Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe
Resource
win10v2004-20230703-en
General
-
Target
a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe
-
Size
390KB
-
MD5
4be4f4db492258a280e6e4a794442cd2
-
SHA1
d57a7b908f720e71d19ba5fbdb4e50fcf4516a90
-
SHA256
a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28
-
SHA512
cb4300d2fdea0a151d85b8e6fd4969fd7df8bef890d473322a6647645a70864e61fb11a18e3a7bafc286ca48def209f4d8fd87a7a6caad7addd227bb06d72bb6
-
SSDEEP
12288:UMruy905TLysyI6/w456hcHnl9ozJiZKrp7:iyIesc/w456WHUzJiQrp7
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023084-145.dat healer behavioral1/files/0x0007000000023084-146.dat healer behavioral1/memory/3144-147-0x00000000007B0000-0x00000000007BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8429796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8429796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8429796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8429796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8429796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8429796.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation l2731217.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 8 IoCs
pid Process 4112 y9832083.exe 3144 k8429796.exe 3676 l2731217.exe 2624 danke.exe 4004 n8496316.exe 4148 danke.exe 2736 danke.exe 4864 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k8429796.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9832083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9832083.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3144 k8429796.exe 3144 k8429796.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3144 k8429796.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3676 l2731217.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4112 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 85 PID 2108 wrote to memory of 4112 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 85 PID 2108 wrote to memory of 4112 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 85 PID 4112 wrote to memory of 3144 4112 y9832083.exe 86 PID 4112 wrote to memory of 3144 4112 y9832083.exe 86 PID 4112 wrote to memory of 3676 4112 y9832083.exe 87 PID 4112 wrote to memory of 3676 4112 y9832083.exe 87 PID 4112 wrote to memory of 3676 4112 y9832083.exe 87 PID 3676 wrote to memory of 2624 3676 l2731217.exe 88 PID 3676 wrote to memory of 2624 3676 l2731217.exe 88 PID 3676 wrote to memory of 2624 3676 l2731217.exe 88 PID 2108 wrote to memory of 4004 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 89 PID 2108 wrote to memory of 4004 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 89 PID 2108 wrote to memory of 4004 2108 a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe 89 PID 2624 wrote to memory of 5012 2624 danke.exe 90 PID 2624 wrote to memory of 5012 2624 danke.exe 90 PID 2624 wrote to memory of 5012 2624 danke.exe 90 PID 2624 wrote to memory of 1916 2624 danke.exe 92 PID 2624 wrote to memory of 1916 2624 danke.exe 92 PID 2624 wrote to memory of 1916 2624 danke.exe 92 PID 1916 wrote to memory of 4452 1916 cmd.exe 94 PID 1916 wrote to memory of 4452 1916 cmd.exe 94 PID 1916 wrote to memory of 4452 1916 cmd.exe 94 PID 1916 wrote to memory of 1416 1916 cmd.exe 95 PID 1916 wrote to memory of 1416 1916 cmd.exe 95 PID 1916 wrote to memory of 1416 1916 cmd.exe 95 PID 1916 wrote to memory of 4132 1916 cmd.exe 96 PID 1916 wrote to memory of 4132 1916 cmd.exe 96 PID 1916 wrote to memory of 4132 1916 cmd.exe 96 PID 1916 wrote to memory of 3176 1916 cmd.exe 97 PID 1916 wrote to memory of 3176 1916 cmd.exe 97 PID 1916 wrote to memory of 3176 1916 cmd.exe 97 PID 1916 wrote to memory of 2320 1916 cmd.exe 98 PID 1916 wrote to memory of 2320 1916 cmd.exe 98 PID 1916 wrote to memory of 2320 1916 cmd.exe 98 PID 1916 wrote to memory of 3972 1916 cmd.exe 99 PID 1916 wrote to memory of 3972 1916 cmd.exe 99 PID 1916 wrote to memory of 3972 1916 cmd.exe 99 PID 2624 wrote to memory of 2036 2624 danke.exe 104 PID 2624 wrote to memory of 2036 2624 danke.exe 104 PID 2624 wrote to memory of 2036 2624 danke.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe"C:\Users\Admin\AppData\Local\Temp\a4e18ca70ab0b5943f9654279e14657ea736a4aff67db47f8b10d8bf0ab87b28.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9832083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9832083.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8429796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8429796.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2731217.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2731217.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:1416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:2320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:3972
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8496316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8496316.exe2⤵
- Executes dropped EXE
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4148
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2736
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
173KB
MD514a4ea55d17640e863f13419b057b130
SHA15faca07dc51c7b7a52573de1c1025e5feebb6ae8
SHA256a3505ba97c4d1c2d084a31ecdacfa7c7ca824675885b91b555709ae64528ee22
SHA51241a7187eb10d9443f615069ba72a76dcc1d7d6a0472999bf7975fac9aecb6c99e9d0210d81ffbf9a62f06f23020d652214541472764f64b22876d03ab159fb2e
-
Filesize
173KB
MD514a4ea55d17640e863f13419b057b130
SHA15faca07dc51c7b7a52573de1c1025e5feebb6ae8
SHA256a3505ba97c4d1c2d084a31ecdacfa7c7ca824675885b91b555709ae64528ee22
SHA51241a7187eb10d9443f615069ba72a76dcc1d7d6a0472999bf7975fac9aecb6c99e9d0210d81ffbf9a62f06f23020d652214541472764f64b22876d03ab159fb2e
-
Filesize
235KB
MD5c91720e45811f214a2bba61dcd115173
SHA113e727b5ef4d9b7ca3b135be210415511191766d
SHA256ecb92497c44362f944840479f5e1ca1aa1522c2af9d87ecd73e8685006cf64ec
SHA5121c26dbd0cbbf3cf98d5090334e2841e5042faad27c274b63d11df34df6801eed6ba07b6a29ff2dd14593334ad124729aea3e957d262000f7364f2479ece17ca2
-
Filesize
235KB
MD5c91720e45811f214a2bba61dcd115173
SHA113e727b5ef4d9b7ca3b135be210415511191766d
SHA256ecb92497c44362f944840479f5e1ca1aa1522c2af9d87ecd73e8685006cf64ec
SHA5121c26dbd0cbbf3cf98d5090334e2841e5042faad27c274b63d11df34df6801eed6ba07b6a29ff2dd14593334ad124729aea3e957d262000f7364f2479ece17ca2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59