Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
39817cdfeea2b53cfd3caa4ab.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
39817cdfeea2b53cfd3caa4ab.exe
Resource
win10v2004-20230703-en
General
-
Target
39817cdfeea2b53cfd3caa4ab.exe
-
Size
512KB
-
MD5
92aacd53b142f112990085ce81f3eb51
-
SHA1
22bd35c0cab9f166fcc85a740fd68eb372dff071
-
SHA256
39817cdfeea2b53cfd3caa4ab300baa92002f795b425f0ce2ba8c593bceb6437
-
SHA512
679eed4fea0495619a8ae4370f88d7a48e68cbd2d882cb31e4cbd63bac3f27bfc1db14744bd3444c16289726d0d20e6035b0ab56a1efee9569210e0e1dd67fbb
-
SSDEEP
12288:qeQgC2Q2PBsczk9gNhfjaH5EJsO+vUxY2bO4d6STCEMR6v:vQgCmvzHyHiJVvXO4dYETv
Malware Config
Extracted
redline
nowa
77.91.124.49:19073
-
auth_value
6bc6b0617aa32bcd971aef4a2cf49647
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231ee-186.dat healer behavioral2/files/0x00070000000231ee-187.dat healer behavioral2/memory/5036-188-0x00000000005A0000-0x00000000005AA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection i5736285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i5736285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i5736285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i5736285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i5736285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i5736285.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation g1197200.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 1976 x5143139.exe 2184 f2602447.exe 2152 g1197200.exe 2056 rugen.exe 5036 i5736285.exe 2428 rugen.exe 2712 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 4804 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i5736285.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 39817cdfeea2b53cfd3caa4ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39817cdfeea2b53cfd3caa4ab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5143139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5143139.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2184 f2602447.exe 2184 f2602447.exe 5036 i5736285.exe 5036 i5736285.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2184 f2602447.exe Token: SeDebugPrivilege 5036 i5736285.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 g1197200.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1976 1776 39817cdfeea2b53cfd3caa4ab.exe 86 PID 1776 wrote to memory of 1976 1776 39817cdfeea2b53cfd3caa4ab.exe 86 PID 1776 wrote to memory of 1976 1776 39817cdfeea2b53cfd3caa4ab.exe 86 PID 1976 wrote to memory of 2184 1976 x5143139.exe 87 PID 1976 wrote to memory of 2184 1976 x5143139.exe 87 PID 1976 wrote to memory of 2184 1976 x5143139.exe 87 PID 1976 wrote to memory of 2152 1976 x5143139.exe 91 PID 1976 wrote to memory of 2152 1976 x5143139.exe 91 PID 1976 wrote to memory of 2152 1976 x5143139.exe 91 PID 2152 wrote to memory of 2056 2152 g1197200.exe 92 PID 2152 wrote to memory of 2056 2152 g1197200.exe 92 PID 2152 wrote to memory of 2056 2152 g1197200.exe 92 PID 1776 wrote to memory of 5036 1776 39817cdfeea2b53cfd3caa4ab.exe 93 PID 1776 wrote to memory of 5036 1776 39817cdfeea2b53cfd3caa4ab.exe 93 PID 2056 wrote to memory of 492 2056 rugen.exe 94 PID 2056 wrote to memory of 492 2056 rugen.exe 94 PID 2056 wrote to memory of 492 2056 rugen.exe 94 PID 2056 wrote to memory of 3392 2056 rugen.exe 96 PID 2056 wrote to memory of 3392 2056 rugen.exe 96 PID 2056 wrote to memory of 3392 2056 rugen.exe 96 PID 3392 wrote to memory of 2612 3392 cmd.exe 98 PID 3392 wrote to memory of 2612 3392 cmd.exe 98 PID 3392 wrote to memory of 2612 3392 cmd.exe 98 PID 3392 wrote to memory of 4260 3392 cmd.exe 99 PID 3392 wrote to memory of 4260 3392 cmd.exe 99 PID 3392 wrote to memory of 4260 3392 cmd.exe 99 PID 3392 wrote to memory of 3076 3392 cmd.exe 100 PID 3392 wrote to memory of 3076 3392 cmd.exe 100 PID 3392 wrote to memory of 3076 3392 cmd.exe 100 PID 3392 wrote to memory of 3812 3392 cmd.exe 101 PID 3392 wrote to memory of 3812 3392 cmd.exe 101 PID 3392 wrote to memory of 3812 3392 cmd.exe 101 PID 3392 wrote to memory of 2636 3392 cmd.exe 102 PID 3392 wrote to memory of 2636 3392 cmd.exe 102 PID 3392 wrote to memory of 2636 3392 cmd.exe 102 PID 3392 wrote to memory of 4156 3392 cmd.exe 103 PID 3392 wrote to memory of 4156 3392 cmd.exe 103 PID 3392 wrote to memory of 4156 3392 cmd.exe 103 PID 2056 wrote to memory of 4804 2056 rugen.exe 106 PID 2056 wrote to memory of 4804 2056 rugen.exe 106 PID 2056 wrote to memory of 4804 2056 rugen.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\39817cdfeea2b53cfd3caa4ab.exe"C:\Users\Admin\AppData\Local\Temp\39817cdfeea2b53cfd3caa4ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5143139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5143139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f2602447.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f2602447.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1197200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1197200.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:3076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:4156
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5736285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5736285.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2428
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:2712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
321KB
MD5d307aaebe09ffbf92892272a647d701b
SHA180ac4a740c414d7e6ef2251c36b53a74fc2d7d2a
SHA256fee5f7c23ee9ce6eb55593af998cb63838547ffb7938dd90460ededc324efe41
SHA512a1b871f76d06f0c79e209c20522be336f65c7afe05130ad3f3f1343fe756dc26136e29a417785d0ce78367a5ec99f54a6494a8712591185b4e1233ed6a73044d
-
Filesize
321KB
MD5d307aaebe09ffbf92892272a647d701b
SHA180ac4a740c414d7e6ef2251c36b53a74fc2d7d2a
SHA256fee5f7c23ee9ce6eb55593af998cb63838547ffb7938dd90460ededc324efe41
SHA512a1b871f76d06f0c79e209c20522be336f65c7afe05130ad3f3f1343fe756dc26136e29a417785d0ce78367a5ec99f54a6494a8712591185b4e1233ed6a73044d
-
Filesize
262KB
MD53f3b00fb329a5f2af173b14281545733
SHA1849d7d18fd2f1741bdf2d7384526450710d91bdb
SHA25631614625b0b82cd0360b8023bfd7557c49d8bdb57e284dd2d6ba7b907b29c19d
SHA51278ef9965126a1fe91c9565b1ec5a2fcf2697944314fb9282a917edaffeff55f5c349ce1ec46e8147d7e2324f38e5b20b1980ec929154bded4708d9c89873f328
-
Filesize
262KB
MD53f3b00fb329a5f2af173b14281545733
SHA1849d7d18fd2f1741bdf2d7384526450710d91bdb
SHA25631614625b0b82cd0360b8023bfd7557c49d8bdb57e284dd2d6ba7b907b29c19d
SHA51278ef9965126a1fe91c9565b1ec5a2fcf2697944314fb9282a917edaffeff55f5c349ce1ec46e8147d7e2324f38e5b20b1980ec929154bded4708d9c89873f328
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d