Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
-
Size
1.1MB
-
MD5
46cc4c160c07962424459a08227709c4
-
SHA1
0c52b072dbd5f0450a6551b77a36b3f167de8c1e
-
SHA256
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc
-
SHA512
112c5d63847569c70f27859d0f1f340a1ceaf2785fd99a4764d35c68c487abd4ac019ce63b6de548438c4c6bbffb3d1aa39ec64e61d73dab60f7a3be3f1d39aa
-
SSDEEP
24576:ayanTPzoNnJUAnIFlf10eIKWgd6OyX80xdLPPXBZPMQ8OCHJSurat:hwfK6FZ1asYOyJTLXvPMdOCpR
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral20/memory/1064-28-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023415-30.dat family_redline behavioral20/memory/2260-32-0x0000000000CB0000-0x0000000000CE0000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 440 x1194848.exe 3016 x1999959.exe 3020 x1948888.exe 2788 g2779674.exe 2260 h2878870.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1194848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1999959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1948888.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 1064 2788 g2779674.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 2128 2788 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1064 AppLaunch.exe 1064 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4240 wrote to memory of 440 4240 f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe 82 PID 4240 wrote to memory of 440 4240 f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe 82 PID 4240 wrote to memory of 440 4240 f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe 82 PID 440 wrote to memory of 3016 440 x1194848.exe 83 PID 440 wrote to memory of 3016 440 x1194848.exe 83 PID 440 wrote to memory of 3016 440 x1194848.exe 83 PID 3016 wrote to memory of 3020 3016 x1999959.exe 84 PID 3016 wrote to memory of 3020 3016 x1999959.exe 84 PID 3016 wrote to memory of 3020 3016 x1999959.exe 84 PID 3020 wrote to memory of 2788 3020 x1948888.exe 85 PID 3020 wrote to memory of 2788 3020 x1948888.exe 85 PID 3020 wrote to memory of 2788 3020 x1948888.exe 85 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 2788 wrote to memory of 1064 2788 g2779674.exe 89 PID 3020 wrote to memory of 2260 3020 x1948888.exe 94 PID 3020 wrote to memory of 2260 3020 x1948888.exe 94 PID 3020 wrote to memory of 2260 3020 x1948888.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe"C:\Users\Admin\AppData\Local\Temp\f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1194848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1194848.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1999959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1999959.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1948888.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1948888.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2779674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2779674.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 1526⤵
- Program crash
PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2878870.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2878870.exe5⤵
- Executes dropped EXE
PID:2260
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2788 -ip 27881⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5469523525237c805502bfbec72b8a67e
SHA134ee6b4be2d26dc6e9a51946cbdc6038c97e9ed6
SHA256ae4c484d116f025cd08dbed6d3786eec6b547e15919997f550be788a427a7f0e
SHA512863aa4f5985e6c5932bde5ee3046b027e15ded0a040acf0065cc7ff5454a621dcada95bc78a06da879de7f729d0ed1f364bdddde3db1b5067530d10a26812696
-
Filesize
651KB
MD5bce56f4e512ae7758e3890f9add2c6ae
SHA16ee31f44edef526548adcd41952a2addd6c86e2e
SHA256209a0c03d464fafc9657c1a5f8dc61d88c68af9312cfa32c282538730b79cf81
SHA512d30925c89601ce3c7c57075efa52c6c1212d3a9473da16c8330509625b1ef959913122a8b2974f1d33432f7b986c902ed3cc229a133dc0fedd0a4bbc808e8576
-
Filesize
465KB
MD55c67808b656205321897724516b25c6a
SHA13e940a5fea71a3c510eabaebfc346b6cede331f8
SHA256b12350798c654ae949a005844c65ef16d136ad08598227c8041fe8bb48e6dcbd
SHA512656aa047c084f5b81903ee4ef2e8e87c0d557218fefd4c84e9e2aecffba9a7147a89a97b5f954e24dd07643749ea63c04ae4c326baa1298e7d0a635c44a0c8c7
-
Filesize
899KB
MD5e829ce547c5be1cd263c88beec82f48d
SHA15c4568f0f9eb99439898e32cbf75b6d69efb7453
SHA2565af500b6b3b8be045d276abce5be151c057b739ff9439f9fb4740285fb54277d
SHA5121d11ffdfbf497815c5c588f5b6eb2ede1b4994d2f0167fca7977133f31fb7c7bdfc82ae52199cd4ca277a256e8f78efb5249aa7d62882c42778921c5b3806ae5
-
Filesize
174KB
MD51b51b2d863f4bf00441ad1efd2880ce8
SHA1d571b8c09671d4db37be6c2e62b753787a248e85
SHA2560c6731f17d8873eb91514cb5a0419b9a23704a143fb414cd5cb38132efc05944
SHA5120bf3570620819244f966fd2c8b90ecf72f5123b371e8a79839674962bb9f542ccf166bbae304e604af811c4f3472c5166dc274a31e8f99d9ab47dbcbcd537271