1faac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0632699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a0632699.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b0788774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b0788774.exe2⤵
- Executes dropped EXE
PID:4212
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD52dfddd73d31864692324ceea8a7a4cb8
SHA1c19a892523114d379f85e3286b0b69f97edc751e
SHA2568fc6e05b5c0d6aa8430fc649542758d970226d8ff2b7ea0a67f9a00887321c77
SHA512620e03d5824a660d2cbf72faab3f726cea4018dea1e45ce6d8e5fe0026d17f32fa87c52c012634ef37ea011af03089d3e0aa895c7aafa03465dabf614ff9f6d9
-
Filesize
168KB
MD5616457cb4f295e389a163df89bf8e73a
SHA13e08ef30cea049082d2d6d5ec3b1998aa8226fcf
SHA256d75800d25073b6f917a3cdf5da958d90c5661346cb69208e62077313a766b871
SHA5120325df9d40ecd2fc85daac95dd7bf443f3744119257ada5628107b4d74cc6a816e7a759c8f2813c78278f4ffdcf363f91b69feba02e99ab616e071751ba8e9b9