Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-07-2023 06:27
Static task
static1
Behavioral task
behavioral1
Sample
c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe
Resource
win10-20230703-en
General
-
Target
c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe
-
Size
390KB
-
MD5
ab229a03cda4451d540084d029197983
-
SHA1
b84d4dae8a5747314c1fcb673d2491d8078f12d0
-
SHA256
c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f
-
SHA512
cad53ea24eb6e26ae3e88e2e18cd1680e28233670665b0b7f479f56af68556815389dd6291799c670cf27acf30f10730eff03010022a4beff2b11d1d903a475b
-
SSDEEP
12288:sMr+y90Ryuspb22nFx6E3g7eYyFf7B68:qyDSog7eYyFjl
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b034-142.dat healer behavioral1/files/0x000600000001b034-143.dat healer behavioral1/memory/3808-144-0x0000000000A10000-0x0000000000A1A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1330884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1330884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1330884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1330884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1330884.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3148 x1538022.exe 1616 g0610682.exe 1008 danke.exe 3808 h1330884.exe 3472 j7907987.exe 3196 danke.exe 764 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 1532 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1330884.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1538022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1538022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3808 h1330884.exe 3808 h1330884.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3808 h1330884.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 g0610682.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 792 wrote to memory of 3148 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 70 PID 792 wrote to memory of 3148 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 70 PID 792 wrote to memory of 3148 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 70 PID 3148 wrote to memory of 1616 3148 x1538022.exe 71 PID 3148 wrote to memory of 1616 3148 x1538022.exe 71 PID 3148 wrote to memory of 1616 3148 x1538022.exe 71 PID 1616 wrote to memory of 1008 1616 g0610682.exe 72 PID 1616 wrote to memory of 1008 1616 g0610682.exe 72 PID 1616 wrote to memory of 1008 1616 g0610682.exe 72 PID 3148 wrote to memory of 3808 3148 x1538022.exe 73 PID 3148 wrote to memory of 3808 3148 x1538022.exe 73 PID 1008 wrote to memory of 716 1008 danke.exe 74 PID 1008 wrote to memory of 716 1008 danke.exe 74 PID 1008 wrote to memory of 716 1008 danke.exe 74 PID 1008 wrote to memory of 1032 1008 danke.exe 75 PID 1008 wrote to memory of 1032 1008 danke.exe 75 PID 1008 wrote to memory of 1032 1008 danke.exe 75 PID 1032 wrote to memory of 1844 1032 cmd.exe 78 PID 1032 wrote to memory of 1844 1032 cmd.exe 78 PID 1032 wrote to memory of 1844 1032 cmd.exe 78 PID 1032 wrote to memory of 4252 1032 cmd.exe 79 PID 1032 wrote to memory of 4252 1032 cmd.exe 79 PID 1032 wrote to memory of 4252 1032 cmd.exe 79 PID 1032 wrote to memory of 1332 1032 cmd.exe 80 PID 1032 wrote to memory of 1332 1032 cmd.exe 80 PID 1032 wrote to memory of 1332 1032 cmd.exe 80 PID 1032 wrote to memory of 656 1032 cmd.exe 81 PID 1032 wrote to memory of 656 1032 cmd.exe 81 PID 1032 wrote to memory of 656 1032 cmd.exe 81 PID 1032 wrote to memory of 1328 1032 cmd.exe 82 PID 1032 wrote to memory of 1328 1032 cmd.exe 82 PID 1032 wrote to memory of 1328 1032 cmd.exe 82 PID 1032 wrote to memory of 3948 1032 cmd.exe 83 PID 1032 wrote to memory of 3948 1032 cmd.exe 83 PID 1032 wrote to memory of 3948 1032 cmd.exe 83 PID 792 wrote to memory of 3472 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 84 PID 792 wrote to memory of 3472 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 84 PID 792 wrote to memory of 3472 792 c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe 84 PID 1008 wrote to memory of 1532 1008 danke.exe 86 PID 1008 wrote to memory of 1532 1008 danke.exe 86 PID 1008 wrote to memory of 1532 1008 danke.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe"C:\Users\Admin\AppData\Local\Temp\c4f8ef6f3db590ec7238dc06b92f0767ee67cbecb2885c7f6547e3ba52df048f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1538022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1538022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0610682.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0610682.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:4252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:1332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:1328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:3948
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1330884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1330884.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j7907987.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j7907987.exe2⤵
- Executes dropped EXE
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3196
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
175KB
MD5fce3c0059d09e0576534da08509fa023
SHA19ab0bbee64f7058a924654d3cf6ed5fd1ab15044
SHA256d2377c60f7bef0d38c55bbfd1a89e4c42ef2528d2dc5e7cdd582be886550099f
SHA5126d603cec8a69b6d7682bfc37dc74610bcd37c7cb1fe60b80fc3a8d070c43df171b004f6f66d6eeb6d2dce4907b322b27cc7d430e1650be14df231b3aacca89f2
-
Filesize
175KB
MD5fce3c0059d09e0576534da08509fa023
SHA19ab0bbee64f7058a924654d3cf6ed5fd1ab15044
SHA256d2377c60f7bef0d38c55bbfd1a89e4c42ef2528d2dc5e7cdd582be886550099f
SHA5126d603cec8a69b6d7682bfc37dc74610bcd37c7cb1fe60b80fc3a8d070c43df171b004f6f66d6eeb6d2dce4907b322b27cc7d430e1650be14df231b3aacca89f2
-
Filesize
234KB
MD523d3582cfde1885f76294659e68508f8
SHA1777b8e61f412770f282c153ab7d09758cd8cc9bd
SHA256ae12f9cbec92c4f20e105cbdaede8ac4bd6814afe460e1a31add4da206f1ffd4
SHA512476d19fcf2797c9d3d8b36a366435284e333d18d3171139562a290d53a50958cd1e4e14cfd35ad45f58f2a551cb9b228ef15b275764416dd306ed27624a44340
-
Filesize
234KB
MD523d3582cfde1885f76294659e68508f8
SHA1777b8e61f412770f282c153ab7d09758cd8cc9bd
SHA256ae12f9cbec92c4f20e105cbdaede8ac4bd6814afe460e1a31add4da206f1ffd4
SHA512476d19fcf2797c9d3d8b36a366435284e333d18d3171139562a290d53a50958cd1e4e14cfd35ad45f58f2a551cb9b228ef15b275764416dd306ed27624a44340
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9