Overview
overview
10Static
static
309aa894ba7...91.exe
windows7-x64
309aa894ba7...91.exe
windows10-2004-x64
100a8ac35e43...21.exe
windows10-2004-x64
101b7a61dc3f...51.exe
windows10-2004-x64
10551b1eafcb...e2.exe
windows10-2004-x64
107ca70af036...50.exe
windows10-2004-x64
108744deeac7...a9.exe
windows10-2004-x64
108b831a9336...51.exe
windows10-2004-x64
109bcf3e48a2...50.exe
windows10-2004-x64
109d0a8b0afa...78.exe
windows10-2004-x64
10a457720537...84.exe
windows10-2004-x64
10a6aa2043f4...84.exe
windows10-2004-x64
10b52c912b98...a3.exe
windows10-2004-x64
10b9636f454e...f7.exe
windows10-2004-x64
10b9cf5844f6...d1.exe
windows10-2004-x64
10bdef450da7...8e.exe
windows10-2004-x64
10eae63cf77a...de.exe
windows10-2004-x64
10f1c0aed941...02.exe
windows10-2004-x64
10f1cfe53024...42.exe
windows10-2004-x64
10f726f9f109...ad.exe
windows10-2004-x64
10fbaaf142d7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0a8ac35e43f621292035c3d74429426db38475babb90b9f0a7b48a6eb9e2d121.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
551b1eafcb4ad29033561c600fd2cd92b4dbcea53d7714de0fb1b61ceb59b6e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7ca70af036250048ae92d2d5fde5b7a3179535a16c027d4f2bb5fa57b04f5550.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8b831a9336cb726a32f32c055467a35735f51b643a2cbb5d4269348fd570bb51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a4577205375947aa64ee39ff4d1938582d51a0f54aa5db974cf2942d70642f84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b52c912b9847cdf65a1dcf4bf8c550affc88bb7a8d9de2f77219a62d75890ea3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b9636f454e7a68c89164dedcf58da53a18aeb784c2db2df56f5684178058c7f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b9cf5844f6f5b6bc020ebfcf05d096f8176125e06f1618580463eca739c9b3d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eae63cf77a61c6d0fdef1aa4ee5b17218c6245ddb0a23c6b72a19176b5095ade.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f1c0aed941c5429f8f293ac0efea5efc12bafcadd77be2033716f222b3f38402.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f1cfe53024b51863e86f65b542899f29902cf448eed0ef609d8fa925d11e3542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f726f9f1096ec4de08baa4d02b85caf3855704f948bf62de21cebf55aa17c9ad.exe
Resource
win10v2004-20240426-en
General
-
Target
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
-
Size
556KB
-
MD5
040899caf7edf1bc3e51a4588f4e78a2
-
SHA1
b88ddd0efc7d17fba414e50563ff088771b8e3a1
-
SHA256
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50
-
SHA512
18a92030c4aff2efb602a10f554094274ea935e6ba10bab7f9809d01997671c7d646d151c489ebc9f8dd0ad50a8d90d2c2fb1a4e90c75c382e10b585f8ca9b44
-
SSDEEP
12288:yMrWy90llnnc4seQZ5nYKpU/zSZhp50zoPI:4ygseQ9U/zSnpezog
Malware Config
Extracted
amadey
3.89
fb0fb8
http://77.91.68.52
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
-
url_paths
/mac/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral9/files/0x0008000000023422-19.dat healer behavioral9/memory/1228-21-0x0000000000560000-0x000000000056A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4601749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4601749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4601749.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4601749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4601749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4601749.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral9/files/0x0007000000023420-38.dat family_redline behavioral9/memory/3108-39-0x0000000000010000-0x0000000000040000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation b8674621.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 9 IoCs
pid Process 3056 v5839185.exe 2788 v3589007.exe 1228 a4601749.exe 5024 b8674621.exe 1584 explonde.exe 3108 c1856455.exe 4076 explonde.exe 1148 explonde.exe 4568 explonde.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4601749.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5839185.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3589007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1228 a4601749.exe 1228 a4601749.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1228 a4601749.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3056 2796 9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe 82 PID 2796 wrote to memory of 3056 2796 9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe 82 PID 2796 wrote to memory of 3056 2796 9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe 82 PID 3056 wrote to memory of 2788 3056 v5839185.exe 83 PID 3056 wrote to memory of 2788 3056 v5839185.exe 83 PID 3056 wrote to memory of 2788 3056 v5839185.exe 83 PID 2788 wrote to memory of 1228 2788 v3589007.exe 84 PID 2788 wrote to memory of 1228 2788 v3589007.exe 84 PID 2788 wrote to memory of 5024 2788 v3589007.exe 95 PID 2788 wrote to memory of 5024 2788 v3589007.exe 95 PID 2788 wrote to memory of 5024 2788 v3589007.exe 95 PID 5024 wrote to memory of 1584 5024 b8674621.exe 96 PID 5024 wrote to memory of 1584 5024 b8674621.exe 96 PID 5024 wrote to memory of 1584 5024 b8674621.exe 96 PID 3056 wrote to memory of 3108 3056 v5839185.exe 97 PID 3056 wrote to memory of 3108 3056 v5839185.exe 97 PID 3056 wrote to memory of 3108 3056 v5839185.exe 97 PID 1584 wrote to memory of 1812 1584 explonde.exe 98 PID 1584 wrote to memory of 1812 1584 explonde.exe 98 PID 1584 wrote to memory of 1812 1584 explonde.exe 98 PID 1584 wrote to memory of 4892 1584 explonde.exe 100 PID 1584 wrote to memory of 4892 1584 explonde.exe 100 PID 1584 wrote to memory of 4892 1584 explonde.exe 100 PID 4892 wrote to memory of 456 4892 cmd.exe 102 PID 4892 wrote to memory of 456 4892 cmd.exe 102 PID 4892 wrote to memory of 456 4892 cmd.exe 102 PID 4892 wrote to memory of 516 4892 cmd.exe 103 PID 4892 wrote to memory of 516 4892 cmd.exe 103 PID 4892 wrote to memory of 516 4892 cmd.exe 103 PID 4892 wrote to memory of 4656 4892 cmd.exe 104 PID 4892 wrote to memory of 4656 4892 cmd.exe 104 PID 4892 wrote to memory of 4656 4892 cmd.exe 104 PID 4892 wrote to memory of 4264 4892 cmd.exe 105 PID 4892 wrote to memory of 4264 4892 cmd.exe 105 PID 4892 wrote to memory of 4264 4892 cmd.exe 105 PID 4892 wrote to memory of 2400 4892 cmd.exe 106 PID 4892 wrote to memory of 2400 4892 cmd.exe 106 PID 4892 wrote to memory of 2400 4892 cmd.exe 106 PID 4892 wrote to memory of 4912 4892 cmd.exe 107 PID 4892 wrote to memory of 4912 4892 cmd.exe 107 PID 4892 wrote to memory of 4912 4892 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe"C:\Users\Admin\AppData\Local\Temp\9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5839185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5839185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3589007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3589007.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4601749.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4601749.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8674621.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8674621.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4912
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1856455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1856455.exe3⤵
- Executes dropped EXE
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4076
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1148
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD56113c47d537bbb2f3e83fdda4ff28855
SHA197d8bd8c08ace62ddee2757bea79c61664696951
SHA256cdd210d9d7b730541bcc7d4910ba82451d56e84fdb7f1da2f880a18b25c208d4
SHA512c8c2cf3d8edf1cf3704cbd12ebb1b53d46c3bbd786f17dc4aec51e4f9a7111fcaac3c951fdab26d4c90001b0325193e4009379e70dfdd97f0d5fa67c1ed80c17
-
Filesize
175KB
MD5fd40f59345810ffa1881a668be571fe8
SHA12d6b9b246b32bc3489897bc3d4b9d1c3a7d452ad
SHA256aea77b8f02605b7248672c4995b59979729fa8e85e8e2a959ad0098a2e095195
SHA5124ecb88dbda163c094e98c49e29e4ca352e1608f2a2164a77197dc897ae8d8e43a70dba53444eae744f86df709e6f5ac731ff300aaeccb20f58336eea0e1aeabf
-
Filesize
234KB
MD5ac5e48c10b0295a343a47d0055d2504c
SHA11a4acec865c7962d84234297a0b89bbd954169db
SHA25618b6fbce88bb4de5f2010616279b61dbd32c55f7698423bed1506ae2bdd52af3
SHA512d113692067354a9270295f679ed46cb705ada1304ac5b52ee96eefe8b17643fa0a374d3a35885974a201ba98ab99aa2270e3de352da362d3a515cd9bd9b3900a
-
Filesize
11KB
MD5f061ffc02a0f4bbcb07725b34547d624
SHA148f160581b0279f1b30c09591c344556e5fa4116
SHA2569c8936c0b0965a7269ebb525dcdfb1b3d30c3d5ff3a6aea102f57f59ddcf9e43
SHA5124cdc7122165211cbab2fb7b021e2a002248d38c36777d54fa2b9fac81d5635f4330145dabb8ea9643ecd4a9b2286d817cb4f8a272b2bb3a0f8fa2a8a2be65fd2
-
Filesize
219KB
MD51fd5a8de084e8e68125da41efe18ccd5
SHA18428a86e0699832b6fe67018513d9a906b91ca0f
SHA2563a524eb2b67ed8c1d6544aec05422f8809254451f51380cfc375d485b4f66bdc
SHA512fb48094166a94186739a4312ed834c58161f9fb86e2056da143d1857493a2de00bfa1a1ca85cf4d76429ec37f0628ba8343195219664ed259eebbabc8fd1eed7