Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 00:57
Static task
static1
Behavioral task
behavioral1
Sample
c43d3f4db09e3debe4acc553bd0058aa.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
c43d3f4db09e3debe4acc553bd0058aa.exe
Resource
win10v2004-20230621-en
General
-
Target
c43d3f4db09e3debe4acc553bd0058aa.exe
-
Size
526KB
-
MD5
c43d3f4db09e3debe4acc553bd0058aa
-
SHA1
0d55232bc94fe1d7f26e6b763e5052290c001a67
-
SHA256
f534fbe48b688f7269a4b97027941e019e84cb13fb148177e9704313ed0d4ec9
-
SHA512
95f630ba30524527d35592ed6f314693bce1fe27f94df7503365950b2aa8912c4256518b5353b446eff2084ac11ae328dae186fcb32108edd068149868fdbe16
-
SSDEEP
12288:sSEl+gQ2PBs31ylC0Gg3XhOyKOC43z+Q7kvUc72JJ:sSEl+059SOCWB7Al72JJ
Malware Config
Extracted
redline
andre
77.91.124.49:19073
-
auth_value
8e5522dc6bdb7e288797bc46c2687b12
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/112-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2498196.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation n4824283.exe Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 3328 y4091611.exe 112 k2498196.exe 3208 l9690296.exe 2632 n4824283.exe 560 rugen.exe 4928 rugen.exe 4208 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 3852 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2498196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2498196.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c43d3f4db09e3debe4acc553bd0058aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c43d3f4db09e3debe4acc553bd0058aa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4091611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4091611.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 112 k2498196.exe 112 k2498196.exe 3208 l9690296.exe 3208 l9690296.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 112 k2498196.exe Token: SeDebugPrivilege 3208 l9690296.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 n4824283.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3328 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 85 PID 2848 wrote to memory of 3328 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 85 PID 2848 wrote to memory of 3328 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 85 PID 3328 wrote to memory of 112 3328 y4091611.exe 86 PID 3328 wrote to memory of 112 3328 y4091611.exe 86 PID 3328 wrote to memory of 112 3328 y4091611.exe 86 PID 3328 wrote to memory of 3208 3328 y4091611.exe 91 PID 3328 wrote to memory of 3208 3328 y4091611.exe 91 PID 3328 wrote to memory of 3208 3328 y4091611.exe 91 PID 2848 wrote to memory of 2632 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 93 PID 2848 wrote to memory of 2632 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 93 PID 2848 wrote to memory of 2632 2848 c43d3f4db09e3debe4acc553bd0058aa.exe 93 PID 2632 wrote to memory of 560 2632 n4824283.exe 94 PID 2632 wrote to memory of 560 2632 n4824283.exe 94 PID 2632 wrote to memory of 560 2632 n4824283.exe 94 PID 560 wrote to memory of 3380 560 rugen.exe 95 PID 560 wrote to memory of 3380 560 rugen.exe 95 PID 560 wrote to memory of 3380 560 rugen.exe 95 PID 560 wrote to memory of 4204 560 rugen.exe 97 PID 560 wrote to memory of 4204 560 rugen.exe 97 PID 560 wrote to memory of 4204 560 rugen.exe 97 PID 4204 wrote to memory of 1160 4204 cmd.exe 99 PID 4204 wrote to memory of 1160 4204 cmd.exe 99 PID 4204 wrote to memory of 1160 4204 cmd.exe 99 PID 4204 wrote to memory of 2112 4204 cmd.exe 100 PID 4204 wrote to memory of 2112 4204 cmd.exe 100 PID 4204 wrote to memory of 2112 4204 cmd.exe 100 PID 4204 wrote to memory of 3912 4204 cmd.exe 101 PID 4204 wrote to memory of 3912 4204 cmd.exe 101 PID 4204 wrote to memory of 3912 4204 cmd.exe 101 PID 4204 wrote to memory of 1056 4204 cmd.exe 102 PID 4204 wrote to memory of 1056 4204 cmd.exe 102 PID 4204 wrote to memory of 1056 4204 cmd.exe 102 PID 4204 wrote to memory of 4132 4204 cmd.exe 103 PID 4204 wrote to memory of 4132 4204 cmd.exe 103 PID 4204 wrote to memory of 4132 4204 cmd.exe 103 PID 4204 wrote to memory of 1660 4204 cmd.exe 104 PID 4204 wrote to memory of 1660 4204 cmd.exe 104 PID 4204 wrote to memory of 1660 4204 cmd.exe 104 PID 560 wrote to memory of 3852 560 rugen.exe 114 PID 560 wrote to memory of 3852 560 rugen.exe 114 PID 560 wrote to memory of 3852 560 rugen.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\c43d3f4db09e3debe4acc553bd0058aa.exe"C:\Users\Admin\AppData\Local\Temp\c43d3f4db09e3debe4acc553bd0058aa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4091611.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4091611.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2498196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2498196.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9690296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9690296.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4824283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4824283.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:3380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:2112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:3912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:4132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:1660
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4928
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
263KB
MD55a037f58da1635757bd9dc0ef481c002
SHA18fc2d2f37454c79aa5538d2611d434ed3f2b88d2
SHA256af298ca535f0c0f9c079b57381ad0ac742150d567e02a7775c5447d9b62ef4e4
SHA5120f9f143180a1ccc6fa154b92256d13102f0e0a371122590bc21da9751e0fa9cecf21f52d678a796926bc19d2024cac91e1973eedfa00ad681cb3d3b6fd9ed2e0
-
Filesize
263KB
MD55a037f58da1635757bd9dc0ef481c002
SHA18fc2d2f37454c79aa5538d2611d434ed3f2b88d2
SHA256af298ca535f0c0f9c079b57381ad0ac742150d567e02a7775c5447d9b62ef4e4
SHA5120f9f143180a1ccc6fa154b92256d13102f0e0a371122590bc21da9751e0fa9cecf21f52d678a796926bc19d2024cac91e1973eedfa00ad681cb3d3b6fd9ed2e0
-
Filesize
101KB
MD5fe3b3fa14555ecc0fa6c9abcc7ad093e
SHA1e5df69605144926a3304209cbd633cec3bff7d68
SHA2567478cc18bf6a72d3d8e88d3eb7ba40dce1749949a79ffb77e6b50bb39c27aabe
SHA512996c70c0e51468cd19f56b2d2bd905731435f571fa8c04723977caf5a9149b8e964f3baeb883abb247974433cfe53cfb4c7d6e8f66c9bdb72978b62529c42acf
-
Filesize
101KB
MD5fe3b3fa14555ecc0fa6c9abcc7ad093e
SHA1e5df69605144926a3304209cbd633cec3bff7d68
SHA2567478cc18bf6a72d3d8e88d3eb7ba40dce1749949a79ffb77e6b50bb39c27aabe
SHA512996c70c0e51468cd19f56b2d2bd905731435f571fa8c04723977caf5a9149b8e964f3baeb883abb247974433cfe53cfb4c7d6e8f66c9bdb72978b62529c42acf
-
Filesize
262KB
MD5d424c85effbd0dd52a3cecedd3bae892
SHA1e1e1cacb73c556434946f7c53666a58169f5ee1b
SHA256b69efef08406f8d9ffb3e37f22f1357993eda3a54e99c1d728bda5c009f6f008
SHA512cb2dde310a91e7aa4ce570155fb1c207208fec4ac097883e0cab303d5e83337c817e29606784dbf69879f82d55c92ba28dd9b6c56e6b55a3ee0df2daea352055
-
Filesize
262KB
MD5d424c85effbd0dd52a3cecedd3bae892
SHA1e1e1cacb73c556434946f7c53666a58169f5ee1b
SHA256b69efef08406f8d9ffb3e37f22f1357993eda3a54e99c1d728bda5c009f6f008
SHA512cb2dde310a91e7aa4ce570155fb1c207208fec4ac097883e0cab303d5e83337c817e29606784dbf69879f82d55c92ba28dd9b6c56e6b55a3ee0df2daea352055
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d