Overview
overview
10Static
static
31b7cbee30e...8d.exe
windows10-2004-x64
101cb2277eea...2a.exe
windows10-2004-x64
1026dae86d00...a2.exe
windows10-2004-x64
1035cd974b16...ec.exe
windows10-2004-x64
1045e7028a78...91.exe
windows10-2004-x64
104cd2f124df...48.exe
windows10-2004-x64
105fdef2b38d...0a.exe
windows10-2004-x64
107284e9e031...c7.exe
windows10-2004-x64
10781c022afd...54.exe
windows10-2004-x64
1084163f9b0d...a5.exe
windows10-2004-x64
1090251e43cd...e4.exe
windows10-2004-x64
109a3023ff33...37.exe
windows10-2004-x64
10b4b999d8f3...50.exe
windows7-x64
10b4b999d8f3...50.exe
windows10-2004-x64
10bdd93956fe...8b.exe
windows10-2004-x64
10cf840721c0...70.exe
windows10-2004-x64
10e52fb58b8a...f1.exe
windows10-2004-x64
10ecfbac56ff...9e.exe
windows10-2004-x64
10f0f492b9b0...9a.exe
windows10-2004-x64
10f921df4c23...0d.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
26dae86d0011ac84e93abfd2169b28a6dee3498b8be9c3b84f657506d4e2a9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
45e7028a78d903a8ece02b9d51f82b76972b2b5e64db0bc12aa6cb69f53a2291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cd2f124dfaf247a46d235c0823069c1056a2efb67c0f74547fb75dcfb603748.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7284e9e031d95f98bb1c673f3691adb26e5acc31e6d2c745b85bc97fc82edec7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
781c022afdd03ecc97a7195986c14b7a81fc5a02d1b0e8c7561a1a1ff3406754.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
84163f9b0d959067de44eac4cb117f34b55119476a35c8291d0be25585618ea5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9a3023ff334b34f4bea043eedeced95c41485b4799d3c2d56c0cb04b60143937.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf840721c08fa286313bd7ac68fc5bac88559652036dfbdcc7b3c6f0cfa13d70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ecfbac56ff2c59238da4332d5cd1561d05a08ac0d65b57b9caf329f063fc939e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f0f492b9b0439f9df9e575d91555b387484582434a05ee11e543b6cd24ed979a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f921df4c23777a797ffd956196cd2ea4805eaf3eefcc839de781c7e6af836f0d.exe
Resource
win10v2004-20240508-en
General
-
Target
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
-
Size
830KB
-
MD5
9c50d39c6ed47f89d58009df0a2a3e4c
-
SHA1
5756a2f2448ce80c83e10962619e5cd416f8ee88
-
SHA256
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b
-
SHA512
9d1dc06eb982fee68c190f60e61da71cf55f65394403f06ff063cf6c3b05221c8fda2c6b1fe956fa85ae9ed491c5d6d6d7095f9d1f30d5132d3e5a089a9a0c9b
-
SSDEEP
24576:QyeH4/JFWyn+4lOHy6XJAcR1OX8e2a5QN5g87xE:X7TWkOS6XJrU3
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral15/files/0x0008000000023426-34.dat healer behavioral15/memory/1836-35-0x00000000000D0000-0x00000000000DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9336339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9336339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9336339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9336339.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9336339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9336339.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x0007000000023424-50.dat family_redline behavioral15/memory/2440-52-0x0000000000560000-0x0000000000590000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation b5408226.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 11 IoCs
pid Process 3500 v6889920.exe 4792 v6066256.exe 4504 v7938826.exe 1868 v8387208.exe 1836 a9336339.exe 1928 b5408226.exe 1500 saves.exe 2440 c6132976.exe 1520 saves.exe 1372 saves.exe 3080 saves.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9336339.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8387208.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6889920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6066256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7938826.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1836 a9336339.exe 1836 a9336339.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1836 a9336339.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3500 1916 bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe 84 PID 1916 wrote to memory of 3500 1916 bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe 84 PID 1916 wrote to memory of 3500 1916 bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe 84 PID 3500 wrote to memory of 4792 3500 v6889920.exe 85 PID 3500 wrote to memory of 4792 3500 v6889920.exe 85 PID 3500 wrote to memory of 4792 3500 v6889920.exe 85 PID 4792 wrote to memory of 4504 4792 v6066256.exe 86 PID 4792 wrote to memory of 4504 4792 v6066256.exe 86 PID 4792 wrote to memory of 4504 4792 v6066256.exe 86 PID 4504 wrote to memory of 1868 4504 v7938826.exe 87 PID 4504 wrote to memory of 1868 4504 v7938826.exe 87 PID 4504 wrote to memory of 1868 4504 v7938826.exe 87 PID 1868 wrote to memory of 1836 1868 v8387208.exe 88 PID 1868 wrote to memory of 1836 1868 v8387208.exe 88 PID 1868 wrote to memory of 1928 1868 v8387208.exe 97 PID 1868 wrote to memory of 1928 1868 v8387208.exe 97 PID 1868 wrote to memory of 1928 1868 v8387208.exe 97 PID 1928 wrote to memory of 1500 1928 b5408226.exe 98 PID 1928 wrote to memory of 1500 1928 b5408226.exe 98 PID 1928 wrote to memory of 1500 1928 b5408226.exe 98 PID 4504 wrote to memory of 2440 4504 v7938826.exe 99 PID 4504 wrote to memory of 2440 4504 v7938826.exe 99 PID 4504 wrote to memory of 2440 4504 v7938826.exe 99 PID 1500 wrote to memory of 736 1500 saves.exe 100 PID 1500 wrote to memory of 736 1500 saves.exe 100 PID 1500 wrote to memory of 736 1500 saves.exe 100 PID 1500 wrote to memory of 1624 1500 saves.exe 102 PID 1500 wrote to memory of 1624 1500 saves.exe 102 PID 1500 wrote to memory of 1624 1500 saves.exe 102 PID 1624 wrote to memory of 1856 1624 cmd.exe 104 PID 1624 wrote to memory of 1856 1624 cmd.exe 104 PID 1624 wrote to memory of 1856 1624 cmd.exe 104 PID 1624 wrote to memory of 452 1624 cmd.exe 105 PID 1624 wrote to memory of 452 1624 cmd.exe 105 PID 1624 wrote to memory of 452 1624 cmd.exe 105 PID 1624 wrote to memory of 2896 1624 cmd.exe 106 PID 1624 wrote to memory of 2896 1624 cmd.exe 106 PID 1624 wrote to memory of 2896 1624 cmd.exe 106 PID 1624 wrote to memory of 544 1624 cmd.exe 107 PID 1624 wrote to memory of 544 1624 cmd.exe 107 PID 1624 wrote to memory of 544 1624 cmd.exe 107 PID 1624 wrote to memory of 4984 1624 cmd.exe 108 PID 1624 wrote to memory of 4984 1624 cmd.exe 108 PID 1624 wrote to memory of 4984 1624 cmd.exe 108 PID 1624 wrote to memory of 4860 1624 cmd.exe 109 PID 1624 wrote to memory of 4860 1624 cmd.exe 109 PID 1624 wrote to memory of 4860 1624 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe"C:\Users\Admin\AppData\Local\Temp\bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6889920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6889920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6066256.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6066256.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7938826.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7938826.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8387208.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8387208.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9336339.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9336339.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5408226.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5408226.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F8⤵
- Creates scheduled task(s)
PID:736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit8⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:1856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"9⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E9⤵PID:2896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"9⤵PID:4984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E9⤵PID:4860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6132976.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6132976.exe5⤵
- Executes dropped EXE
PID:2440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1520
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1372
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD535e33c83ed7b694734ba374bfcc91139
SHA150dad8b5d82597e0376e975d716f397f6a2bef76
SHA2560040963d0dc841620440765e9f18da93f7a31ed501dc77a53fa30393325e3337
SHA512d74a305f4972db66d78d7942367f7d834c1db0169e0275b7f9607e0d8c2093705901f8a5c60ef4a79e3d850421184ea119cc001aefffc4c6ab5b2280496b1b3d
-
Filesize
599KB
MD52c3d1ddcf27a8dd4cfad86b6f0818337
SHA18b8500a7183cab1e068e55e959d0a0bacdd9a211
SHA256f113ff189d60eeb8ae4f348ded203c5e0d155db81c78068610891147ed2ee14e
SHA51220822f35f4345cc6bb08d90a913b5a653b49b90a332c449f2eb91cec72accca74f21fa595ea8d815897b3810a298cd02bdb9b34970c902d64fe742d359159eb7
-
Filesize
433KB
MD54dccdafe94330efcc13ebf206cbc21f0
SHA1d6c733dfcad94fc729a4f15f4cfe08b6db58b4b5
SHA2561260de1428d92cfc55e24810a4389bb042fa0714dc6069138198f5edff4a7dd7
SHA512b6ee48a808be23f085548d569f294b37f501b404eb3422286341870dbf0a6e5c35224d82fda959231c26d610080e69b4bf24d6d35010c846904e57635ff24a08
-
Filesize
175KB
MD518d09c1a2ede8664f76d8d9105e15306
SHA173711128ba7e69af39c79553e514eb131fe35621
SHA2569c5bef9bf48cd5299a601a9af4898904cf351ab17a15537d606d45ec60be5c83
SHA512649b380ebacc04308753a2a4609c98053d28afd043221ef07e6c2b1b1f2e618dd730dc0ea2a7bf3c6b65ea2ccd1d9e6747c76bdb3795540092f12dbb3c94a780
-
Filesize
277KB
MD5c6acf486e432ac67ebdec562d33b3fa3
SHA1b9de43085c501efa2f90dd9e53bbb8dfdcfce47d
SHA25613485081c3de14dad1245eec42083625643fa5a3b2c17c902d20ba5dc156190e
SHA5129dd053d5dcacdef15f54e751da979de016853eee1b224df87ef62a3b717f129126dd3610a3d8cef674f592652d3599217f0d791deed2450a7413c7b99cc80cf6
-
Filesize
11KB
MD57db5b6dd818c70bf7d89e4a4d0c348f0
SHA14ba2627cbad98cc3f34cd1b6fc90e239b7dcb037
SHA256b3a9ed94c66fdaf0259747f05e0abb1a22f010517e762ce713cb0efee0c6bd16
SHA512dba6be30ea75817849a314a8b5f4c9ee5bf8e3d772592b72f7fded090e242ef4e4658699fee33de3735e232dc5520d0752092024b1f5a412b5bb151edc21f40e
-
Filesize
339KB
MD5335eded0b9ee641b5df45eef0d59b6df
SHA16e895ed6adaadc8708d6b09c5988d1939a072cd4
SHA2567403620cb32004991e3a1a53616d4f828cfc776d8238337a86d8ca3bcaeefeaf
SHA51278e20a3758b8b08732e61fd4a63a29003f5075d390dc915c06079b9ac99086a76940fdd3cb64856f6cd967a1b89a81d363d110494629fe56e64823e11d8c4e50