Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
70d8adf11ebf2f9573f9b3f963cfea91.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
70d8adf11ebf2f9573f9b3f963cfea91.exe
Resource
win10v2004-20230703-en
General
-
Target
70d8adf11ebf2f9573f9b3f963cfea91.exe
-
Size
3.9MB
-
MD5
70d8adf11ebf2f9573f9b3f963cfea91
-
SHA1
4c42b8658ed99e940171b9687d52be7035279c19
-
SHA256
f0cc3a62309f533d0fba15d83b530f107e4c5c46c5148728125fced89eff64a2
-
SHA512
f33ceb1f6247151758955f0fcb43ca5afc1974d678d7d8508ea345ac5d3bc8c5f2dc45b0c7f8e423cc6a6b693cd25f9717bb0c68648a022db5b564bfc777f566
-
SSDEEP
49152:jaVw79IWxDvE+DomnkzYAsY0srHyVFlWYhUAPlPhxr0jIFusQv2E+2Nx3dub4EAY:uC1S0ZUwPbaIUs22O49PpL
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4892-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6312491.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6312491.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation rugen.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation n8524197.exe -
Executes dropped EXE 7 IoCs
pid Process 5112 y8499338.exe 4892 k6312491.exe 4736 l1487667.exe 3000 n8524197.exe 1052 rugen.exe 1096 rugen.exe 3304 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 916 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6312491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6312491.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70d8adf11ebf2f9573f9b3f963cfea91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70d8adf11ebf2f9573f9b3f963cfea91.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8499338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8499338.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4892 k6312491.exe 4892 k6312491.exe 4736 l1487667.exe 4736 l1487667.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4892 k6312491.exe Token: SeDebugPrivilege 4736 l1487667.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 n8524197.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4976 wrote to memory of 5112 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 82 PID 4976 wrote to memory of 5112 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 82 PID 4976 wrote to memory of 5112 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 82 PID 5112 wrote to memory of 4892 5112 y8499338.exe 84 PID 5112 wrote to memory of 4892 5112 y8499338.exe 84 PID 5112 wrote to memory of 4892 5112 y8499338.exe 84 PID 5112 wrote to memory of 4736 5112 y8499338.exe 86 PID 5112 wrote to memory of 4736 5112 y8499338.exe 86 PID 5112 wrote to memory of 4736 5112 y8499338.exe 86 PID 4976 wrote to memory of 3000 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 89 PID 4976 wrote to memory of 3000 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 89 PID 4976 wrote to memory of 3000 4976 70d8adf11ebf2f9573f9b3f963cfea91.exe 89 PID 3000 wrote to memory of 1052 3000 n8524197.exe 90 PID 3000 wrote to memory of 1052 3000 n8524197.exe 90 PID 3000 wrote to memory of 1052 3000 n8524197.exe 90 PID 1052 wrote to memory of 2884 1052 rugen.exe 91 PID 1052 wrote to memory of 2884 1052 rugen.exe 91 PID 1052 wrote to memory of 2884 1052 rugen.exe 91 PID 1052 wrote to memory of 4348 1052 rugen.exe 93 PID 1052 wrote to memory of 4348 1052 rugen.exe 93 PID 1052 wrote to memory of 4348 1052 rugen.exe 93 PID 4348 wrote to memory of 3964 4348 cmd.exe 95 PID 4348 wrote to memory of 3964 4348 cmd.exe 95 PID 4348 wrote to memory of 3964 4348 cmd.exe 95 PID 4348 wrote to memory of 1820 4348 cmd.exe 96 PID 4348 wrote to memory of 1820 4348 cmd.exe 96 PID 4348 wrote to memory of 1820 4348 cmd.exe 96 PID 4348 wrote to memory of 1624 4348 cmd.exe 97 PID 4348 wrote to memory of 1624 4348 cmd.exe 97 PID 4348 wrote to memory of 1624 4348 cmd.exe 97 PID 4348 wrote to memory of 4672 4348 cmd.exe 98 PID 4348 wrote to memory of 4672 4348 cmd.exe 98 PID 4348 wrote to memory of 4672 4348 cmd.exe 98 PID 4348 wrote to memory of 736 4348 cmd.exe 99 PID 4348 wrote to memory of 736 4348 cmd.exe 99 PID 4348 wrote to memory of 736 4348 cmd.exe 99 PID 4348 wrote to memory of 1180 4348 cmd.exe 100 PID 4348 wrote to memory of 1180 4348 cmd.exe 100 PID 4348 wrote to memory of 1180 4348 cmd.exe 100 PID 1052 wrote to memory of 916 1052 rugen.exe 104 PID 1052 wrote to memory of 916 1052 rugen.exe 104 PID 1052 wrote to memory of 916 1052 rugen.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\70d8adf11ebf2f9573f9b3f963cfea91.exe"C:\Users\Admin\AppData\Local\Temp\70d8adf11ebf2f9573f9b3f963cfea91.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8499338.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8499338.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6312491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6312491.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1487667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1487667.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8524197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8524197.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:1820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:1180
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1096
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
400KB
MD5e4208eb1ec020dbc13a5b890ca328366
SHA1202bcb391ba1ef8f0447d88a9219560cd8ff1d24
SHA25651c4177bfd5fc786fb05ccd397238241894c1259013f20b11a956c220547dc3e
SHA512d12f194390066c84f609dc2bd02033a3673a440a1224a47a1cd4cf85ba3eadc4e73391aef5ebec71628d34ef6d2d8f96c061acdd3fcf6fcba47b82ea727a08f4
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
185KB
MD5fdd00ec20a23884f539cebb0666882c0
SHA11dc9e89fb89b8eb6ea08e7840e66831ea023efa5
SHA256aa52395cce50a5c4b2b5aa3bf3ea7425de2d53b963b935bdf25f5667c2b9c82c
SHA512b128470a11cab184746c039cb4bf72ab736c4b3fb5349134bb97a855986cd4744c47922cfff816a5fe694191fd3ecd076493718af108ba8118e8b5f2ea7dddd6
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
1.3MB
MD555532aa1df272e9d5a22d63bd6b7cada
SHA18c8e13cc17aa785637f2346129ddbb3cf05fedb7
SHA2567a1e5c88bd7f89e4f655765aadaafbd2647043bf571ee5864b75761bef317d33
SHA512f4d5fab2c3e289c2459607a82363676579f0506d8cb90ea05ae84b6697d7fc245b0f308fcf65d5847298b816cee8840160511070ef1fe5ae94205baf5972105d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d