Analysis
-
max time kernel
114s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
a32a7a77b68d2379e129a7e0c3bbe4a2.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a32a7a77b68d2379e129a7e0c3bbe4a2.exe
Resource
win10v2004-20230621-en
General
-
Target
a32a7a77b68d2379e129a7e0c3bbe4a2.exe
-
Size
540KB
-
MD5
a32a7a77b68d2379e129a7e0c3bbe4a2
-
SHA1
b2a9b88ababacb142270beb21b367b857a5ed9df
-
SHA256
055b68db6c5abdb58fe4f26527ae2ebb3bbd1438bc559fc4d8d769e50dc265af
-
SHA512
18508a0af2c348d35c9aa03c239a40f45485f9e816e129796b271d5c88700fd8f1cfc7202fbeeca90cf5f9487d99b191e2bee2f417611554864d599d7cab1b10
-
SSDEEP
12288:YVX3XQ2PBsq77+mkqw2neQ+akCKq7vVG3QdQZ:YVX3pf40+akD89G9
Malware Config
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2036-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4757393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4757393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4757393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4757393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4757393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4757393.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation n0280584.exe Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 3792 y5981541.exe 2036 k4757393.exe 1700 l3468482.exe 4752 n0280584.exe 4268 rugen.exe 3900 rugen.exe 5084 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4757393.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4757393.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a32a7a77b68d2379e129a7e0c3bbe4a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a32a7a77b68d2379e129a7e0c3bbe4a2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5981541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5981541.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2036 k4757393.exe 2036 k4757393.exe 1700 l3468482.exe 1700 l3468482.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 k4757393.exe Token: SeDebugPrivilege 1700 l3468482.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4752 n0280584.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3792 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 85 PID 4312 wrote to memory of 3792 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 85 PID 4312 wrote to memory of 3792 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 85 PID 3792 wrote to memory of 2036 3792 y5981541.exe 86 PID 3792 wrote to memory of 2036 3792 y5981541.exe 86 PID 3792 wrote to memory of 2036 3792 y5981541.exe 86 PID 3792 wrote to memory of 1700 3792 y5981541.exe 96 PID 3792 wrote to memory of 1700 3792 y5981541.exe 96 PID 3792 wrote to memory of 1700 3792 y5981541.exe 96 PID 4312 wrote to memory of 4752 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 98 PID 4312 wrote to memory of 4752 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 98 PID 4312 wrote to memory of 4752 4312 a32a7a77b68d2379e129a7e0c3bbe4a2.exe 98 PID 4752 wrote to memory of 4268 4752 n0280584.exe 99 PID 4752 wrote to memory of 4268 4752 n0280584.exe 99 PID 4752 wrote to memory of 4268 4752 n0280584.exe 99 PID 4268 wrote to memory of 1380 4268 rugen.exe 100 PID 4268 wrote to memory of 1380 4268 rugen.exe 100 PID 4268 wrote to memory of 1380 4268 rugen.exe 100 PID 4268 wrote to memory of 4684 4268 rugen.exe 102 PID 4268 wrote to memory of 4684 4268 rugen.exe 102 PID 4268 wrote to memory of 4684 4268 rugen.exe 102 PID 4684 wrote to memory of 3328 4684 cmd.exe 104 PID 4684 wrote to memory of 3328 4684 cmd.exe 104 PID 4684 wrote to memory of 3328 4684 cmd.exe 104 PID 4684 wrote to memory of 1340 4684 cmd.exe 105 PID 4684 wrote to memory of 1340 4684 cmd.exe 105 PID 4684 wrote to memory of 1340 4684 cmd.exe 105 PID 4684 wrote to memory of 4440 4684 cmd.exe 106 PID 4684 wrote to memory of 4440 4684 cmd.exe 106 PID 4684 wrote to memory of 4440 4684 cmd.exe 106 PID 4684 wrote to memory of 224 4684 cmd.exe 107 PID 4684 wrote to memory of 224 4684 cmd.exe 107 PID 4684 wrote to memory of 224 4684 cmd.exe 107 PID 4684 wrote to memory of 4296 4684 cmd.exe 108 PID 4684 wrote to memory of 4296 4684 cmd.exe 108 PID 4684 wrote to memory of 4296 4684 cmd.exe 108 PID 4684 wrote to memory of 4828 4684 cmd.exe 109 PID 4684 wrote to memory of 4828 4684 cmd.exe 109 PID 4684 wrote to memory of 4828 4684 cmd.exe 109 PID 4268 wrote to memory of 2080 4268 rugen.exe 116 PID 4268 wrote to memory of 2080 4268 rugen.exe 116 PID 4268 wrote to memory of 2080 4268 rugen.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\a32a7a77b68d2379e129a7e0c3bbe4a2.exe"C:\Users\Admin\AppData\Local\Temp\a32a7a77b68d2379e129a7e0c3bbe4a2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5981541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5981541.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4757393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4757393.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3468482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3468482.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0280584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0280584.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:1340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:4296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4828
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3900
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:5084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
265KB
MD5f17c0eb56193c34c02e3856c7bfbd995
SHA167f59f1c8a86c87bd83775e7f8324285c6afa878
SHA256192b7cc425f815fb14dda337624338827224907384e18571c474c61c933fa767
SHA512b6956dbde50298e9b2afd8784875d4c743e9813aff70c5661ecc1c4acf09a22300bfc372986f2900242cdb033451b33e003661e9f4884e8ff9067d6f37139512
-
Filesize
265KB
MD5f17c0eb56193c34c02e3856c7bfbd995
SHA167f59f1c8a86c87bd83775e7f8324285c6afa878
SHA256192b7cc425f815fb14dda337624338827224907384e18571c474c61c933fa767
SHA512b6956dbde50298e9b2afd8784875d4c743e9813aff70c5661ecc1c4acf09a22300bfc372986f2900242cdb033451b33e003661e9f4884e8ff9067d6f37139512
-
Filesize
114KB
MD5b43d36fc0b40807d866f481d6e610031
SHA1583b6339009869bbe19e66fdd6a52e908770f224
SHA256b1d40b47a399728a94d6d45fb5905d9df89990dd6c326974a2858b0dba2bb490
SHA512d9365f6054754e2c10115e6e1fdec544763135976589265b2e19ce56f770edc17c76538ff328757419c74dd73612624b9ac62c3b4af11026447d71a683e45437
-
Filesize
114KB
MD5b43d36fc0b40807d866f481d6e610031
SHA1583b6339009869bbe19e66fdd6a52e908770f224
SHA256b1d40b47a399728a94d6d45fb5905d9df89990dd6c326974a2858b0dba2bb490
SHA512d9365f6054754e2c10115e6e1fdec544763135976589265b2e19ce56f770edc17c76538ff328757419c74dd73612624b9ac62c3b4af11026447d71a683e45437
-
Filesize
275KB
MD567d181c03091609b1ea6c4c6c23544a1
SHA15e82e93fcb04aeafdb52d2a05e39a054818a1c60
SHA256ec7ec30b606bb70d0e5ed3a41f359f0185d7f0f8a83cc100b3fead10d45e6288
SHA512b1e9828e2c95bceb26ec1fc6b8afe5edf19a93b789c046c15c80e10d62c8d0d6867c6cdc0c3265a64e964a4c24f6954e22cf42997b052c38e9103ec4ec41f05d
-
Filesize
275KB
MD567d181c03091609b1ea6c4c6c23544a1
SHA15e82e93fcb04aeafdb52d2a05e39a054818a1c60
SHA256ec7ec30b606bb70d0e5ed3a41f359f0185d7f0f8a83cc100b3fead10d45e6288
SHA512b1e9828e2c95bceb26ec1fc6b8afe5edf19a93b789c046c15c80e10d62c8d0d6867c6cdc0c3265a64e964a4c24f6954e22cf42997b052c38e9103ec4ec41f05d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d