Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2023, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe
Resource
win10-20230703-en
General
-
Target
9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe
-
Size
390KB
-
MD5
f998d308d4b90846504a6a1565c0e32f
-
SHA1
b183e6b65add3f2eebbf4e5d4ef94f71a3c46dae
-
SHA256
9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d
-
SHA512
a0ad29dabe2b743815719fe20a8728e3d34046ef19ed081384c429d9a87f624ce1d50ed1b42d5fd5ef0c5ffd599ac65c93ca08102495c1f8c1c02c7f18b330db
-
SSDEEP
12288:3MrIy904nFXa7pP//vK1YcHnl9aiAoSd:nyjK9P//KH4nd
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afa6-130.dat healer behavioral1/files/0x000700000001afa6-131.dat healer behavioral1/memory/2520-132-0x0000000000C20000-0x0000000000C2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2150465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2150465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2150465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2150465.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2150465.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 984 y8432371.exe 2520 k2150465.exe 3948 l4807903.exe 4172 danke.exe 4872 n4015920.exe 4476 danke.exe 5100 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k2150465.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8432371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8432371.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 k2150465.exe 2520 k2150465.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 k2150465.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3752 wrote to memory of 984 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 70 PID 3752 wrote to memory of 984 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 70 PID 3752 wrote to memory of 984 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 70 PID 984 wrote to memory of 2520 984 y8432371.exe 71 PID 984 wrote to memory of 2520 984 y8432371.exe 71 PID 984 wrote to memory of 3948 984 y8432371.exe 72 PID 984 wrote to memory of 3948 984 y8432371.exe 72 PID 984 wrote to memory of 3948 984 y8432371.exe 72 PID 3948 wrote to memory of 4172 3948 l4807903.exe 73 PID 3948 wrote to memory of 4172 3948 l4807903.exe 73 PID 3948 wrote to memory of 4172 3948 l4807903.exe 73 PID 3752 wrote to memory of 4872 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 74 PID 3752 wrote to memory of 4872 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 74 PID 3752 wrote to memory of 4872 3752 9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe 74 PID 4172 wrote to memory of 2908 4172 danke.exe 75 PID 4172 wrote to memory of 2908 4172 danke.exe 75 PID 4172 wrote to memory of 2908 4172 danke.exe 75 PID 4172 wrote to memory of 4144 4172 danke.exe 76 PID 4172 wrote to memory of 4144 4172 danke.exe 76 PID 4172 wrote to memory of 4144 4172 danke.exe 76 PID 4144 wrote to memory of 2448 4144 cmd.exe 79 PID 4144 wrote to memory of 2448 4144 cmd.exe 79 PID 4144 wrote to memory of 2448 4144 cmd.exe 79 PID 4144 wrote to memory of 4200 4144 cmd.exe 80 PID 4144 wrote to memory of 4200 4144 cmd.exe 80 PID 4144 wrote to memory of 4200 4144 cmd.exe 80 PID 4144 wrote to memory of 1048 4144 cmd.exe 81 PID 4144 wrote to memory of 1048 4144 cmd.exe 81 PID 4144 wrote to memory of 1048 4144 cmd.exe 81 PID 4144 wrote to memory of 2496 4144 cmd.exe 82 PID 4144 wrote to memory of 2496 4144 cmd.exe 82 PID 4144 wrote to memory of 2496 4144 cmd.exe 82 PID 4144 wrote to memory of 2484 4144 cmd.exe 83 PID 4144 wrote to memory of 2484 4144 cmd.exe 83 PID 4144 wrote to memory of 2484 4144 cmd.exe 83 PID 4144 wrote to memory of 4456 4144 cmd.exe 84 PID 4144 wrote to memory of 4456 4144 cmd.exe 84 PID 4144 wrote to memory of 4456 4144 cmd.exe 84 PID 4172 wrote to memory of 2248 4172 danke.exe 86 PID 4172 wrote to memory of 2248 4172 danke.exe 86 PID 4172 wrote to memory of 2248 4172 danke.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe"C:\Users\Admin\AppData\Local\Temp\9663b9a7eae60ab64b860017be601493b59ffdedbb094efce4e777c82dd7e62d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8432371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8432371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2150465.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2150465.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4807903.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4807903.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:4200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:2484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:4456
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2248
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4015920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4015920.exe2⤵
- Executes dropped EXE
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4476
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:5100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
173KB
MD51bcfd3315835b529370b6708613ff5f6
SHA11a891919fc347005f4c64af6e6278c2fd9d376f1
SHA256919d343c08ece667b7a8d429cbdbf33b891e75dacb715c87a8baf7998b019124
SHA512ffb0afc1fa324cbd3e0f0c15bd77d3fe028866b29984364cdd817b7175c142b931ef67e9cecee05c31c1db15b75f8a65bf565da317ec58ad28fc5b080a2f9dcd
-
Filesize
173KB
MD51bcfd3315835b529370b6708613ff5f6
SHA11a891919fc347005f4c64af6e6278c2fd9d376f1
SHA256919d343c08ece667b7a8d429cbdbf33b891e75dacb715c87a8baf7998b019124
SHA512ffb0afc1fa324cbd3e0f0c15bd77d3fe028866b29984364cdd817b7175c142b931ef67e9cecee05c31c1db15b75f8a65bf565da317ec58ad28fc5b080a2f9dcd
-
Filesize
235KB
MD53808fc6779d20267ccbc9c6cadd6df04
SHA1f9c50ea263c9f96d6938687c111cedf90c773d8c
SHA2562cac9156cd55022a203820374408bb1122426ca9518d3466c3d2e01080b004e8
SHA512d3716cf9bad20d1d88751981ffdc9724f7a5447cbfc6fcd9c1c3bcfe1c27e621b9430cd477193ddce619006d1f15efa40de34c0d80a5a4da94484f4c05d1d9f0
-
Filesize
235KB
MD53808fc6779d20267ccbc9c6cadd6df04
SHA1f9c50ea263c9f96d6938687c111cedf90c773d8c
SHA2562cac9156cd55022a203820374408bb1122426ca9518d3466c3d2e01080b004e8
SHA512d3716cf9bad20d1d88751981ffdc9724f7a5447cbfc6fcd9c1c3bcfe1c27e621b9430cd477193ddce619006d1f15efa40de34c0d80a5a4da94484f4c05d1d9f0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9