Overview
overview
10Static
static
30de9ceb4a3...69.exe
windows7-x64
30de9ceb4a3...69.exe
windows10-2004-x64
100e996fcc71...f5.exe
windows7-x64
30e996fcc71...f5.exe
windows10-2004-x64
102ab1df3f8f...6b.exe
windows7-x64
32ab1df3f8f...6b.exe
windows10-2004-x64
102d7becaac8...2a.exe
windows10-2004-x64
1050b189382d...9a.exe
windows7-x64
350b189382d...9a.exe
windows10-2004-x64
1057959e3af4...c6.exe
windows7-x64
357959e3af4...c6.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
1064b48352a0...25.exe
windows7-x64
364b48352a0...25.exe
windows10-2004-x64
108a870280a0...35.exe
windows7-x64
38a870280a0...35.exe
windows10-2004-x64
108f1e4113ca...56.exe
windows7-x64
38f1e4113ca...56.exe
windows10-2004-x64
1094cb7f4064...ae.exe
windows10-2004-x64
109d876cd8a7...ed.exe
windows7-x64
39d876cd8a7...ed.exe
windows10-2004-x64
10a4fbd5dfa9...dd.exe
windows7-x64
10a4fbd5dfa9...dd.exe
windows10-2004-x64
10b3796a101c...4b.exe
windows10-2004-x64
7f09814000e...42.exe
windows7-x64
3f09814000e...42.exe
windows10-2004-x64
10f18a59d97c...79.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2d7becaac8437a8c0258bb0f063a1a2af48f03d8a3322e7389e31d21b2350a2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win7-20240508-en
Behavioral task
behavioral11
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
f18a59d97c873b24dac2d0b58c2c05627cd4379185e2fad2bbdbac27c2174d79.exe
Resource
win10v2004-20240508-en
General
-
Target
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe
-
Size
307KB
-
MD5
24113d3ed2dc8ba8789b2874addb0750
-
SHA1
2901dff1dd1b5b619d48c8d04d22c185922e651b
-
SHA256
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae
-
SHA512
409754870b1cf18269d84a798f69e11cb54540d12217fc0674524ef0e3d42ce38d199d45b7e1b7cb96a70fff87704561b6208bb58bc2628881b9a3d7422aecc7
-
SSDEEP
6144:Kxy+bnr++p0yN90QEA5F5OYc1u31g4TBylzQbR/JOF:HMriy90mxc1u31TTEtQb1JOF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral20/memory/516-8-0x00000000020C0000-0x00000000020DA000-memory.dmp healer behavioral20/memory/516-11-0x0000000002460000-0x0000000002478000-memory.dmp healer behavioral20/memory/516-13-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-39-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-37-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-35-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-33-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-31-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-29-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-27-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-25-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-23-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-21-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-19-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-17-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-15-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral20/memory/516-12-0x0000000002460000-0x0000000002472000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8916177.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8916177.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023425-45.dat family_redline behavioral20/memory/400-47-0x0000000000100000-0x0000000000128000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 516 k8916177.exe 400 l7529087.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8916177.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 k8916177.exe 516 k8916177.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 516 k8916177.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 924 wrote to memory of 516 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 82 PID 924 wrote to memory of 516 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 82 PID 924 wrote to memory of 516 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 82 PID 924 wrote to memory of 400 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 95 PID 924 wrote to memory of 400 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 95 PID 924 wrote to memory of 400 924 94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe"C:\Users\Admin\AppData\Local\Temp\94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exe2⤵
- Executes dropped EXE
PID:400
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a488df49a762065f75f41ee76c2215b4
SHA16ffd0bf006ca60251cf8b298891d317693885fe9
SHA256cf8fd74e3f74fb3dafb881e7070287a7ad77296cbaab59a0b8968de37365c0d3
SHA5125480aa133771076a21c984512f42a9020b012f7735960b05de7908f7bc13a8944bfcdaa4a28415ac6395e4f86e96c29251dbae9284917ce7e23eb623a79477f3
-
Filesize
136KB
MD5ea7424a74eacf1d89358ccbde8484098
SHA1d66cac767a565053916ba6604ca5272d2d0e17aa
SHA256ed28be548a5ca5d75c2bf5ec47ba896d4f4e6916abee3cf04dca41d9fd87249a
SHA512c50b3c66646a429830eb4c90fff4bacf764c9cc4ced25f1b854b3d77a1a27e9aebc6d1c28330062e4bc2adc0a603bc75a5fe4be6d7a64449a7664f8d2ffb70fc