Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe
Resource
win10v2004-20230703-en
General
-
Target
b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe
-
Size
390KB
-
MD5
465077170ae215b186f86e27ff4aa38b
-
SHA1
e94b6ceb55ddb21cf342ffdf97be7729fa35af66
-
SHA256
b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d
-
SHA512
cce89fd6197fccc8b7bc6184229a1e13ad60db2e3d917a90031a5a9d9a9132bb8a7a8d81d3cde1ea796b37950927d3d72f0ff31515405b24869af3afc43e2a61
-
SSDEEP
6144:KJy+bnr+Ap0yN90QEWirPPEnkWcnZNbQR5ryTeX4V+rJ3HUkpCWPO5YF:zMrUy900MPMG3u30kPOa
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002326d-159.dat healer behavioral1/files/0x000700000002326d-158.dat healer behavioral1/memory/4780-160-0x0000000000940000-0x000000000094A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h9885901.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h9885901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h9885901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h9885901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h9885901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h9885901.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation g0752133.exe Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 8 IoCs
pid Process 4152 x1486798.exe 532 g0752133.exe 212 danke.exe 4780 h9885901.exe 3876 j8004152.exe 4896 danke.exe 3316 danke.exe 3856 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 4128 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h9885901.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1486798.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1486798.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4708 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 h9885901.exe 4780 h9885901.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4780 h9885901.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 532 g0752133.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4152 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 85 PID 4232 wrote to memory of 4152 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 85 PID 4232 wrote to memory of 4152 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 85 PID 4152 wrote to memory of 532 4152 x1486798.exe 87 PID 4152 wrote to memory of 532 4152 x1486798.exe 87 PID 4152 wrote to memory of 532 4152 x1486798.exe 87 PID 532 wrote to memory of 212 532 g0752133.exe 88 PID 532 wrote to memory of 212 532 g0752133.exe 88 PID 532 wrote to memory of 212 532 g0752133.exe 88 PID 4152 wrote to memory of 4780 4152 x1486798.exe 89 PID 4152 wrote to memory of 4780 4152 x1486798.exe 89 PID 212 wrote to memory of 480 212 danke.exe 90 PID 212 wrote to memory of 480 212 danke.exe 90 PID 212 wrote to memory of 480 212 danke.exe 90 PID 212 wrote to memory of 640 212 danke.exe 92 PID 212 wrote to memory of 640 212 danke.exe 92 PID 212 wrote to memory of 640 212 danke.exe 92 PID 640 wrote to memory of 4368 640 cmd.exe 94 PID 640 wrote to memory of 4368 640 cmd.exe 94 PID 640 wrote to memory of 4368 640 cmd.exe 94 PID 640 wrote to memory of 3280 640 cmd.exe 95 PID 640 wrote to memory of 3280 640 cmd.exe 95 PID 640 wrote to memory of 3280 640 cmd.exe 95 PID 640 wrote to memory of 4060 640 cmd.exe 96 PID 640 wrote to memory of 4060 640 cmd.exe 96 PID 640 wrote to memory of 4060 640 cmd.exe 96 PID 640 wrote to memory of 4760 640 cmd.exe 98 PID 640 wrote to memory of 4760 640 cmd.exe 98 PID 640 wrote to memory of 4760 640 cmd.exe 98 PID 640 wrote to memory of 3508 640 cmd.exe 99 PID 640 wrote to memory of 3508 640 cmd.exe 99 PID 640 wrote to memory of 3508 640 cmd.exe 99 PID 640 wrote to memory of 4156 640 cmd.exe 100 PID 640 wrote to memory of 4156 640 cmd.exe 100 PID 640 wrote to memory of 4156 640 cmd.exe 100 PID 4232 wrote to memory of 3876 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 106 PID 4232 wrote to memory of 3876 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 106 PID 4232 wrote to memory of 3876 4232 b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe 106 PID 212 wrote to memory of 4128 212 danke.exe 114 PID 212 wrote to memory of 4128 212 danke.exe 114 PID 212 wrote to memory of 4128 212 danke.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe"C:\Users\Admin\AppData\Local\Temp\b02d0881e381126b0a8a5cb88a1ced7e646cb915bc582919c9c3bf5e7615de4d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1486798.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1486798.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0752133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0752133.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:3280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:4060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:3508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:4156
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9885901.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9885901.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8004152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8004152.exe2⤵
- Executes dropped EXE
PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4896
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3316
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4708
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
173KB
MD55abc547c088f817ae6f4efea5b17cf8f
SHA127a2d70094d25fca5c04b09a462cac0e583ccde3
SHA256dc199c9258561f80df59b47ce892d8c087e88f19c55155e45e4062a72e562e48
SHA5125c06bee4acf75a8a54ef69d7084f152e56da6312b186c547ae06fc3fecd7db3cf9cf5f443b71b035725d1e92bf7522df19772867d6a2ad162716060aba74fb41
-
Filesize
173KB
MD55abc547c088f817ae6f4efea5b17cf8f
SHA127a2d70094d25fca5c04b09a462cac0e583ccde3
SHA256dc199c9258561f80df59b47ce892d8c087e88f19c55155e45e4062a72e562e48
SHA5125c06bee4acf75a8a54ef69d7084f152e56da6312b186c547ae06fc3fecd7db3cf9cf5f443b71b035725d1e92bf7522df19772867d6a2ad162716060aba74fb41
-
Filesize
234KB
MD5263896e68461ac3f18e41a9d490185db
SHA14ea04ec483d6721d448c7ee2c36600514f196831
SHA25667c77acace4c5aca9c710c163f70b41a3e850b9150f86e6784cd500de72dfe3d
SHA512bfc27e9de0e54e61e6159d1f2d24d8b7a85ab3f079ef94b042d42cd7e2706e38e903d3cbc4d6fa48580a782996dd6047faa940b3374edd573aed753b96127f5c
-
Filesize
234KB
MD5263896e68461ac3f18e41a9d490185db
SHA14ea04ec483d6721d448c7ee2c36600514f196831
SHA25667c77acace4c5aca9c710c163f70b41a3e850b9150f86e6784cd500de72dfe3d
SHA512bfc27e9de0e54e61e6159d1f2d24d8b7a85ab3f079ef94b042d42cd7e2706e38e903d3cbc4d6fa48580a782996dd6047faa940b3374edd573aed753b96127f5c
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59