Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
-
Size
769KB
-
MD5
4f98b84064e02998c0704c24e4cdf335
-
SHA1
eb839525ab5e8a2b57ca801780b7c4cf82022bd2
-
SHA256
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8
-
SHA512
49d8501731a4409071d3d691b7d4fadbb636fa51e1ef4bf3e61d02190f75651eb8cd5a930b716d1cffd8bb883cee60e29d5c6409fca305644d679172878f6d2d
-
SSDEEP
24576:/yO0MJVj1CUPrHUtQSXXSxbWg0MUyK+o90z:KHM31xr0tQSyZWQUH
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral14/memory/2552-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral14/files/0x0007000000023481-24.dat family_redline behavioral14/memory/868-25-0x0000000000DF0000-0x0000000000E20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3640 x9945475.exe 1564 x5663925.exe 4080 g5155081.exe 868 i6643370.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9945475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5663925.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4080 set thread context of 2552 4080 g5155081.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2552 AppLaunch.exe 2552 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3640 2520 d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe 82 PID 2520 wrote to memory of 3640 2520 d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe 82 PID 2520 wrote to memory of 3640 2520 d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe 82 PID 3640 wrote to memory of 1564 3640 x9945475.exe 83 PID 3640 wrote to memory of 1564 3640 x9945475.exe 83 PID 3640 wrote to memory of 1564 3640 x9945475.exe 83 PID 1564 wrote to memory of 4080 1564 x5663925.exe 84 PID 1564 wrote to memory of 4080 1564 x5663925.exe 84 PID 1564 wrote to memory of 4080 1564 x5663925.exe 84 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 4080 wrote to memory of 2552 4080 g5155081.exe 87 PID 1564 wrote to memory of 868 1564 x5663925.exe 88 PID 1564 wrote to memory of 868 1564 x5663925.exe 88 PID 1564 wrote to memory of 868 1564 x5663925.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe"C:\Users\Admin\AppData\Local\Temp\d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9945475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9945475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5663925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5663925.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5155081.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5155081.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6643370.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6643370.exe4⤵
- Executes dropped EXE
PID:868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
493KB
MD50dd111191cfacd3e2e2e8a2b4255acaa
SHA167f4500ecf2bc710fcae5fb6f492dcd9cc1cccab
SHA256aaa1753f3d462df0ffbe9936540ba860a6d539889cdd40569668cf5a11453d5e
SHA512121eecdfe8e9bc98440d41a9ca8c0b015bf827f76901fabcc3950c5ddc82defe39b6fa694f69ff6b5f47d71ce93eb4a0e8690dcda940e94e5af523fa65927898
-
Filesize
327KB
MD5490f3be9c454ba8fee69122a27cb8a52
SHA1b2e865c0368ed7be8ee8a2a03796b5f891f98601
SHA256e9e4c970aa74fdfc7424366d498129579981d01943cabb43665801980e0a2e9f
SHA512743b7c9ff2629018eed19e39a6c3be8e8589b33afd1e1bd9426a8f295ce0f65f4e8c22989a50ca1fef608882275b4d0f7e269aadf8488e0bd375565a2d3f5c67
-
Filesize
256KB
MD5293d7149e0167334c2e47f9460dced75
SHA1d1b1170d8aa7167692dbd0d19ea013ff7873c6a1
SHA2569a45610c8711c1438a0941a4d44536a0f5770030052bc601b7a03fc361c07110
SHA5124fc11c06c8316d6d9b1552aa59fbc943c199c156aacc9104ff4d29e83d7a5243377880a69cca9245a02f43625130eba151e24d6213baf801e53215e50c1f5f35
-
Filesize
175KB
MD5de3d7902e2dc52ce62d276bed249f982
SHA1bc63e1067a6cbc12cf6dae3269d6b7798b0a24b8
SHA256a735baeec9c42b55e69c47acaf2ef25891f567f88834b0c11596d20d15454cee
SHA512b7b103510754cdfb91655f81175c6d2fb020b95c5399ad84add5737a1f4128182dee6cfe30f3529113245462486f5a68b307a2b190ac7f9e6d6fe0ec0d329c44