Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe
Resource
win10v2004-20230703-en
General
-
Target
ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe
-
Size
390KB
-
MD5
a4a5075c4735cadfcfdbc1c6c4504198
-
SHA1
e0b10b8836c2ff334faa9599db696848f53d1f46
-
SHA256
ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370
-
SHA512
9d46b82efebc6bdd977fb95ea0672522f87b45b1c6b72d30e1a24f99ddb8edba4f76f0fbd2210b51b0b15baddf91fdb7eac1a7472d26f8d6e129bff405a15d87
-
SSDEEP
6144:K3y+bnr+wp0yN90QEPu8IkWwnBN+kD8VwL9ZTxkZbTG0rZQH+AVHm:NMrEy90du8tB3kM0rZ0Zm
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231e7-159.dat healer behavioral1/files/0x00070000000231e7-158.dat healer behavioral1/memory/3624-160-0x00000000004C0000-0x00000000004CA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h9730798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h9730798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h9730798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h9730798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h9730798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h9730798.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation g1519526.exe Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 8 IoCs
pid Process 2460 x7437517.exe 1908 g1519526.exe 1856 danke.exe 3624 h9730798.exe 1780 danke.exe 2680 j0099258.exe 1740 danke.exe 408 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 4572 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h9730798.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7437517.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7437517.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4892 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3624 h9730798.exe 3624 h9730798.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3624 h9730798.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 g1519526.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2460 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 86 PID 1552 wrote to memory of 2460 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 86 PID 1552 wrote to memory of 2460 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 86 PID 2460 wrote to memory of 1908 2460 x7437517.exe 87 PID 2460 wrote to memory of 1908 2460 x7437517.exe 87 PID 2460 wrote to memory of 1908 2460 x7437517.exe 87 PID 1908 wrote to memory of 1856 1908 g1519526.exe 88 PID 1908 wrote to memory of 1856 1908 g1519526.exe 88 PID 1908 wrote to memory of 1856 1908 g1519526.exe 88 PID 2460 wrote to memory of 3624 2460 x7437517.exe 89 PID 2460 wrote to memory of 3624 2460 x7437517.exe 89 PID 1856 wrote to memory of 2212 1856 danke.exe 90 PID 1856 wrote to memory of 2212 1856 danke.exe 90 PID 1856 wrote to memory of 2212 1856 danke.exe 90 PID 1856 wrote to memory of 2752 1856 danke.exe 92 PID 1856 wrote to memory of 2752 1856 danke.exe 92 PID 1856 wrote to memory of 2752 1856 danke.exe 92 PID 2752 wrote to memory of 1896 2752 cmd.exe 94 PID 2752 wrote to memory of 1896 2752 cmd.exe 94 PID 2752 wrote to memory of 1896 2752 cmd.exe 94 PID 2752 wrote to memory of 2236 2752 cmd.exe 95 PID 2752 wrote to memory of 2236 2752 cmd.exe 95 PID 2752 wrote to memory of 2236 2752 cmd.exe 95 PID 2752 wrote to memory of 1576 2752 cmd.exe 96 PID 2752 wrote to memory of 1576 2752 cmd.exe 96 PID 2752 wrote to memory of 1576 2752 cmd.exe 96 PID 2752 wrote to memory of 2500 2752 cmd.exe 97 PID 2752 wrote to memory of 2500 2752 cmd.exe 97 PID 2752 wrote to memory of 2500 2752 cmd.exe 97 PID 2752 wrote to memory of 1536 2752 cmd.exe 98 PID 2752 wrote to memory of 1536 2752 cmd.exe 98 PID 2752 wrote to memory of 1536 2752 cmd.exe 98 PID 2752 wrote to memory of 2492 2752 cmd.exe 99 PID 2752 wrote to memory of 2492 2752 cmd.exe 99 PID 2752 wrote to memory of 2492 2752 cmd.exe 99 PID 1552 wrote to memory of 2680 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 105 PID 1552 wrote to memory of 2680 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 105 PID 1552 wrote to memory of 2680 1552 ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe 105 PID 1856 wrote to memory of 4572 1856 danke.exe 112 PID 1856 wrote to memory of 4572 1856 danke.exe 112 PID 1856 wrote to memory of 4572 1856 danke.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe"C:\Users\Admin\AppData\Local\Temp\ab3d3ccab9ecae51799c4039be2807db9dae77ebdd21a3af69c14f15d799a370.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7437517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7437517.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1519526.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1519526.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:2212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:2236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:1536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:2492
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9730798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9730798.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j0099258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j0099258.exe2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:408
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
172KB
MD55673c9b2632ac4871c762c2b0f464ce5
SHA1fcd2c5f6b8448cd2d5dcccb2bebe7ba5df7b033e
SHA256ed938c293654547fdaf84a998c311c4337258f0f2c8a8fad5ee335aad444e202
SHA512122d06807f62dab5a91a7cb77a16ea6225c7ea620a11e966dc2fb8ac92646494d46ee3d3f8ca589187f492b89ca6d6388dc98ff3a66bf6aee88356fb4e28d503
-
Filesize
172KB
MD55673c9b2632ac4871c762c2b0f464ce5
SHA1fcd2c5f6b8448cd2d5dcccb2bebe7ba5df7b033e
SHA256ed938c293654547fdaf84a998c311c4337258f0f2c8a8fad5ee335aad444e202
SHA512122d06807f62dab5a91a7cb77a16ea6225c7ea620a11e966dc2fb8ac92646494d46ee3d3f8ca589187f492b89ca6d6388dc98ff3a66bf6aee88356fb4e28d503
-
Filesize
234KB
MD526b4c57dd670868f785a12f2d2716507
SHA1df6c15343be0fba6498b4a5cc2bd8c0721ef105c
SHA2560af65d2562cf01ad644f7e5124cf2dc20856bea999549bf80e062235c379d519
SHA51207d8d4bc3cdf90f165a3f5b2f3eee9070518fbc34345026b123cbb10c3bdd57eb67fb409e4d06868bafbfde4c0fe0377621c29dc5cc60a7ab0ba972458efb7cb
-
Filesize
234KB
MD526b4c57dd670868f785a12f2d2716507
SHA1df6c15343be0fba6498b4a5cc2bd8c0721ef105c
SHA2560af65d2562cf01ad644f7e5124cf2dc20856bea999549bf80e062235c379d519
SHA51207d8d4bc3cdf90f165a3f5b2f3eee9070518fbc34345026b123cbb10c3bdd57eb67fb409e4d06868bafbfde4c0fe0377621c29dc5cc60a7ab0ba972458efb7cb
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59