Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
-
Size
769KB
-
MD5
47b821a1e8276b20bd60053bf3fafda6
-
SHA1
94125bdec51a0d41a1320061bad65a0d0c906100
-
SHA256
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d
-
SHA512
dc2bbe4eb7672a757425e5b47a6541cfc02c5f4c64f20654e57cba7a8fba2ec68c831e8cd084065373c3be1c72cae842f91ce43ed7a15eaf2b9ee2951ed462e7
-
SSDEEP
12288:2Mrjy90hZu5CgHTvbqC3tSvwJYu+Oxxitk7DzpT/ir04gyJEL5BziITzRQ0lg:ty8ZHyzqGiwTitk7Dt6r049ELHH5QOg
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/3928-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002343f-23.dat family_redline behavioral1/memory/3956-25-0x0000000000FC0000-0x0000000000FF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3096 x9767554.exe 1304 x8058804.exe 5064 g3713843.exe 3956 i9060603.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9767554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8058804.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5064 set thread context of 3928 5064 g3713843.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3928 AppLaunch.exe 3928 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3928 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3096 1032 0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe 83 PID 1032 wrote to memory of 3096 1032 0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe 83 PID 1032 wrote to memory of 3096 1032 0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe 83 PID 3096 wrote to memory of 1304 3096 x9767554.exe 84 PID 3096 wrote to memory of 1304 3096 x9767554.exe 84 PID 3096 wrote to memory of 1304 3096 x9767554.exe 84 PID 1304 wrote to memory of 5064 1304 x8058804.exe 85 PID 1304 wrote to memory of 5064 1304 x8058804.exe 85 PID 1304 wrote to memory of 5064 1304 x8058804.exe 85 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 5064 wrote to memory of 3928 5064 g3713843.exe 90 PID 1304 wrote to memory of 3956 1304 x8058804.exe 91 PID 1304 wrote to memory of 3956 1304 x8058804.exe 91 PID 1304 wrote to memory of 3956 1304 x8058804.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe"C:\Users\Admin\AppData\Local\Temp\0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9767554.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9767554.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8058804.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8058804.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3713843.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3713843.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9060603.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9060603.exe4⤵
- Executes dropped EXE
PID:3956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD52cc8d4d08ca86088ea97e3800470f3b4
SHA14a6ef2727ee56a7e9033625ba08fc3ec17dbef26
SHA25671fc4b39abc6fb1166b490546c254393a10dc9ac16a366410a8ffc783a0cbd4e
SHA5125adf235e95f25e20eade125f045e5250a8b42849d539d99340080faa8bcf6e50804f5812826232199b1520856a3b48c3049a6d8155391d60d690d98220da1303
-
Filesize
326KB
MD5b45cb90cea579f37bff4892b1489b1d5
SHA15feb5a82f3b630b213736c10c2c1acb286ae7bf5
SHA25679164567b015b730f018b6c9581c40469b83ea3dd9ff31614e23c29c08fc7bab
SHA512aa5c52b8426362de9c400738b74b5755d3bad53153f097ee0c999d7c4986d4983ff44319206d488801d6d71e75adad5d6ce1dda0eb95183c0c59106d19afd41a
-
Filesize
256KB
MD565ce76b468e52563c1c4fe5022b991cc
SHA171742f18b6467c9e4725f0a4bda4bc8bcfc119bf
SHA256388674a6878f5b656c63be49d4d0f8c7d4071af12128a6807c7a5c0975bb5945
SHA51243a88da68425ff5a17a97eb4d38a7668eb0f37423f14cb207afbc51a65eadf7ffa685a373809e3539500d9728a31521760ae185964d2096880e63dbda1733164
-
Filesize
175KB
MD52d7f84a0f75157c8ba010c79c40abb6f
SHA1cf08b02df8a2850406486f1b65ab966b10d19383
SHA25684a92707a61053ac87bdc6a6e02574117c805495eec32be7639c7b23a7405946
SHA512bb85fbbf4dd73b8574fde502b222b46bbbe283304856beac708d05ef96f75b03317201af220ac9a6add0ff2b417f5b5218236e6693cd8187493321821990e3e1