Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe
-
Size
517KB
-
MD5
8815263dda360abdf28c960c0b5cd2dd
-
SHA1
a8b8bbb7f855633ed361ce83742d4598ab41937b
-
SHA256
42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29
-
SHA512
a4182fd3c000e23a4ac5e4aa63e95f8081c747159f70f66433eb9382ae1a5b664dd1272d2a4579c816472be66a12583c8acb3745d8c26dcc1bf2b2f83958acca
-
SSDEEP
12288:wMrxy90XdfUVWkJpLqWjGKWsUdqZGj8rtcsnil7g:RyqfMWqbj90qoj8RHx
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x00070000000230d7-166.dat healer behavioral2/files/0x00070000000230d7-165.dat healer behavioral2/memory/1836-167-0x00000000007B0000-0x00000000007BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h8880111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h8880111.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h8880111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h8880111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h8880111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h8880111.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1240 x8162568.exe 4616 x1990823.exe 3972 g4906575.exe 4172 pdates.exe 1836 h8880111.exe 4756 i3017698.exe 1348 pdates.exe 940 pdates.exe -
Loads dropped DLL 1 IoCs
pid Process 3172 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h8880111.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8162568.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1990823.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1836 h8880111.exe 1836 h8880111.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1836 h8880111.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3972 g4906575.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1240 1340 42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe 80 PID 1340 wrote to memory of 1240 1340 42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe 80 PID 1340 wrote to memory of 1240 1340 42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe 80 PID 1240 wrote to memory of 4616 1240 x8162568.exe 81 PID 1240 wrote to memory of 4616 1240 x8162568.exe 81 PID 1240 wrote to memory of 4616 1240 x8162568.exe 81 PID 4616 wrote to memory of 3972 4616 x1990823.exe 82 PID 4616 wrote to memory of 3972 4616 x1990823.exe 82 PID 4616 wrote to memory of 3972 4616 x1990823.exe 82 PID 3972 wrote to memory of 4172 3972 g4906575.exe 83 PID 3972 wrote to memory of 4172 3972 g4906575.exe 83 PID 3972 wrote to memory of 4172 3972 g4906575.exe 83 PID 4616 wrote to memory of 1836 4616 x1990823.exe 84 PID 4616 wrote to memory of 1836 4616 x1990823.exe 84 PID 4172 wrote to memory of 1516 4172 pdates.exe 85 PID 4172 wrote to memory of 1516 4172 pdates.exe 85 PID 4172 wrote to memory of 1516 4172 pdates.exe 85 PID 4172 wrote to memory of 3592 4172 pdates.exe 87 PID 4172 wrote to memory of 3592 4172 pdates.exe 87 PID 4172 wrote to memory of 3592 4172 pdates.exe 87 PID 3592 wrote to memory of 5036 3592 cmd.exe 89 PID 3592 wrote to memory of 5036 3592 cmd.exe 89 PID 3592 wrote to memory of 5036 3592 cmd.exe 89 PID 3592 wrote to memory of 1852 3592 cmd.exe 90 PID 3592 wrote to memory of 1852 3592 cmd.exe 90 PID 3592 wrote to memory of 1852 3592 cmd.exe 90 PID 3592 wrote to memory of 3788 3592 cmd.exe 91 PID 3592 wrote to memory of 3788 3592 cmd.exe 91 PID 3592 wrote to memory of 3788 3592 cmd.exe 91 PID 3592 wrote to memory of 396 3592 cmd.exe 93 PID 3592 wrote to memory of 396 3592 cmd.exe 93 PID 3592 wrote to memory of 396 3592 cmd.exe 93 PID 3592 wrote to memory of 4040 3592 cmd.exe 94 PID 3592 wrote to memory of 4040 3592 cmd.exe 94 PID 3592 wrote to memory of 4040 3592 cmd.exe 94 PID 3592 wrote to memory of 3712 3592 cmd.exe 95 PID 3592 wrote to memory of 3712 3592 cmd.exe 95 PID 3592 wrote to memory of 3712 3592 cmd.exe 95 PID 1240 wrote to memory of 4756 1240 x8162568.exe 100 PID 1240 wrote to memory of 4756 1240 x8162568.exe 100 PID 1240 wrote to memory of 4756 1240 x8162568.exe 100 PID 4172 wrote to memory of 3172 4172 pdates.exe 107 PID 4172 wrote to memory of 3172 4172 pdates.exe 107 PID 4172 wrote to memory of 3172 4172 pdates.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\42867987bb68a6bbf9e59fcccfc893c3bac18ab570790bcd7429f35e967d8d29exe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8162568.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8162568.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1990823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1990823.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4906575.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4906575.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- Creates scheduled task(s)
PID:1516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵PID:1852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵PID:4040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵PID:3712
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8880111.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8880111.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i3017698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i3017698.exe3⤵
- Executes dropped EXE
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1348
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
390KB
MD51ce03a2ee07a5873006a627cbfdd28f6
SHA1c553e2a76da32395366b1f1e3b509999e65beb24
SHA2567aa03d9f98d7ca7c863c07113caac60495d76f2870ea6a3079b45e1a43e96bc4
SHA5126aaf6374aecf82afa60df84effa26a65cfa43880edda4ff1ca7a81fbb13ee984ddd3e7a2b47d738fc0165ccc9f28a45b4ff13f714d0bcb60c193d04a661a4e63
-
Filesize
390KB
MD51ce03a2ee07a5873006a627cbfdd28f6
SHA1c553e2a76da32395366b1f1e3b509999e65beb24
SHA2567aa03d9f98d7ca7c863c07113caac60495d76f2870ea6a3079b45e1a43e96bc4
SHA5126aaf6374aecf82afa60df84effa26a65cfa43880edda4ff1ca7a81fbb13ee984ddd3e7a2b47d738fc0165ccc9f28a45b4ff13f714d0bcb60c193d04a661a4e63
-
Filesize
174KB
MD52f0a5051f4149d61ebc521ee673ff3e7
SHA177857db5258fe5bb401024e748ac36cb378d17c6
SHA256a0d22494e0fd22cef0a4452dd782ce78d78bcbb0e86337b7d2da872b8ab41a66
SHA512361d1b240f0be6406d98d754369719d2f9f0799d07a159e07ead269c7972675b3e61db3a1d4d7db80388893d1c0b6ff53e6e6ba9d2ba8f5c732636bc1a2cb7d5
-
Filesize
174KB
MD52f0a5051f4149d61ebc521ee673ff3e7
SHA177857db5258fe5bb401024e748ac36cb378d17c6
SHA256a0d22494e0fd22cef0a4452dd782ce78d78bcbb0e86337b7d2da872b8ab41a66
SHA512361d1b240f0be6406d98d754369719d2f9f0799d07a159e07ead269c7972675b3e61db3a1d4d7db80388893d1c0b6ff53e6e6ba9d2ba8f5c732636bc1a2cb7d5
-
Filesize
234KB
MD5ea2468c0e7110c8b1b43db559fa904ec
SHA11fe0e15c1233b8b402a90e5d64fd9a181f50baae
SHA25663f474537afbd0e9dfc85bb90e9180981dc894365f8844f445cdb4a8b94b83f5
SHA5127322926d5ed04bfec26e48b8e3ccc65e6a4ffd4c9969515d5cfe4f5fd301423871d05bec2a6a9ccf4c26b85d11f5b806ce415f927b7c6e343ce389218564812c
-
Filesize
234KB
MD5ea2468c0e7110c8b1b43db559fa904ec
SHA11fe0e15c1233b8b402a90e5d64fd9a181f50baae
SHA25663f474537afbd0e9dfc85bb90e9180981dc894365f8844f445cdb4a8b94b83f5
SHA5127322926d5ed04bfec26e48b8e3ccc65e6a4ffd4c9969515d5cfe4f5fd301423871d05bec2a6a9ccf4c26b85d11f5b806ce415f927b7c6e343ce389218564812c
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
273B
MD59851b884bf4aadfade57d911a3f03332
SHA1aaadd1c1856c22844bb9fbb030cf4f586ed8866a
SHA25603afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f
SHA512a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327