Analysis
-
max time kernel
114s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2023, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
142f9888f552f1ebfaf6d169d88391da.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
142f9888f552f1ebfaf6d169d88391da.exe
Resource
win10v2004-20230621-en
General
-
Target
142f9888f552f1ebfaf6d169d88391da.exe
-
Size
514KB
-
MD5
142f9888f552f1ebfaf6d169d88391da
-
SHA1
b7a09584a6b3874adcb76325532f704296e3f81b
-
SHA256
38aa71ee54d2bc4d01515bafbf55599020578fd2242d1de20ff47e63bfc2413b
-
SHA512
39b31220b0e253359a297a58935577a59eb694a0a43f5ee22074973570385a56f788723280a09f82131b64476b24a9039687880a2f5a4ebfbed337b574e00090
-
SSDEEP
12288:gTFRdEKQ2PBstfixdGd+tWN8zPsy/TWRuXmERYEW:6RdEqsqU8WNbAi/ERxW
Malware Config
Extracted
redline
bruno
83.97.73.134:19071
-
auth_value
b23e240c277e85ce9d49d6165c0a2b48
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023137-186.dat healer behavioral2/files/0x0009000000023137-187.dat healer behavioral2/memory/4792-188-0x00000000009E0000-0x00000000009EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i3094264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i3094264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i3094264.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection i3094264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i3094264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i3094264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation g8306879.exe Key value queried \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 4324 x3541088.exe 1456 f8465131.exe 732 g8306879.exe 1804 rugen.exe 4792 i3094264.exe 1172 rugen.exe 1940 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i3094264.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3541088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3541088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 142f9888f552f1ebfaf6d169d88391da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 142f9888f552f1ebfaf6d169d88391da.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{E459B604-439B-4C63-B7CD-F51EFB734E4B}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{758F9BAE-9AE0-49D0-97CF-762084FD91E9}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D850842C-5135-436E-8DD0-90AC0173C90D}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EF607C0C-8110-4564-8367-D0FDC7DF9F42}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{83EE014C-C80E-41D4-85D1-7697AEA1C1B1}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{83092398-12C7-4C58-BB99-28A721B48AD0}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B9B88BFA-405F-4C84-B960-56E216217656}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{DF0C74D9-F0FA-4C11-BAD6-05BF7A15C58C}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1456 f8465131.exe 1456 f8465131.exe 4792 i3094264.exe 4792 i3094264.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1456 f8465131.exe Token: SeDebugPrivilege 4792 i3094264.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 732 g8306879.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4324 4872 142f9888f552f1ebfaf6d169d88391da.exe 85 PID 4872 wrote to memory of 4324 4872 142f9888f552f1ebfaf6d169d88391da.exe 85 PID 4872 wrote to memory of 4324 4872 142f9888f552f1ebfaf6d169d88391da.exe 85 PID 4324 wrote to memory of 1456 4324 x3541088.exe 86 PID 4324 wrote to memory of 1456 4324 x3541088.exe 86 PID 4324 wrote to memory of 1456 4324 x3541088.exe 86 PID 4324 wrote to memory of 732 4324 x3541088.exe 99 PID 4324 wrote to memory of 732 4324 x3541088.exe 99 PID 4324 wrote to memory of 732 4324 x3541088.exe 99 PID 732 wrote to memory of 1804 732 g8306879.exe 100 PID 732 wrote to memory of 1804 732 g8306879.exe 100 PID 732 wrote to memory of 1804 732 g8306879.exe 100 PID 4872 wrote to memory of 4792 4872 142f9888f552f1ebfaf6d169d88391da.exe 101 PID 4872 wrote to memory of 4792 4872 142f9888f552f1ebfaf6d169d88391da.exe 101 PID 1804 wrote to memory of 560 1804 rugen.exe 102 PID 1804 wrote to memory of 560 1804 rugen.exe 102 PID 1804 wrote to memory of 560 1804 rugen.exe 102 PID 1804 wrote to memory of 4244 1804 rugen.exe 104 PID 1804 wrote to memory of 4244 1804 rugen.exe 104 PID 1804 wrote to memory of 4244 1804 rugen.exe 104 PID 4244 wrote to memory of 4216 4244 cmd.exe 106 PID 4244 wrote to memory of 4216 4244 cmd.exe 106 PID 4244 wrote to memory of 4216 4244 cmd.exe 106 PID 4244 wrote to memory of 2224 4244 cmd.exe 107 PID 4244 wrote to memory of 2224 4244 cmd.exe 107 PID 4244 wrote to memory of 2224 4244 cmd.exe 107 PID 4244 wrote to memory of 4776 4244 cmd.exe 108 PID 4244 wrote to memory of 4776 4244 cmd.exe 108 PID 4244 wrote to memory of 4776 4244 cmd.exe 108 PID 4244 wrote to memory of 380 4244 cmd.exe 109 PID 4244 wrote to memory of 380 4244 cmd.exe 109 PID 4244 wrote to memory of 380 4244 cmd.exe 109 PID 4244 wrote to memory of 5084 4244 cmd.exe 110 PID 4244 wrote to memory of 5084 4244 cmd.exe 110 PID 4244 wrote to memory of 5084 4244 cmd.exe 110 PID 4244 wrote to memory of 232 4244 cmd.exe 111 PID 4244 wrote to memory of 232 4244 cmd.exe 111 PID 4244 wrote to memory of 232 4244 cmd.exe 111 PID 1804 wrote to memory of 2404 1804 rugen.exe 119 PID 1804 wrote to memory of 2404 1804 rugen.exe 119 PID 1804 wrote to memory of 2404 1804 rugen.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\142f9888f552f1ebfaf6d169d88391da.exe"C:\Users\Admin\AppData\Local\Temp\142f9888f552f1ebfaf6d169d88391da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3541088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3541088.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f8465131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f8465131.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8306879.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8306879.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:2224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:4776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:5084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:232
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3094264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3094264.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:3580
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1172
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
323KB
MD55dda40127fdaaf59b8c95d34d68371fd
SHA1336385b83d2e602541da15edee28978482b0d5ef
SHA256f9235fa721ccdfba864b40e9f74c0f408233e554751ce462b323a6486150f33e
SHA51200a9fe2f98d4290098a75c1bc05573bbe791aae5bc6d3abff4a5a97e0d4270643abaf23b62b77c96a8456816993f74afdbee5b5eb34c9718d8cb85845ee8f790
-
Filesize
323KB
MD55dda40127fdaaf59b8c95d34d68371fd
SHA1336385b83d2e602541da15edee28978482b0d5ef
SHA256f9235fa721ccdfba864b40e9f74c0f408233e554751ce462b323a6486150f33e
SHA51200a9fe2f98d4290098a75c1bc05573bbe791aae5bc6d3abff4a5a97e0d4270643abaf23b62b77c96a8456816993f74afdbee5b5eb34c9718d8cb85845ee8f790
-
Filesize
275KB
MD516a1f98defde9e82c10a7ee0ef941ea2
SHA10a77c145a4acffda159df2ec99d95a914636f3ae
SHA25687d1f1747bdffb97b8b5b3da3b520aad051ef5fb59b848175084bc86b9e5662a
SHA512b453c2691459843e76ac5d91fc8c5b268faa7e9a7951b827ac79c1176e56cd10d765bc778fe0ac5ac32027d114458d68d329bb59916fb70469ccadb15453b836
-
Filesize
275KB
MD516a1f98defde9e82c10a7ee0ef941ea2
SHA10a77c145a4acffda159df2ec99d95a914636f3ae
SHA25687d1f1747bdffb97b8b5b3da3b520aad051ef5fb59b848175084bc86b9e5662a
SHA512b453c2691459843e76ac5d91fc8c5b268faa7e9a7951b827ac79c1176e56cd10d765bc778fe0ac5ac32027d114458d68d329bb59916fb70469ccadb15453b836
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d