Overview
overview
10Static
static
30a827f3afc...35.exe
windows10-2004-x64
1018184ff5db...7a.exe
windows10-2004-x64
1036b2548e8c...4f.exe
windows10-2004-x64
104105a1b5cd...10.exe
windows10-2004-x64
105c5167b5fa...58.exe
windows10-2004-x64
1063e6b5c830...f8.exe
windows10-2004-x64
106c30cb0079...67.exe
windows7-x64
106c30cb0079...67.exe
windows10-2004-x64
106e83c409a5...45.exe
windows10-2004-x64
1077f90e3384...ff.exe
windows10-2004-x64
1078bd5cf504...7c.exe
windows10-2004-x64
107ce62a9574...e1.exe
windows10-2004-x64
107d2d45b593...66.exe
windows10-2004-x64
107d9b9686db...9b.exe
windows10-2004-x64
10864fdfc64c...f0.exe
windows10-2004-x64
109607b0ce5d...c6.exe
windows10-2004-x64
10aa524ac0a8...07.exe
windows10-2004-x64
10b6f332f02a...85.exe
windows10-2004-x64
10cfebef463c...dc.exe
windows10-2004-x64
10d0feb2ba6d...72.exe
windows10-2004-x64
10df0b96135e...51.exe
windows10-2004-x64
10Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
18184ff5db7555b2c7baf1a87aa4d5046c77710bee4b4f39e6a131f30f418f7a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
4105a1b5cdeab0ddd1945cda27d5cdaea78ffeef93a6e4ea79194dfe247fa810.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5c5167b5fa76db29ca8ae12f128646effd9bcc1c8956371aaee13bddc98fbe58.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
63e6b5c83075ac978e67dd3e333b3a73cf6c4d1c644a3e8975acdc6fb9c7c1f8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
6c30cb007997032e419ad510193eb667e3f0e2f8af929be8fc9c20b3ae8f0467.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
6c30cb007997032e419ad510193eb667e3f0e2f8af929be8fc9c20b3ae8f0467.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6e83c409a5141acfb33dd664684ab352c7d7ecdc7a01189c46cf229a14f9b645.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
77f90e33849dda663fd4cda0660a634b060b4175b2e67325c1556e009c739dff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
78bd5cf504a3577dc9d7f80114d8adafdd8f12cb7f983f8814a107da3aca917c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7ce62a9574ca774ba9c6234c75799fd5cb2c153c6f1e40a65e1bea1a9c2219e1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7d2d45b5937ea290b091c8ccd70073bfedc220269f4ab6c1833823d1678ed166.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7d9b9686dbe7185e907f691f010b2ffdd754b22bfd13757340c6d287bc7e459b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
864fdfc64cf28ad02bb956d55c2a2ce062a178c9a8ca6100f6534277ceedd3f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
9607b0ce5da9cdaed4a53ccbe60fb0d4863b49ad237993d21e1b23a6674e97c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
aa524ac0a848432537ae785725900e93cb6140ebd8edeace3fe041dd64b93f07.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
b6f332f02aabba8a420db82ac6b2a3566d6384471d7dae236759ded20f8dde85.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
cfebef463cdc3659ceb74203574f47da9a4378aab8633dc93e49ef6b8641bcdc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d0feb2ba6d8db360600c65c0a9ff51f8124b12ca9b415bbfdedf54b559a9c672.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
df0b96135e1607d766af3caf4942e58032580d533155a67061447124b2259851.exe
Resource
win10v2004-20240426-en
General
-
Target
0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe
-
Size
472KB
-
MD5
6ff1a455bee02fd15858c1e9324655a1
-
SHA1
eabc36878fa2c646c59a88e4184601acfb8ef904
-
SHA256
0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35
-
SHA512
56cc3ba67e4c84eb4ae885b06f96ea0894d22aa4af2c9cda8debfde8b02a21410da0add2d64bff488616675f55808dca64d683a965c965f712b51032aebc7fad
-
SSDEEP
12288:iMrNy90xixQ21JflwuqdlE5ntM2LcjqeicCWCCVX2:3ylQ2vqcFtM2IqcC2A
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/4960-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000233ca-16.dat family_redline behavioral1/memory/4508-18-0x0000000000760000-0x0000000000790000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 376 x5152075.exe 2844 g9981661.exe 4508 i6158615.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5152075.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 4960 2844 g9981661.exe 86 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2944 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4960 AppLaunch.exe 4960 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4960 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4260 wrote to memory of 376 4260 0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe 83 PID 4260 wrote to memory of 376 4260 0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe 83 PID 4260 wrote to memory of 376 4260 0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe 83 PID 376 wrote to memory of 2844 376 x5152075.exe 84 PID 376 wrote to memory of 2844 376 x5152075.exe 84 PID 376 wrote to memory of 2844 376 x5152075.exe 84 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 2844 wrote to memory of 4960 2844 g9981661.exe 86 PID 376 wrote to memory of 4508 376 x5152075.exe 87 PID 376 wrote to memory of 4508 376 x5152075.exe 87 PID 376 wrote to memory of 4508 376 x5152075.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe"C:\Users\Admin\AppData\Local\Temp\0a827f3afc0645954dd24f12c87e59035cad5723414cfb4b9933e600faf4ae35.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5152075.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5152075.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9981661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9981661.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6158615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6158615.exe3⤵
- Executes dropped EXE
PID:4508
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD5083698040f3d894284f368b199feb1c5
SHA15ad081ce1bba898ba7debe73dcadc07c29e99ea7
SHA256dc5b96faada8ad9fec9791b37cd1d7524480c0b5b385c7e93d5c1b8a87b6a951
SHA512c59a45526d605743b7c4a57a403255be7e61ef76cb06043e92372cb71be1da6bbdf5a7e9619bac6dcc385724b4944368ca893ab20a427de3b2228177c211e335
-
Filesize
213KB
MD58666460b59bbf9ad837c7ce6e48e44b5
SHA17dcbbe93b3ab2e0733cba10439ebb908b3d4c7e5
SHA256b0e041a212294b2fdc474bc619cd5da217f0b7ac27c30b819f671c311c54b9ed
SHA5129407b97fd1f3d478328ccff7f8ac843fb4d2c5b1d04c2f2abd4b9a8d6d2512bc5ee224d5f9a89d44e03171676f950211ecd3f3508acf46cbf4da4adf05b79a74
-
Filesize
174KB
MD521787d88f38dd7d7c236d4f380f33f95
SHA178e813d4ac7bbc19d2103d7611ff6938ca37a3a4
SHA256422861a2877f1c4b77ff40704728c154dd3bb9681510c618f52160f2f931afdd
SHA512c9b1ec4e94c9187df109493d8e6e69bc8e290f73cfd74cf85e3f25451d62b1539685bb6f3982335b77679ad008b94813ba5b9e0d9d36f41e4e52f13b7aa515b0