Analysis
-
max time kernel
113s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe
Resource
win10v2004-20230621-en
General
-
Target
7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe
-
Size
526KB
-
MD5
221327609a69d49433282a75e7867d27
-
SHA1
c885e34c555032f92585dc601cdb8d45ccef9c03
-
SHA256
7c73af568b96d5ebdedd9474ae83562d945fe2eed72da2a4778190d516fdd640
-
SHA512
262b9fc9dfbb34e53b696723820dbf0d7a6c5150366c6f38188b814c803fb5be579ce732ec42041d7a350b50b3f1225d82da7a528e99fbe674f14e5e70a56167
-
SSDEEP
12288:FhTdLtQ2PBspNySi2kSKXk35mmH4wcBCcInzxK:/TdL7YNy4KXQI4iCRVK
Malware Config
Extracted
redline
andre
77.91.124.49:19073
-
auth_value
8e5522dc6bdb7e288797bc46c2687b12
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4112-153-0x0000000000540000-0x000000000054A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1029143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1029143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1029143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1029143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1029143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1029143.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation n9080700.exe Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 2860 y8973706.exe 4112 k1029143.exe 3292 l9303466.exe 4996 n9080700.exe 3356 rugen.exe 5072 rugen.exe 228 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4636 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1029143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1029143.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8973706.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8973706.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 k1029143.exe 4112 k1029143.exe 3292 l9303466.exe 3292 l9303466.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4112 k1029143.exe Token: SeDebugPrivilege 3292 l9303466.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4996 n9080700.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2860 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 82 PID 2244 wrote to memory of 2860 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 82 PID 2244 wrote to memory of 2860 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 82 PID 2860 wrote to memory of 4112 2860 y8973706.exe 84 PID 2860 wrote to memory of 4112 2860 y8973706.exe 84 PID 2860 wrote to memory of 4112 2860 y8973706.exe 84 PID 2860 wrote to memory of 3292 2860 y8973706.exe 85 PID 2860 wrote to memory of 3292 2860 y8973706.exe 85 PID 2860 wrote to memory of 3292 2860 y8973706.exe 85 PID 2244 wrote to memory of 4996 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 87 PID 2244 wrote to memory of 4996 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 87 PID 2244 wrote to memory of 4996 2244 7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe 87 PID 4996 wrote to memory of 3356 4996 n9080700.exe 88 PID 4996 wrote to memory of 3356 4996 n9080700.exe 88 PID 4996 wrote to memory of 3356 4996 n9080700.exe 88 PID 3356 wrote to memory of 2436 3356 rugen.exe 89 PID 3356 wrote to memory of 2436 3356 rugen.exe 89 PID 3356 wrote to memory of 2436 3356 rugen.exe 89 PID 3356 wrote to memory of 3080 3356 rugen.exe 91 PID 3356 wrote to memory of 3080 3356 rugen.exe 91 PID 3356 wrote to memory of 3080 3356 rugen.exe 91 PID 3080 wrote to memory of 2360 3080 cmd.exe 93 PID 3080 wrote to memory of 2360 3080 cmd.exe 93 PID 3080 wrote to memory of 2360 3080 cmd.exe 93 PID 3080 wrote to memory of 4080 3080 cmd.exe 94 PID 3080 wrote to memory of 4080 3080 cmd.exe 94 PID 3080 wrote to memory of 4080 3080 cmd.exe 94 PID 3080 wrote to memory of 776 3080 cmd.exe 95 PID 3080 wrote to memory of 776 3080 cmd.exe 95 PID 3080 wrote to memory of 776 3080 cmd.exe 95 PID 3080 wrote to memory of 4592 3080 cmd.exe 96 PID 3080 wrote to memory of 4592 3080 cmd.exe 96 PID 3080 wrote to memory of 4592 3080 cmd.exe 96 PID 3080 wrote to memory of 4312 3080 cmd.exe 97 PID 3080 wrote to memory of 4312 3080 cmd.exe 97 PID 3080 wrote to memory of 4312 3080 cmd.exe 97 PID 3080 wrote to memory of 4924 3080 cmd.exe 98 PID 3080 wrote to memory of 4924 3080 cmd.exe 98 PID 3080 wrote to memory of 4924 3080 cmd.exe 98 PID 3356 wrote to memory of 4636 3356 rugen.exe 109 PID 3356 wrote to memory of 4636 3356 rugen.exe 109 PID 3356 wrote to memory of 4636 3356 rugen.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe"C:\Users\Admin\AppData\Local\Temp\7c73af568b96d5ebdedd9474ae83562d945fe2eed72da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8973706.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8973706.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1029143.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1029143.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9303466.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9303466.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9080700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9080700.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:4312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:4924
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:5072
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
264KB
MD50f23146cbdd518dc7fae9fb2d11489bc
SHA1c389913a3f0a581a13e28d57601e68b35caf57ff
SHA25608724c8d350fc887d05cf51017663680ea50589e32da293801bb5e594af84ebc
SHA5129c0d4b14fe31d80dfd5f86fa758b8d354f2e1fc480635c85bf4e37e1ee283b787e3fc072b215bf7ec418484befce93c4a4260cb300152c38bf06969d0d5cc31f
-
Filesize
264KB
MD50f23146cbdd518dc7fae9fb2d11489bc
SHA1c389913a3f0a581a13e28d57601e68b35caf57ff
SHA25608724c8d350fc887d05cf51017663680ea50589e32da293801bb5e594af84ebc
SHA5129c0d4b14fe31d80dfd5f86fa758b8d354f2e1fc480635c85bf4e37e1ee283b787e3fc072b215bf7ec418484befce93c4a4260cb300152c38bf06969d0d5cc31f
-
Filesize
101KB
MD5a9cd19d6ad278ae8f9d58cf538ba02ab
SHA130c7c303ee1d1905b555afffd309f75e7e498948
SHA256202730d0337b8f59995fed3f9fbecf4ba2cd0c1710eeee91c523655d970179b9
SHA512e7d797881b825afc7f2650bac51d9ca7a9f80a9b6aedafc3e45a2380616e2fdb6d16533904a349ee2b2a982a806494ac20b99ee98cd45f2146270d6e33ceea0a
-
Filesize
101KB
MD5a9cd19d6ad278ae8f9d58cf538ba02ab
SHA130c7c303ee1d1905b555afffd309f75e7e498948
SHA256202730d0337b8f59995fed3f9fbecf4ba2cd0c1710eeee91c523655d970179b9
SHA512e7d797881b825afc7f2650bac51d9ca7a9f80a9b6aedafc3e45a2380616e2fdb6d16533904a349ee2b2a982a806494ac20b99ee98cd45f2146270d6e33ceea0a
-
Filesize
263KB
MD592dbd14d2578487bc34c7fcb87086ef7
SHA1ddb56b476d5644582c4f79f4752db4c61df08884
SHA256143816132aa3daf8d3ee78a002344893fdb9e02c84ee9398a64c64fd690aea7a
SHA512edc6382368b9dbd0f288216c24f064e60281595d4334bdca1b3f1d990c1ffda3ee97be65dad77c295ddd4e4aacbade81e89385c71390dac319ef4af85386446b
-
Filesize
263KB
MD592dbd14d2578487bc34c7fcb87086ef7
SHA1ddb56b476d5644582c4f79f4752db4c61df08884
SHA256143816132aa3daf8d3ee78a002344893fdb9e02c84ee9398a64c64fd690aea7a
SHA512edc6382368b9dbd0f288216c24f064e60281595d4334bdca1b3f1d990c1ffda3ee97be65dad77c295ddd4e4aacbade81e89385c71390dac319ef4af85386446b
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d