Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2023 06:28
Static task
static1
Behavioral task
behavioral1
Sample
eada0db430820f2a292694c9c5502f5b.exe
Resource
win7-20230703-en
General
-
Target
eada0db430820f2a292694c9c5502f5b.exe
-
Size
523KB
-
MD5
eada0db430820f2a292694c9c5502f5b
-
SHA1
66516bf1fefb2626258cd2c04e3061cdcec0d37c
-
SHA256
00cd3e7052a67f133d421a895f273526c46095b8aabd043d0cd2eecaebe6ccb0
-
SHA512
e41d6fedb477edd1e028e003e318cad0cdc1670a59d3b3d4c325ef04abdb90b5af8c6f14d96457b7bea7425600c6a0b1a01a551c59ddac0bdc390e488ae5dc53
-
SSDEEP
12288:BYk/fv0aRdnQgtd6UWq6mKIG2JerhBbjswxqYcLALSyclH+ED6HM:BYkHv082gyUWNzTp/MZkLdEDz
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2452-153-0x00000000004F0000-0x00000000004FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6049081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6049081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6049081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6049081.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6049081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6049081.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation n4720846.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 6 IoCs
pid Process 3304 y8355577.exe 2452 k6049081.exe 4520 l2019388.exe 3992 n4720846.exe 2616 danke.exe 1492 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6049081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6049081.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eada0db430820f2a292694c9c5502f5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eada0db430820f2a292694c9c5502f5b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8355577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8355577.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2452 k6049081.exe 2452 k6049081.exe 4520 l2019388.exe 4520 l2019388.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2452 k6049081.exe Token: SeDebugPrivilege 4520 l2019388.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3992 n4720846.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3304 3424 eada0db430820f2a292694c9c5502f5b.exe 85 PID 3424 wrote to memory of 3304 3424 eada0db430820f2a292694c9c5502f5b.exe 85 PID 3424 wrote to memory of 3304 3424 eada0db430820f2a292694c9c5502f5b.exe 85 PID 3304 wrote to memory of 2452 3304 y8355577.exe 86 PID 3304 wrote to memory of 2452 3304 y8355577.exe 86 PID 3304 wrote to memory of 2452 3304 y8355577.exe 86 PID 3304 wrote to memory of 4520 3304 y8355577.exe 88 PID 3304 wrote to memory of 4520 3304 y8355577.exe 88 PID 3304 wrote to memory of 4520 3304 y8355577.exe 88 PID 3424 wrote to memory of 3992 3424 eada0db430820f2a292694c9c5502f5b.exe 92 PID 3424 wrote to memory of 3992 3424 eada0db430820f2a292694c9c5502f5b.exe 92 PID 3424 wrote to memory of 3992 3424 eada0db430820f2a292694c9c5502f5b.exe 92 PID 3992 wrote to memory of 2616 3992 n4720846.exe 93 PID 3992 wrote to memory of 2616 3992 n4720846.exe 93 PID 3992 wrote to memory of 2616 3992 n4720846.exe 93 PID 2616 wrote to memory of 3864 2616 danke.exe 94 PID 2616 wrote to memory of 3864 2616 danke.exe 94 PID 2616 wrote to memory of 3864 2616 danke.exe 94 PID 2616 wrote to memory of 528 2616 danke.exe 96 PID 2616 wrote to memory of 528 2616 danke.exe 96 PID 2616 wrote to memory of 528 2616 danke.exe 96 PID 528 wrote to memory of 4684 528 cmd.exe 98 PID 528 wrote to memory of 4684 528 cmd.exe 98 PID 528 wrote to memory of 4684 528 cmd.exe 98 PID 528 wrote to memory of 3452 528 cmd.exe 99 PID 528 wrote to memory of 3452 528 cmd.exe 99 PID 528 wrote to memory of 3452 528 cmd.exe 99 PID 528 wrote to memory of 2952 528 cmd.exe 100 PID 528 wrote to memory of 2952 528 cmd.exe 100 PID 528 wrote to memory of 2952 528 cmd.exe 100 PID 528 wrote to memory of 2348 528 cmd.exe 101 PID 528 wrote to memory of 2348 528 cmd.exe 101 PID 528 wrote to memory of 2348 528 cmd.exe 101 PID 528 wrote to memory of 5020 528 cmd.exe 102 PID 528 wrote to memory of 5020 528 cmd.exe 102 PID 528 wrote to memory of 5020 528 cmd.exe 102 PID 528 wrote to memory of 676 528 cmd.exe 103 PID 528 wrote to memory of 676 528 cmd.exe 103 PID 528 wrote to memory of 676 528 cmd.exe 103 PID 2616 wrote to memory of 2148 2616 danke.exe 105 PID 2616 wrote to memory of 2148 2616 danke.exe 105 PID 2616 wrote to memory of 2148 2616 danke.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\eada0db430820f2a292694c9c5502f5b.exe"C:\Users\Admin\AppData\Local\Temp\eada0db430820f2a292694c9c5502f5b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8355577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8355577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6049081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6049081.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2019388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2019388.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4720846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4720846.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F4⤵
- Creates scheduled task(s)
PID:3864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"5⤵PID:3452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E5⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2348
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"5⤵PID:5020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E5⤵PID:676
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
257KB
MD530c8557a6e7d955f59ae3d4637783f7b
SHA17c98b6032d546f2a128328619feffa9f7229d57f
SHA25641166cdddb24566f481a08aea8316774046cf1133b46f95b8f41d70878239a03
SHA5123e365cf564d109a638763efea7fe5a204a73376ddd0d1eb88e7d2086f20e701bf4367c831f9bfe4ce921bce344dd1c6a20f48d9ab60566efb417400d89769cae
-
Filesize
257KB
MD530c8557a6e7d955f59ae3d4637783f7b
SHA17c98b6032d546f2a128328619feffa9f7229d57f
SHA25641166cdddb24566f481a08aea8316774046cf1133b46f95b8f41d70878239a03
SHA5123e365cf564d109a638763efea7fe5a204a73376ddd0d1eb88e7d2086f20e701bf4367c831f9bfe4ce921bce344dd1c6a20f48d9ab60566efb417400d89769cae
-
Filesize
93KB
MD5343ba1e976c780c5dbf736e98349201c
SHA1410892ac0f98bb1dae3643e0f8d00ae8dd2e1ed5
SHA256069c07a0880d7053d565f636e2dd294c77cb450c1ef8f3563e8d0c042e2eacc9
SHA51232481e55ee09871852eb76091e45222b2df6a44c65d679597467653d1cd2b35cff9635ffa968b8d726fca0e8eddf3494495c29883a9fe6a5e3f02619f694dcc7
-
Filesize
93KB
MD5343ba1e976c780c5dbf736e98349201c
SHA1410892ac0f98bb1dae3643e0f8d00ae8dd2e1ed5
SHA256069c07a0880d7053d565f636e2dd294c77cb450c1ef8f3563e8d0c042e2eacc9
SHA51232481e55ee09871852eb76091e45222b2df6a44c65d679597467653d1cd2b35cff9635ffa968b8d726fca0e8eddf3494495c29883a9fe6a5e3f02619f694dcc7
-
Filesize
255KB
MD5a30f971c5193463a5cafab8bc4958a97
SHA12d36f1c6c2645133be47a4a4fea4410961f8cdb0
SHA2567990bd0b6f95e366de4dcd64898605a081b919092d7fd8077cfb036ee156c430
SHA512865f2e162e349d5ea59b1843ae37006f0d65f51e5f0bf5539174a3896011621ac3bbe500a3bee464c3d4622e7f0f7b9ab28dbc970ab78cb0a62904511f572373
-
Filesize
255KB
MD5a30f971c5193463a5cafab8bc4958a97
SHA12d36f1c6c2645133be47a4a4fea4410961f8cdb0
SHA2567990bd0b6f95e366de4dcd64898605a081b919092d7fd8077cfb036ee156c430
SHA512865f2e162e349d5ea59b1843ae37006f0d65f51e5f0bf5539174a3896011621ac3bbe500a3bee464c3d4622e7f0f7b9ab28dbc970ab78cb0a62904511f572373
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59