Overview
overview
10Static
static
30d301494f1...b9.exe
windows10-2004-x64
1017123cde24...76.exe
windows10-2004-x64
103513e5a1be...0b.exe
windows10-2004-x64
103548eb3ee0...c3.exe
windows10-2004-x64
1037bb007e1a...b5.exe
windows10-2004-x64
103b8019115c...d8.exe
windows10-2004-x64
103ba16fdd2a...8a.exe
windows10-2004-x64
103c47d4d72a...e8.exe
windows10-2004-x64
105598d9028e...fd.exe
windows7-x64
105598d9028e...fd.exe
windows10-2004-x64
105d95f47641...f4.exe
windows10-2004-x64
1061d857a524...a5.exe
windows10-2004-x64
1064f004d4a2...36.exe
windows10-2004-x64
107787b07a17...49.exe
windows10-2004-x64
107cc3996906...7e.exe
windows10-2004-x64
10825d0619a8...ce.exe
windows10-2004-x64
109e6f3fd3f7...c2.exe
windows10-2004-x64
10a49c96afc3...92.exe
windows10-2004-x64
10e2945d600c...9e.exe
windows10-2004-x64
10eb8cedd00b...3b.exe
windows10-2004-x64
10f9bdee7f3d...5b.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
17123cde248bf04440dd66e0818e707111a27baaf0a0f8b46803653840d0f776.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
3548eb3ee082140f111579d722d1924acef2c914601158aa407cc48e37e04dc3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3b8019115c4ceca7cbcfddbb6bbe680cac9c8811275a16616d40ff294ceb6ed8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
3ba16fdd2a3366af19641ad21ef4ff828edfd310b6fd8c6b4e24aa854d8a668a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3c47d4d72a38e9bc6761e47d9e0e51429f2c67ffdd939c07a664efe29c9cd5e8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
5598d9028e8f5dbcce57fc5044a12a3e254972b90687bd0e2d8e20298065c3fd.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
5598d9028e8f5dbcce57fc5044a12a3e254972b90687bd0e2d8e20298065c3fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5d95f476419d3a3135715f2eed0aa6de69b130436772d29100fd7870a2c450f4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
61d857a52459b5cf9779c58c6ee28d8e2760da3fe873785eb0afcffa6b0680a5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
64f004d4a260338ba4eea50516df52087bab791fd6eb50d0b4eb189e6e13bb36.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
7787b07a1719f5524402ec7cf71fb92a7177ee85b0a424e2b97f619ba2b32e49.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
7cc399690625fe51c1b469f7e049782a493baa3a1ef701d932c57888bd5d237e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
825d0619a846701eef20b8c0a10ac730a81fefda0f8afdbe06a54bd4251541ce.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
9e6f3fd3f785137a445cbe56ff06c292a6df24180f53811fc86132a2bd4859c2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e2945d600c8d0d3d77a8528637dcb944f9c51be150c7dd4e619a249b7b9a309e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f9bdee7f3daff1675551aa7b8f0eba683dba4df9a9998cc5de0b9da0a577135b.exe
Resource
win10v2004-20240426-en
General
-
Target
0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe
-
Size
769KB
-
MD5
9a6f01b6a183cc8030ef109090bc930c
-
SHA1
989b8ebfddb6be08af8c05d125cc52307f5ccfd5
-
SHA256
0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9
-
SHA512
e6c73d0b9d8dd8799193de423d2bd02dfbaea092292c3db80939479dbd85e6254985e0190e755c0a4abdf56cacc3f18dcac9c78052738dbb597a6517f29013b5
-
SSDEEP
12288:OMr0y90poZ86/f/VGQhOtInLrYkBWu372tumlxJFRw+O4burEqhjP7Fy:6yOMnkQgenHYkBWuLWvw2ur9Z74
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1392-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023453-23.dat family_redline behavioral1/memory/4452-25-0x0000000000E20000-0x0000000000E50000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2280 x3021455.exe 4964 x0753398.exe 3412 g9278150.exe 4452 i7723293.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3021455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0753398.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3412 set thread context of 1392 3412 g9278150.exe 91 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3360 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 AppLaunch.exe 1392 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1392 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2280 2112 0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe 83 PID 2112 wrote to memory of 2280 2112 0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe 83 PID 2112 wrote to memory of 2280 2112 0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe 83 PID 2280 wrote to memory of 4964 2280 x3021455.exe 84 PID 2280 wrote to memory of 4964 2280 x3021455.exe 84 PID 2280 wrote to memory of 4964 2280 x3021455.exe 84 PID 4964 wrote to memory of 3412 4964 x0753398.exe 85 PID 4964 wrote to memory of 3412 4964 x0753398.exe 85 PID 4964 wrote to memory of 3412 4964 x0753398.exe 85 PID 3412 wrote to memory of 1668 3412 g9278150.exe 90 PID 3412 wrote to memory of 1668 3412 g9278150.exe 90 PID 3412 wrote to memory of 1668 3412 g9278150.exe 90 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 3412 wrote to memory of 1392 3412 g9278150.exe 91 PID 4964 wrote to memory of 4452 4964 x0753398.exe 92 PID 4964 wrote to memory of 4452 4964 x0753398.exe 92 PID 4964 wrote to memory of 4452 4964 x0753398.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe"C:\Users\Admin\AppData\Local\Temp\0d301494f1fd79496a102de54faf16772306d560cc125b858d5e57a6e12787b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3021455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3021455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0753398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0753398.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9278150.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9278150.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7723293.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7723293.exe4⤵
- Executes dropped EXE
PID:4452
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD57ab1faf2f27a5213cd6cf05d39602003
SHA14add2452e3f2fa8c263c81ff19748dc21b70d261
SHA256d6daa377760eac9826e8d95d2d876347bf9456f2b381dabc113c701d1992f13d
SHA5121a6ac80389db4f1b52f2a693da86a7b42d497af585e2d68c13daede245cd76725b529522af80648eba4abd16538de9663d080dacf874ef79b4999b1d382096c7
-
Filesize
326KB
MD56f367b7b40b7baeee8e30cd1c9b75944
SHA1d01daef05b83c33a3bbacec27a177772a360bb3c
SHA25652119e44f5b27d313bed9c6690f546bb06e67c9f20f870dc9ae948e7b0f001ac
SHA5124fb250cc239880aa0f666f3b87c30533589b13439dbeb5635e9f6be481c85ddeacb415b47afc14e22cdcaa208fd60d04b42cadf8b826ca6cc950e89ebb365015
-
Filesize
256KB
MD59b5106a50d76c40238864328ecb8ac9c
SHA193659d797d0bc1712fd6b6582e86edeb913db7fc
SHA256044993d9b0489e3ce7ed08cc79623122808de97967ccd743b3b2c52eb9f5322e
SHA512c6e8ca58cf4f438bced9f4e9a3ec40a302fc0f7a97c4d363a91bf30c0d5cd7c1ed0c04ae963ee5ab8afeaf061f24da7a34b4c5b89c363950d0b982428486c01b
-
Filesize
175KB
MD5dd864eaee1e3057f254b30a1c0b557f3
SHA18b24d67d4b142f0162677b77a1bc0fcf8f0431df
SHA25612b5f44547fce7fc853e5a0594cac5200352403ddcb12a535da3281155ea9a32
SHA5124082aba2a77a33e9f8a5c28f854c5e13cf7944f29059dff3f8945f4b0453c30b1797d6b1ca4b3a0b19239a5dbb4868c06e19bfc4658deede425214f4f21d9588