Overview
overview
10Static
static
3196993766d...e4.exe
windows10-2004-x64
102cb02eeff0...07.exe
windows10-2004-x64
10515ca9dbb0...70.exe
windows10-2004-x64
10637e68df5f...fc.exe
windows10-2004-x64
1067adfef018...3f.exe
windows10-2004-x64
10753ea0d141...ee.exe
windows10-2004-x64
1075a099d51b...a2.exe
windows10-2004-x64
107bc60a53f2...61.exe
windows10-2004-x64
10878c11674c...59.exe
windows10-2004-x64
10905a82b666...03.exe
windows10-2004-x64
109e0acffebc...ef.exe
windows10-2004-x64
109e61b06119...c5.exe
windows10-2004-x64
10a8e7ed480b...c2.exe
windows10-2004-x64
10b55e0e5824...a8.exe
windows10-2004-x64
10b6f3ae7c80...fd.exe
windows10-2004-x64
10c3d6d3e893...ba.exe
windows10-2004-x64
10d68f556e86...13.exe
windows10-2004-x64
10f67e1f80fb...aa.exe
windows10-2004-x64
10fb8a184cad...cb.exe
windows10-2004-x64
10fe5b99ae2f...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
196993766d9fd8e527e04ab6a57e61f104a8d6b651d9eff81ea121f7261d88e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2cb02eeff015b5724c548dcd8876db39d785c6beedf358fa6fa4dc6934541b07.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
515ca9dbb061a01c8da21c552a76dd53c58fa94f5421a2b5792e2e37137ab470.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
637e68df5f54ed9e5e7de1cee4157ff3be2efe7d01c49ab8ce67a2dcefb470fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
67adfef0180eabce1681648e2c46c32d12d6f42f83d1e0f23337cb248ea7503f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
753ea0d14181cbd10e784c6def975e1b2a0adae8cdb71930dececfc455cd59ee.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
75a099d51b4f58a6df537c770b8d75820445fa7798e533b8d2312b46e4d407a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
878c11674c0d8a2d45512540cc40d386c9d9226a6518be88109168224c8be159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
9e61b06119f566b9fb98b46bbce9cb6e128f7a58de8e4266a2867a96d521f2c5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a8e7ed480b5dfd7831f86d676442a11db9686f0cd83ee01f32b92a8a254080c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b55e0e5824f9aed804ccff228c21b9dc48e15fc3f7da5286a514ea94193f15a8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b6f3ae7c8039baa6291649906002be6daa14265e311c369866980f296919acfd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c3d6d3e893fd99f013083ef64a70f3ab8cfdb8848fd2fccbb6d2844033a3f4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d68f556e867c0edd6db1857c4fa9aa2c6410b74fde30d6438fe50ffcf382e413.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f67e1f80fbd3845a74490559e6a9ca3526fb093df5cd3852b6de4cd319d401aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
fb8a184cade7544ea1ec897b679edff542000cf31934900525f12e02f85eb9cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fe5b99ae2f24a02b6eb25016c9736c313a779f9de26ca9e883482b8075830bbb.exe
Resource
win10v2004-20240226-en
General
-
Target
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe
-
Size
661KB
-
MD5
18d7fd980598cc8e0a453d540624bb38
-
SHA1
9d7b7e90c579473861abed6203bb022416b124bd
-
SHA256
905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103
-
SHA512
05f04f5b18d30a8ac8fa39b0547bf828e4e1e31f07b791e8f0269d351d7951cae9ce06ecee597d2c694cc5a9822f27429096707cd976c3e807c9f0046bf62dcb
-
SSDEEP
12288:LMrvy90ZikgBzlsz1BvNreTx80Nc8WIzhl5rJlSPUi51saqHl80mc:sy47Wq1BFCBNcvIzhLJlRFT
Malware Config
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral10/memory/2432-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x0007000000023457-24.dat family_redline behavioral10/memory/1616-25-0x0000000000130000-0x0000000000160000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4764 x2541029.exe 1200 x2591871.exe 1320 g1323073.exe 1616 i1635147.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2541029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2591871.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1320 set thread context of 2432 1320 g1323073.exe 86 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3484 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 756 1320 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2432 AppLaunch.exe 2432 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4764 1760 905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe 82 PID 1760 wrote to memory of 4764 1760 905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe 82 PID 1760 wrote to memory of 4764 1760 905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe 82 PID 4764 wrote to memory of 1200 4764 x2541029.exe 83 PID 4764 wrote to memory of 1200 4764 x2541029.exe 83 PID 4764 wrote to memory of 1200 4764 x2541029.exe 83 PID 1200 wrote to memory of 1320 1200 x2591871.exe 84 PID 1200 wrote to memory of 1320 1200 x2591871.exe 84 PID 1200 wrote to memory of 1320 1200 x2591871.exe 84 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1320 wrote to memory of 2432 1320 g1323073.exe 86 PID 1200 wrote to memory of 1616 1200 x2591871.exe 92 PID 1200 wrote to memory of 1616 1200 x2591871.exe 92 PID 1200 wrote to memory of 1616 1200 x2591871.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe"C:\Users\Admin\AppData\Local\Temp\905a82b6666de3b294cd219ea3915e2e4b0952c88e92f3c21b67df4b93990103.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2541029.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2541029.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2591871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2591871.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1323073.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g1323073.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 5845⤵
- Program crash
PID:756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1635147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1635147.exe4⤵
- Executes dropped EXE
PID:1616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1320 -ip 13201⤵PID:1020
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD592397294e10285ad5c2df30ae562d828
SHA1e74755601cec958ccc1fa4fe2d76357a9d45272c
SHA256f74864e624cb1641404f3280de45762c6ec7b94e08c02e13fb812a20bc4a02aa
SHA512a4ded9b84e85ef677961c9c2e1b85c35f9326132092d9ccabf213724d25e8a36aec2db9ebf63af1d1d5e5cf6c95c1811b2ee525c2876db5e1a2d9d43259f2b6f
-
Filesize
273KB
MD5588a564fff4342e2a66003b86828c725
SHA1daa98184e5ad032a271fd03946b8b3b0820a1dbd
SHA256ebbb6cc79b850c37f7385e2407520cdef0c96f085a8bfb06b3093073cf602f5c
SHA512937787388d504c547f0b484a3e29a698c82a5dc4d135099a5e88ee36b1e6b92cf8290b76195a791b171e3d6ffc913227a84144cd379a255914cbdb24dc3845dc
-
Filesize
135KB
MD5da139a890120e0e4f6d493c5ece00a53
SHA1738c86be3e213ee020b909b99ed2500babeb4173
SHA25614604e244f376b1d97bb4e3650826b4245a7cbf565a98ce992acb9d9cea237a6
SHA512347064cff4715ecc76a93cbef477d24443c86458677adf85ad23a992d0d9f0120051e77947b315e57cd93fae0666182d850dafcc868d31f1aaa0747f45fcb512
-
Filesize
176KB
MD57672f8389923ff6b62b4de76b120a2d4
SHA14eeb65cf36b0ed206ba9293e4310bedbab0acabb
SHA2560ce98a97464e50a3314a4472fd3f3f3e8ad345b96dcb9a5c0033824456757051
SHA512caa41c8109140b007bc0ec3883998569e85c382a6e32e5ef436c1772a1663a6a885a064be5e7b69e5b02e43700651768eb9ccfc31d2f9e0874fccb99d6b004ea