Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
52f20123ad124cb3e94dc1bdb7f5c14c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
52f20123ad124cb3e94dc1bdb7f5c14c.exe
Resource
win10v2004-20230703-en
General
-
Target
52f20123ad124cb3e94dc1bdb7f5c14c.exe
-
Size
390KB
-
MD5
52f20123ad124cb3e94dc1bdb7f5c14c
-
SHA1
de5fd8fe5d7190a9d4f00ae04d7a390289ed59af
-
SHA256
dbc75d942b6483f882f5538e248c4148ffad7dbae017d1036e686fa5110eff66
-
SHA512
7a4f9f128ca145167769ed4549beb0f0d1b0c32faa935c614bf53ce329a207828a12bd31a14742db9b4d57bd86801ff44b16767720b2e90a33c31e408d9754b8
-
SSDEEP
6144:Kby+bnr+/p0yN90QEpl5h2AHkWH7ZNuEMF1gfOYun73cBhzUcsbnjpKQt4fqbk:VMrny90k9viBKwBhQXEE4fqw
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x00060000000230de-159.dat healer behavioral2/files/0x00060000000230de-158.dat healer behavioral2/memory/3816-160-0x0000000000B00000-0x0000000000B0A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3572365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3572365.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h3572365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3572365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3572365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3572365.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation g3274472.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 7 IoCs
pid Process 3792 x7791017.exe 4836 g3274472.exe 1600 danke.exe 3816 h3572365.exe 3724 j8448820.exe 2640 danke.exe 4016 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 5072 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h3572365.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52f20123ad124cb3e94dc1bdb7f5c14c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52f20123ad124cb3e94dc1bdb7f5c14c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7791017.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7791017.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3816 h3572365.exe 3816 h3572365.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3816 h3572365.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4836 g3274472.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3792 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 86 PID 2440 wrote to memory of 3792 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 86 PID 2440 wrote to memory of 3792 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 86 PID 3792 wrote to memory of 4836 3792 x7791017.exe 87 PID 3792 wrote to memory of 4836 3792 x7791017.exe 87 PID 3792 wrote to memory of 4836 3792 x7791017.exe 87 PID 4836 wrote to memory of 1600 4836 g3274472.exe 88 PID 4836 wrote to memory of 1600 4836 g3274472.exe 88 PID 4836 wrote to memory of 1600 4836 g3274472.exe 88 PID 3792 wrote to memory of 3816 3792 x7791017.exe 89 PID 3792 wrote to memory of 3816 3792 x7791017.exe 89 PID 1600 wrote to memory of 3392 1600 danke.exe 90 PID 1600 wrote to memory of 3392 1600 danke.exe 90 PID 1600 wrote to memory of 3392 1600 danke.exe 90 PID 1600 wrote to memory of 4276 1600 danke.exe 92 PID 1600 wrote to memory of 4276 1600 danke.exe 92 PID 1600 wrote to memory of 4276 1600 danke.exe 92 PID 4276 wrote to memory of 3000 4276 cmd.exe 94 PID 4276 wrote to memory of 3000 4276 cmd.exe 94 PID 4276 wrote to memory of 3000 4276 cmd.exe 94 PID 4276 wrote to memory of 5024 4276 cmd.exe 95 PID 4276 wrote to memory of 5024 4276 cmd.exe 95 PID 4276 wrote to memory of 5024 4276 cmd.exe 95 PID 4276 wrote to memory of 5060 4276 cmd.exe 96 PID 4276 wrote to memory of 5060 4276 cmd.exe 96 PID 4276 wrote to memory of 5060 4276 cmd.exe 96 PID 4276 wrote to memory of 2876 4276 cmd.exe 97 PID 4276 wrote to memory of 2876 4276 cmd.exe 97 PID 4276 wrote to memory of 2876 4276 cmd.exe 97 PID 4276 wrote to memory of 2392 4276 cmd.exe 98 PID 4276 wrote to memory of 2392 4276 cmd.exe 98 PID 4276 wrote to memory of 2392 4276 cmd.exe 98 PID 4276 wrote to memory of 1276 4276 cmd.exe 99 PID 4276 wrote to memory of 1276 4276 cmd.exe 99 PID 4276 wrote to memory of 1276 4276 cmd.exe 99 PID 2440 wrote to memory of 3724 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 104 PID 2440 wrote to memory of 3724 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 104 PID 2440 wrote to memory of 3724 2440 52f20123ad124cb3e94dc1bdb7f5c14c.exe 104 PID 1600 wrote to memory of 5072 1600 danke.exe 116 PID 1600 wrote to memory of 5072 1600 danke.exe 116 PID 1600 wrote to memory of 5072 1600 danke.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\52f20123ad124cb3e94dc1bdb7f5c14c.exe"C:\Users\Admin\AppData\Local\Temp\52f20123ad124cb3e94dc1bdb7f5c14c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7791017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7791017.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3274472.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3274472.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:3392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:5024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:2392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:1276
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:5072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3572365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3572365.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8448820.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8448820.exe2⤵
- Executes dropped EXE
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2640
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
174KB
MD52a6c89113c35e8a0a8ceccbb9830ff27
SHA1899863cd42deae3a27b3377050028e9e226e72f7
SHA256b8bf5746a0465494363f66e53122b4c399b61721425ee04604fbd0ef42aaa916
SHA512584a65fcaada7cc674b6eb391746a102992369f5bc35ea34fd9b588bbe0e8fd46924de3ce319e073e32f058dbdf43e04192f572e6cae3cc24bb35de3edca6438
-
Filesize
174KB
MD52a6c89113c35e8a0a8ceccbb9830ff27
SHA1899863cd42deae3a27b3377050028e9e226e72f7
SHA256b8bf5746a0465494363f66e53122b4c399b61721425ee04604fbd0ef42aaa916
SHA512584a65fcaada7cc674b6eb391746a102992369f5bc35ea34fd9b588bbe0e8fd46924de3ce319e073e32f058dbdf43e04192f572e6cae3cc24bb35de3edca6438
-
Filesize
234KB
MD59405e74cc64c677ea60ae63344b0b15f
SHA12edc0ce63e4532e240a26900fccfcf36860d0dc9
SHA256e1287bbbaeb9dcec26a85c7bd2db39928497ce86a9048ffe470b2c799f892da5
SHA5121a602cb2e2c97978b033e058e39cff52273bd01dece19f81d0317fe2df6ff0b53cdec13681da94c9a1e142ea9c1512f44e5d21e78d71a7cfbc294bd2ffa9bb79
-
Filesize
234KB
MD59405e74cc64c677ea60ae63344b0b15f
SHA12edc0ce63e4532e240a26900fccfcf36860d0dc9
SHA256e1287bbbaeb9dcec26a85c7bd2db39928497ce86a9048ffe470b2c799f892da5
SHA5121a602cb2e2c97978b033e058e39cff52273bd01dece19f81d0317fe2df6ff0b53cdec13681da94c9a1e142ea9c1512f44e5d21e78d71a7cfbc294bd2ffa9bb79
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9