Overview
overview
10Static
static
3005cc897c6...01.exe
windows7-x64
3005cc897c6...01.exe
windows10-2004-x64
100f5dadb4ff...d5.exe
windows10-2004-x64
1015191ca573...45.exe
windows10-2004-x64
101f1cdd32ef...a5.exe
windows7-x64
31f1cdd32ef...a5.exe
windows10-2004-x64
1033277efd72...bf.exe
windows7-x64
333277efd72...bf.exe
windows10-2004-x64
1039b1b5acca...89.exe
windows10-2004-x64
1041914bb3aa...45.exe
windows10-2004-x64
104dc93952d5...05.exe
windows10-2004-x64
10636c6831e9...2d.exe
windows10-2004-x64
106371475aa9...ca.exe
windows10-2004-x64
106d98d2425a...11.exe
windows7-x64
36d98d2425a...11.exe
windows10-2004-x64
107d59382353...89.exe
windows7-x64
37d59382353...89.exe
windows10-2004-x64
107e9155d192...9c.exe
windows10-2004-x64
10817be3f5a4...87.exe
windows10-2004-x64
1084d690a678...8a.exe
windows10-2004-x64
108a833f1e2a...9a.exe
windows10-2004-x64
10a6207c613c...04.exe
windows7-x64
3a6207c613c...04.exe
windows10-2004-x64
10b843b5d179...78.exe
windows10-2004-x64
10bc0a361a97...2b.exe
windows10-2004-x64
10ccede3ed34...14.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
39b1b5acca4de23a0180f902e3a92a03033ff877100271cfa20f0e782d62e989.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
41914bb3aa2d5a67292b5d348f81c71672076d674269fd9bfcbdb103aebf3d45.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
4dc93952d5fe7ecacd61cc033cbd3cdb682618f54ff89b22880ba0684a40e205.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
636c6831e9337ae0be8ccc466e94bff1945dfb0b1bb8dad69a2978f68f48512d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6371475aa9cb4cc2dbcc2fa375c4d6e0f02eafc68e30119f4364189b97538dca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
817be3f5a49a23d678fd0cb76bb61abf50214569606ac3d0d0600befd2d9c787.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
84d690a678e5c3055ce0a83992c921f35e5bf7b165506a695de85c34cf7b138a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
8a833f1e2a239f2ae11656b13c90eb1a39d92f5fca65599dbebd1081f208469a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
b843b5d1795644ec9e6dd14071ee33ee66683585f07a6c89d61ec113d763d278.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bc0a361a973318fa776eb3e7f9c88901ca8d1d588434f1df0348b63576b6412b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe
Resource
win10v2004-20240426-en
General
-
Target
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe
-
Size
768KB
-
MD5
a10dbc94561cd3672ce8a66c98c7cef5
-
SHA1
f5b9d25680172f08547f81555e1fbae71aea7645
-
SHA256
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214
-
SHA512
421dc7e3eac547f84a76be77b186d84fb520066ddbe9a2c55cef98364fb5f81a3aca9242f6e4b06c82740ea4263bbc679344f6bd7dbd12151b2ca34be8a0f455
-
SSDEEP
12288:VMrzy90B7tZfk4w5OFKJZQVHqtN/kwjztmrR99wk6nDwJJHOfSQWrwC8:eyutZs75lZQ1urak1sJlYWr78
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral26/memory/1448-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1654027.exe family_redline behavioral26/memory/3232-25-0x0000000000ED0000-0x0000000000F00000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
x5626403.exex0230251.exeg4867795.exei1654027.exepid process 3068 x5626403.exe 4820 x0230251.exe 2104 g4867795.exe 3232 i1654027.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exex5626403.exex0230251.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5626403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0230251.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g4867795.exedescription pid process target process PID 2104 set thread context of 1448 2104 g4867795.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3852 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1448 AppLaunch.exe 1448 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1448 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exex5626403.exex0230251.exeg4867795.exedescription pid process target process PID 2384 wrote to memory of 3068 2384 ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe x5626403.exe PID 2384 wrote to memory of 3068 2384 ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe x5626403.exe PID 2384 wrote to memory of 3068 2384 ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe x5626403.exe PID 3068 wrote to memory of 4820 3068 x5626403.exe x0230251.exe PID 3068 wrote to memory of 4820 3068 x5626403.exe x0230251.exe PID 3068 wrote to memory of 4820 3068 x5626403.exe x0230251.exe PID 4820 wrote to memory of 2104 4820 x0230251.exe g4867795.exe PID 4820 wrote to memory of 2104 4820 x0230251.exe g4867795.exe PID 4820 wrote to memory of 2104 4820 x0230251.exe g4867795.exe PID 2104 wrote to memory of 3936 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 3936 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 3936 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 3988 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 3988 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 3988 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 2104 wrote to memory of 1448 2104 g4867795.exe AppLaunch.exe PID 4820 wrote to memory of 3232 4820 x0230251.exe i1654027.exe PID 4820 wrote to memory of 3232 4820 x0230251.exe i1654027.exe PID 4820 wrote to memory of 3232 4820 x0230251.exe i1654027.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe"C:\Users\Admin\AppData\Local\Temp\ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5626403.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5626403.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0230251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0230251.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4867795.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4867795.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1654027.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1654027.exe4⤵
- Executes dropped EXE
PID:3232
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD5b528d44a27db8a32e528531162757767
SHA14ece5e35e91e7db946c7669707d99f0fa7a2c445
SHA256281b0933e00d88afc536e3cd104c9035872c2da12499dabbeb6423eee1cb06c2
SHA5129f71d942079e66ee2556dc40bb547af4ae17a7605c7b020d75efb17cddc99f436e776b60a162a985721556fcff8bcca16df8c449e3f1761ac052f472b238448b
-
Filesize
326KB
MD5e56cd8079312f8f5e511305a6ef499df
SHA172bbcdceac2f2b3564c4484344aea58adf130d81
SHA2562e2dad733d4cb3be5a0fea50c7a7657ed99667fb0c7bc2c1e5a7d9a78aa30d65
SHA512526fd66a1c6337582a55791a1e2fb4db5c0c843b30aabe70663dfd690b58c4448a4e3b7d94ad30ad585cbeb9492e18004f323df943d324a8ea5fd224064f8985
-
Filesize
256KB
MD5d5b1f568ad1103abc1817c9caf5f7db1
SHA1819a213e850374ba12b4feeae2f636d4b4f2714a
SHA256e973d6abee2865ab472a8b88b0421628609998480ba8fc2937e39e94638f6ff2
SHA512335c61adba34c54d0fac6a52884045ee5c51e3d0250a480ff039954883511812a5476100df52285d660161884ec2d6acbb3b2cb90e8282749aeae82f49e05db1
-
Filesize
175KB
MD578628aea2f72a2de5dbcb2e6b22a2410
SHA19f5990fba200c63a629c77435d5914353f2dc805
SHA256668bed93e62fc454a0f1fadfed471eedbf8e377fce9bf464a80efb39ae967931
SHA512d68d57ac5b4eb5e82a2b6462e28f1d79464c1c61081764ac38e4c6fd32de9268c4eadcf647f38914e61395da516e12066f4029b748000d7701bdf00843073716