Overview
overview
10Static
static
3072894a720...70.exe
windows10-2004-x64
10075e0048e6...e5.exe
windows10-2004-x64
10131b78a330...7b.exe
windows10-2004-x64
1056b0ed98e3...54.exe
windows10-2004-x64
10807255749f...62.exe
windows7-x64
10807255749f...62.exe
windows10-2004-x64
108a8433aeba...ed.exe
windows10-2004-x64
108cae2c42df...9a.exe
windows7-x64
108cae2c42df...9a.exe
windows10-2004-x64
10d730c48963...34.exe
windows10-2004-x64
10e98954290c...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
075e0048e616f67de702a289e630f2df2651249474b3366d424d5bfefc2071e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
131b78a330f033599e72f43b4c44a4ce16181a4de774a7e0ebc96fe998dea67b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
56b0ed98e3472c3ed4c501f9630c8e00fd98a17a99687541889c257dffc5d254.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
e98954290c7c1115f81a9b91ee8f444cad7f016d85fb2d9b70793e27c9384365.exe
Resource
win10v2004-20240426-en
General
-
Target
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
-
Size
662KB
-
MD5
c66902f6e9a67c0b03be8ee68a49e552
-
SHA1
c7a090905d3218b36a5b88fef0e175cb3f0560fc
-
SHA256
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70
-
SHA512
01be3aeb2981f8f97eedb0a919408ba83be2e4a425a47fa222bc4d46b629ee8c85967d655577816888fb58c6b8b748ff2f3692ec49713f3d0d52f7f2d19ae241
-
SSDEEP
12288:eMrGy90N4+eOGiq9xY9vsJpsBstw6QQrpqUx3N/+Rub/lb0GVLchc:kyFpuKgBI/rp3n/1Jchc
Malware Config
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1940-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023417-23.dat family_redline behavioral1/memory/2204-25-0x00000000008B0000-0x00000000008E0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5052 x4414046.exe 4172 x2941060.exe 1404 g3564742.exe 2204 i3101795.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4414046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2941060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 1940 1404 g3564742.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 4516 1404 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 AppLaunch.exe 1940 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1940 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 400 wrote to memory of 5052 400 072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe 84 PID 400 wrote to memory of 5052 400 072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe 84 PID 400 wrote to memory of 5052 400 072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe 84 PID 5052 wrote to memory of 4172 5052 x4414046.exe 85 PID 5052 wrote to memory of 4172 5052 x4414046.exe 85 PID 5052 wrote to memory of 4172 5052 x4414046.exe 85 PID 4172 wrote to memory of 1404 4172 x2941060.exe 86 PID 4172 wrote to memory of 1404 4172 x2941060.exe 86 PID 4172 wrote to memory of 1404 4172 x2941060.exe 86 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 1404 wrote to memory of 1940 1404 g3564742.exe 88 PID 4172 wrote to memory of 2204 4172 x2941060.exe 93 PID 4172 wrote to memory of 2204 4172 x2941060.exe 93 PID 4172 wrote to memory of 2204 4172 x2941060.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe"C:\Users\Admin\AppData\Local\Temp\072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4414046.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4414046.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2941060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2941060.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3564742.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3564742.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 5805⤵
- Program crash
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3101795.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3101795.exe4⤵
- Executes dropped EXE
PID:2204
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1404 -ip 14041⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD507c310fe28cf45bf96cd585b6fa49857
SHA11b3ed3d1312a358202f0b79ed23cff5be46fd421
SHA256f459b109ad71620cb22a5dcaae034bb13f0ca324341e0a3010a06708fd7520ea
SHA512dd329772b1ad8938db6cded31848da95e453843772a55f2e68357b217f41c791ac1aa99f81acfa2542928ebcf5a74384b8f4444f63acd382f8dae8582486cabc
-
Filesize
274KB
MD51204c802c4679f36abfaad510615f129
SHA1b576e3b0a947d2827776fe2cfb3038635e534c4c
SHA256db89df66c00daa6fa7e1e24c2535ede56311eca603f6eb01636dd1cf8f7b14d7
SHA5121f0f21a8b7e1c4a6dec212effd1b3dde31265f18801e16ae1e1257c8cdaa2ddb9d70bf805ce7814252bc9df0dba7d7dea31c1866a962cfe722113213fcb17f4b
-
Filesize
135KB
MD5f588b03264ce63da17139ba72c85ce00
SHA162b09c58d17fd3f60173f311e7b8ee7c4ab7330e
SHA25619adc5c9b3dabd2255b4b0d06e3ae85e6f1bb9dcd8f5c477eb3834f4eb7a83c9
SHA51251df2aa26bb063e971988a706955eaa785da5f0172edbe65edf8534573bf164846eba8fb0680890335b9bb4a59b95ce071cc784a88bbf916691b3288eb490503
-
Filesize
176KB
MD59c590303a9ed53b6a83d07ef5a3ae851
SHA1438b6fd131d5fddc683e70435f9c61f9c2e1069a
SHA256740af60e3c24d8bec05d1bc89d0187fddbe357871d1b41b5ec3b046a546976d5
SHA51279aacde7ad57c75a68f9fe345f060652673a7f04abeea0a0b11d11f698e36601ce989252ff9fb5b4e731e7deedd5c734ba15c4dd2e22f8adc82170c015406067