Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 08:09
Static task
static1
Behavioral task
behavioral1
Sample
0a93b16a27c87d0b34f2ad4508b4bc48.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
0a93b16a27c87d0b34f2ad4508b4bc48.exe
Resource
win10v2004-20230621-en
General
-
Target
0a93b16a27c87d0b34f2ad4508b4bc48.exe
-
Size
512KB
-
MD5
0a93b16a27c87d0b34f2ad4508b4bc48
-
SHA1
8eeaceade70f833a2f767db3f7420919526e5cbf
-
SHA256
761932b6b060bfcbb455f738095e689c194d5aebef73c974a2244ccb0e2a5f7f
-
SHA512
7ede61f2dc2845d5c87a2a7654216f6079ac66527307ee4a2cceb4362f740e4eedb9a4dfb15de68337c6efe65c93c84e9087f5fcbe9f7cf8f1060405f77cfe66
-
SSDEEP
6144:IhaPWrinLmBjOY5P3m88BtK3wxC8qGJR8RzEAOrptNLh0wtNRjhEeYJ7RfdnG/:IFriKUQ2PBsWqNRz8zNuwpljKzu
Malware Config
Extracted
redline
andre
77.91.124.49:19073
-
auth_value
8e5522dc6bdb7e288797bc46c2687b12
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023128-186.dat healer behavioral2/files/0x0008000000023128-187.dat healer behavioral2/memory/1832-188-0x0000000000D40000-0x0000000000D4A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i3864714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i3864714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i3864714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i3864714.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection i3864714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i3864714.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation rugen.exe Key value queried \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\International\Geo\Nation g2802188.exe -
Executes dropped EXE 7 IoCs
pid Process 2800 x3171821.exe 2628 f8173870.exe 536 g2802188.exe 1308 rugen.exe 1832 i3864714.exe 552 rugen.exe 4976 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i3864714.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a93b16a27c87d0b34f2ad4508b4bc48.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3171821.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3171821.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0a93b16a27c87d0b34f2ad4508b4bc48.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2628 f8173870.exe 2628 f8173870.exe 1832 i3864714.exe 1832 i3864714.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2628 f8173870.exe Token: SeDebugPrivilege 1832 i3864714.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 536 g2802188.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3876 wrote to memory of 2800 3876 0a93b16a27c87d0b34f2ad4508b4bc48.exe 85 PID 3876 wrote to memory of 2800 3876 0a93b16a27c87d0b34f2ad4508b4bc48.exe 85 PID 3876 wrote to memory of 2800 3876 0a93b16a27c87d0b34f2ad4508b4bc48.exe 85 PID 2800 wrote to memory of 2628 2800 x3171821.exe 86 PID 2800 wrote to memory of 2628 2800 x3171821.exe 86 PID 2800 wrote to memory of 2628 2800 x3171821.exe 86 PID 2800 wrote to memory of 536 2800 x3171821.exe 94 PID 2800 wrote to memory of 536 2800 x3171821.exe 94 PID 2800 wrote to memory of 536 2800 x3171821.exe 94 PID 536 wrote to memory of 1308 536 g2802188.exe 95 PID 536 wrote to memory of 1308 536 g2802188.exe 95 PID 536 wrote to memory of 1308 536 g2802188.exe 95 PID 3876 wrote to memory of 1832 3876 0a93b16a27c87d0b34f2ad4508b4bc48.exe 96 PID 3876 wrote to memory of 1832 3876 0a93b16a27c87d0b34f2ad4508b4bc48.exe 96 PID 1308 wrote to memory of 1164 1308 rugen.exe 97 PID 1308 wrote to memory of 1164 1308 rugen.exe 97 PID 1308 wrote to memory of 1164 1308 rugen.exe 97 PID 1308 wrote to memory of 1060 1308 rugen.exe 99 PID 1308 wrote to memory of 1060 1308 rugen.exe 99 PID 1308 wrote to memory of 1060 1308 rugen.exe 99 PID 1060 wrote to memory of 4968 1060 cmd.exe 101 PID 1060 wrote to memory of 4968 1060 cmd.exe 101 PID 1060 wrote to memory of 4968 1060 cmd.exe 101 PID 1060 wrote to memory of 4976 1060 cmd.exe 102 PID 1060 wrote to memory of 4976 1060 cmd.exe 102 PID 1060 wrote to memory of 4976 1060 cmd.exe 102 PID 1060 wrote to memory of 932 1060 cmd.exe 103 PID 1060 wrote to memory of 932 1060 cmd.exe 103 PID 1060 wrote to memory of 932 1060 cmd.exe 103 PID 1060 wrote to memory of 1940 1060 cmd.exe 104 PID 1060 wrote to memory of 1940 1060 cmd.exe 104 PID 1060 wrote to memory of 1940 1060 cmd.exe 104 PID 1060 wrote to memory of 3496 1060 cmd.exe 105 PID 1060 wrote to memory of 3496 1060 cmd.exe 105 PID 1060 wrote to memory of 3496 1060 cmd.exe 105 PID 1060 wrote to memory of 4432 1060 cmd.exe 106 PID 1060 wrote to memory of 4432 1060 cmd.exe 106 PID 1060 wrote to memory of 4432 1060 cmd.exe 106 PID 1308 wrote to memory of 2200 1308 rugen.exe 111 PID 1308 wrote to memory of 2200 1308 rugen.exe 111 PID 1308 wrote to memory of 2200 1308 rugen.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a93b16a27c87d0b34f2ad4508b4bc48.exe"C:\Users\Admin\AppData\Local\Temp\0a93b16a27c87d0b34f2ad4508b4bc48.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3171821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3171821.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f8173870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f8173870.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2802188.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2802188.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:1164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:3496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4432
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3864714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3864714.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:552
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
321KB
MD5b5df697453d964452c145b59f57e072b
SHA1b6499a235b9d7bae5e743e7c1ffe15c9c9129e62
SHA2560fd1726a6487a58d2d082beb2b24b41b6915a7321dc12c7d84fa6f1d946e6711
SHA512e987b463fd48d174b53e92f5606f3c899ad6d8c49f0d564c81641f2ac89a49a5be6d171587049b3a7e9d6baa4fcb06290811577451fe66b7baeebe98607bb849
-
Filesize
321KB
MD5b5df697453d964452c145b59f57e072b
SHA1b6499a235b9d7bae5e743e7c1ffe15c9c9129e62
SHA2560fd1726a6487a58d2d082beb2b24b41b6915a7321dc12c7d84fa6f1d946e6711
SHA512e987b463fd48d174b53e92f5606f3c899ad6d8c49f0d564c81641f2ac89a49a5be6d171587049b3a7e9d6baa4fcb06290811577451fe66b7baeebe98607bb849
-
Filesize
262KB
MD58f42f9ed5abea471081940bf2dc9c53f
SHA143e332417b382d9dde276165bf6b458b3c289942
SHA256d4ccead0dfd8d58acf2d0b91d245ebb1a2aeb9a3eb9c9be90ddc7f2150c54d17
SHA51282825d5aaae5098df9a975a2789c8f648253e8fab68fca318df09fd15924b49df46fd68c5f550399965d01ed4d5829e355f7fa322e05514cdbb0edfef362a8a8
-
Filesize
262KB
MD58f42f9ed5abea471081940bf2dc9c53f
SHA143e332417b382d9dde276165bf6b458b3c289942
SHA256d4ccead0dfd8d58acf2d0b91d245ebb1a2aeb9a3eb9c9be90ddc7f2150c54d17
SHA51282825d5aaae5098df9a975a2789c8f648253e8fab68fca318df09fd15924b49df46fd68c5f550399965d01ed4d5829e355f7fa322e05514cdbb0edfef362a8a8
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d