Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2023 06:33
Static task
static1
Behavioral task
behavioral1
Sample
1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe
Resource
win7-20230703-en
General
-
Target
1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe
-
Size
523KB
-
MD5
93e3699c18f86285f3cff997b54dadad
-
SHA1
bcb494b50cb22849454d13ab9a16748eb285e604
-
SHA256
1142f1553936d7c42ee68c68f6149a7804184a8e637ed635ea4ebc00a81543f9
-
SHA512
422aa5c2cdefe4dd64c1790a5c8d1dc3472c997debfd4a2514e4435d8de6ed8c984b9f225500827880cb3ca4e11cfe2ef90a9e8235c450649efcd61dcf033ab8
-
SSDEEP
12288:Avy5QTfveaRdnQg3Kt3xErt7Lqz+uLINdbsdh4/pG:l5QLve82g3w3w8od4dwo
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4644-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4364187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4364187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4364187.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4364187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4364187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4364187.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation n8365423.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 7 IoCs
pid Process 212 y9602406.exe 4644 k4364187.exe 2668 l7385885.exe 4236 n8365423.exe 5048 danke.exe 4024 danke.exe 4060 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2148 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4364187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4364187.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9602406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9602406.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4644 k4364187.exe 4644 k4364187.exe 2668 l7385885.exe 2668 l7385885.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4644 k4364187.exe Token: SeDebugPrivilege 2668 l7385885.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4236 n8365423.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3956 wrote to memory of 212 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 80 PID 3956 wrote to memory of 212 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 80 PID 3956 wrote to memory of 212 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 80 PID 212 wrote to memory of 4644 212 y9602406.exe 81 PID 212 wrote to memory of 4644 212 y9602406.exe 81 PID 212 wrote to memory of 4644 212 y9602406.exe 81 PID 212 wrote to memory of 2668 212 y9602406.exe 83 PID 212 wrote to memory of 2668 212 y9602406.exe 83 PID 212 wrote to memory of 2668 212 y9602406.exe 83 PID 3956 wrote to memory of 4236 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 86 PID 3956 wrote to memory of 4236 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 86 PID 3956 wrote to memory of 4236 3956 1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe 86 PID 4236 wrote to memory of 5048 4236 n8365423.exe 87 PID 4236 wrote to memory of 5048 4236 n8365423.exe 87 PID 4236 wrote to memory of 5048 4236 n8365423.exe 87 PID 5048 wrote to memory of 500 5048 danke.exe 88 PID 5048 wrote to memory of 500 5048 danke.exe 88 PID 5048 wrote to memory of 500 5048 danke.exe 88 PID 5048 wrote to memory of 4848 5048 danke.exe 90 PID 5048 wrote to memory of 4848 5048 danke.exe 90 PID 5048 wrote to memory of 4848 5048 danke.exe 90 PID 4848 wrote to memory of 2004 4848 cmd.exe 92 PID 4848 wrote to memory of 2004 4848 cmd.exe 92 PID 4848 wrote to memory of 2004 4848 cmd.exe 92 PID 4848 wrote to memory of 2460 4848 cmd.exe 93 PID 4848 wrote to memory of 2460 4848 cmd.exe 93 PID 4848 wrote to memory of 2460 4848 cmd.exe 93 PID 4848 wrote to memory of 3980 4848 cmd.exe 94 PID 4848 wrote to memory of 3980 4848 cmd.exe 94 PID 4848 wrote to memory of 3980 4848 cmd.exe 94 PID 4848 wrote to memory of 1808 4848 cmd.exe 95 PID 4848 wrote to memory of 1808 4848 cmd.exe 95 PID 4848 wrote to memory of 1808 4848 cmd.exe 95 PID 4848 wrote to memory of 548 4848 cmd.exe 96 PID 4848 wrote to memory of 548 4848 cmd.exe 96 PID 4848 wrote to memory of 548 4848 cmd.exe 96 PID 4848 wrote to memory of 4908 4848 cmd.exe 97 PID 4848 wrote to memory of 4908 4848 cmd.exe 97 PID 4848 wrote to memory of 4908 4848 cmd.exe 97 PID 5048 wrote to memory of 2148 5048 danke.exe 99 PID 5048 wrote to memory of 2148 5048 danke.exe 99 PID 5048 wrote to memory of 2148 5048 danke.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe"C:\Users\Admin\AppData\Local\Temp\1142f1553936d7c42ee68c68f6149a7804184a8e637ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9602406.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9602406.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4364187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4364187.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7385885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7385885.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8365423.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8365423.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F4⤵
- Creates scheduled task(s)
PID:500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"5⤵PID:2460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E5⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"5⤵PID:548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E5⤵PID:4908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4024
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
257KB
MD52c54d775fd0cc870767a4dcd5bfa8492
SHA1821ee2518ee428cd3246b9ef8c002245a252d7a0
SHA2568cc89b60edd989fc3bb117be6c4def1d1994dd573f89eb731f5589787e6bb056
SHA5124b3e40d188c5e09dbdcf352c5c9c767d73318cc859eed7f14772b092326cda4c72cda43e10c55f099fe3545dd1fc3d5e6158558706c3de352cd36799b6b75cd6
-
Filesize
257KB
MD52c54d775fd0cc870767a4dcd5bfa8492
SHA1821ee2518ee428cd3246b9ef8c002245a252d7a0
SHA2568cc89b60edd989fc3bb117be6c4def1d1994dd573f89eb731f5589787e6bb056
SHA5124b3e40d188c5e09dbdcf352c5c9c767d73318cc859eed7f14772b092326cda4c72cda43e10c55f099fe3545dd1fc3d5e6158558706c3de352cd36799b6b75cd6
-
Filesize
94KB
MD53c681eec4a6fad10cfe19d4c04e9f06f
SHA1021832e2779d07176af7d79f8c3ed0b09dc367e7
SHA256922883c94ba62405e4029f27157baa85d60c7e7862199545283d614d6f1f2a56
SHA5120ea4fbd0134aa74b0356b3be73cff5b7f3f4a18b83c749463040567c9ed64e29779dc17aa4c67df3c27ce83128f2fec78f4e24cdc65ef9847c19264cbac58298
-
Filesize
94KB
MD53c681eec4a6fad10cfe19d4c04e9f06f
SHA1021832e2779d07176af7d79f8c3ed0b09dc367e7
SHA256922883c94ba62405e4029f27157baa85d60c7e7862199545283d614d6f1f2a56
SHA5120ea4fbd0134aa74b0356b3be73cff5b7f3f4a18b83c749463040567c9ed64e29779dc17aa4c67df3c27ce83128f2fec78f4e24cdc65ef9847c19264cbac58298
-
Filesize
255KB
MD5b47ef110ba66ac79d91c078989db0511
SHA194adc4c158c26a3d9e85baee7668970f7650a70b
SHA256b030d418f40b0adb13218d5bb2879c9b7ed372dd9c55042a138196d5dba04736
SHA512ba94087138a6a38b35b5487a0fb0527230e7a7a2f0ecae41c42e0cef223bfaa49ccd40502c47ed436c57114f3a19cb30500a481cb4a79167d41b9d015c341101
-
Filesize
255KB
MD5b47ef110ba66ac79d91c078989db0511
SHA194adc4c158c26a3d9e85baee7668970f7650a70b
SHA256b030d418f40b0adb13218d5bb2879c9b7ed372dd9c55042a138196d5dba04736
SHA512ba94087138a6a38b35b5487a0fb0527230e7a7a2f0ecae41c42e0cef223bfaa49ccd40502c47ed436c57114f3a19cb30500a481cb4a79167d41b9d015c341101
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59