Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
-
Size
390KB
-
MD5
3af121030f860f8cdb00df0f76d33eee
-
SHA1
d08b4343f323e65e7276951b6234b00b63b61fc1
-
SHA256
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1
-
SHA512
cd358c9c9fe57e9849d6180c324b05ee2a8d62feae2cfac7a80afb3661ae1a7d5d880095cdd35b50a6567d613506ffc78eb5455ae6d95f009cfa1637a118e1b9
-
SSDEEP
6144:Kdy+bnr+Sp0yN90QEmyvzJ8b9UCTqnV1lS+yyMmmLrMZjWAuGGDPR8I:rMrey90B8b2xVTS+FzWVfRh
Malware Config
Extracted
amadey
3.86
88c8bb
http://77.91.68.61
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
-
url_paths
/rock/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral15/files/0x00080000000233e9-12.dat healer behavioral15/memory/3732-15-0x0000000000520000-0x000000000052A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7907616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7907616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7907616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7907616.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k7907616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7907616.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x00070000000233e7-31.dat family_redline behavioral15/memory/2632-33-0x0000000000470000-0x00000000004A0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation l8336775.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 7 IoCs
pid Process 2188 y9010925.exe 3732 k7907616.exe 2504 l8336775.exe 3300 pdates.exe 2632 m5283023.exe 4868 pdates.exe 3328 pdates.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k7907616.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9010925.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4864 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 k7907616.exe 3732 k7907616.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3732 k7907616.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2188 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 83 PID 3148 wrote to memory of 2188 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 83 PID 3148 wrote to memory of 2188 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 83 PID 2188 wrote to memory of 3732 2188 y9010925.exe 84 PID 2188 wrote to memory of 3732 2188 y9010925.exe 84 PID 2188 wrote to memory of 2504 2188 y9010925.exe 92 PID 2188 wrote to memory of 2504 2188 y9010925.exe 92 PID 2188 wrote to memory of 2504 2188 y9010925.exe 92 PID 2504 wrote to memory of 3300 2504 l8336775.exe 93 PID 2504 wrote to memory of 3300 2504 l8336775.exe 93 PID 2504 wrote to memory of 3300 2504 l8336775.exe 93 PID 3148 wrote to memory of 2632 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 94 PID 3148 wrote to memory of 2632 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 94 PID 3148 wrote to memory of 2632 3148 d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe 94 PID 3300 wrote to memory of 3848 3300 pdates.exe 95 PID 3300 wrote to memory of 3848 3300 pdates.exe 95 PID 3300 wrote to memory of 3848 3300 pdates.exe 95 PID 3300 wrote to memory of 4892 3300 pdates.exe 97 PID 3300 wrote to memory of 4892 3300 pdates.exe 97 PID 3300 wrote to memory of 4892 3300 pdates.exe 97 PID 4892 wrote to memory of 4516 4892 cmd.exe 99 PID 4892 wrote to memory of 4516 4892 cmd.exe 99 PID 4892 wrote to memory of 4516 4892 cmd.exe 99 PID 4892 wrote to memory of 2732 4892 cmd.exe 100 PID 4892 wrote to memory of 2732 4892 cmd.exe 100 PID 4892 wrote to memory of 2732 4892 cmd.exe 100 PID 4892 wrote to memory of 5100 4892 cmd.exe 101 PID 4892 wrote to memory of 5100 4892 cmd.exe 101 PID 4892 wrote to memory of 5100 4892 cmd.exe 101 PID 4892 wrote to memory of 3496 4892 cmd.exe 102 PID 4892 wrote to memory of 3496 4892 cmd.exe 102 PID 4892 wrote to memory of 3496 4892 cmd.exe 102 PID 4892 wrote to memory of 1172 4892 cmd.exe 103 PID 4892 wrote to memory of 1172 4892 cmd.exe 103 PID 4892 wrote to memory of 1172 4892 cmd.exe 103 PID 4892 wrote to memory of 1628 4892 cmd.exe 104 PID 4892 wrote to memory of 1628 4892 cmd.exe 104 PID 4892 wrote to memory of 1628 4892 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe"C:\Users\Admin\AppData\Local\Temp\d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9010925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9010925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7907616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7907616.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8336775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8336775.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F5⤵
- Creates scheduled task(s)
PID:3848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"6⤵PID:2732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E6⤵PID:5100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"6⤵PID:1172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E6⤵PID:1628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5283023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5283023.exe2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4868
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3328
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD54c3e0e9421633de0ebb0ed417e57bf81
SHA1f0f6faf74cb490dd46056298021d6ee12c062534
SHA256f3a835a8ef2729adf4993fc1f71ee3756d0afd43f06f1a1932c88d78cf579e13
SHA5128eb21fd8fb2ed8b7ab0a339be22da8a1c2fb3bf6e7c915d9af99ce61d92f29f1f07b307a4a6396a4d52269dbc1e8396dda288f6652c5a324443a1ab4f6775df0
-
Filesize
234KB
MD5bdaa31e58ff32bfd21d3a869da09113b
SHA186be7d2ae0254a3c0ec114dd047c4eaae48f9f4d
SHA25623c79f0e2c8a386aa9fb01ce42c547b6cb876959fe98e2843af2202290c0065b
SHA512b60a96aa57f0de445888d59d04f7db25ffbfeba00d23b3e0d6a1cfb0c0d2d68e26640ec079c0cb100d96402d1fca3e349d73fc25d748f0353bd80886c1b69d66
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434