Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe
-
Size
517KB
-
MD5
0e054a56a69f1e344e5ba9912fdb385b
-
SHA1
b206f9ab77fb96e2c00038c7fd7e7b98734c05d9
-
SHA256
517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1
-
SHA512
824433ccbd90465738af327380576523087de01bf90f2ddd339d56a07171c87697ce037544667cd88d35cb5efeb7c5292ba89a11695793e13e1043633ba825a2
-
SSDEEP
12288:6MrXy901lI6XxC8j+g9OixAeGN31HPTp+1m:tyGlNjAVNZPTp+1m
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000300000001e80f-153.dat healer behavioral2/files/0x000300000001e80f-152.dat healer behavioral2/memory/1540-154-0x0000000000060000-0x000000000006A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2661925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2661925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2661925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2661925.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2661925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2661925.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 5100 z5171723.exe 2496 z8892864.exe 1540 p2661925.exe 4132 r8428819.exe 4180 legola.exe 5004 s5568208.exe 908 legola.exe 2356 legola.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2661925.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5171723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8892864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1540 p2661925.exe 1540 p2661925.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1540 p2661925.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4132 r8428819.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3032 wrote to memory of 5100 3032 517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe 85 PID 3032 wrote to memory of 5100 3032 517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe 85 PID 3032 wrote to memory of 5100 3032 517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe 85 PID 5100 wrote to memory of 2496 5100 z5171723.exe 86 PID 5100 wrote to memory of 2496 5100 z5171723.exe 86 PID 5100 wrote to memory of 2496 5100 z5171723.exe 86 PID 2496 wrote to memory of 1540 2496 z8892864.exe 87 PID 2496 wrote to memory of 1540 2496 z8892864.exe 87 PID 2496 wrote to memory of 4132 2496 z8892864.exe 93 PID 2496 wrote to memory of 4132 2496 z8892864.exe 93 PID 2496 wrote to memory of 4132 2496 z8892864.exe 93 PID 4132 wrote to memory of 4180 4132 r8428819.exe 96 PID 4132 wrote to memory of 4180 4132 r8428819.exe 96 PID 4132 wrote to memory of 4180 4132 r8428819.exe 96 PID 5100 wrote to memory of 5004 5100 z5171723.exe 97 PID 5100 wrote to memory of 5004 5100 z5171723.exe 97 PID 5100 wrote to memory of 5004 5100 z5171723.exe 97 PID 4180 wrote to memory of 3108 4180 legola.exe 98 PID 4180 wrote to memory of 3108 4180 legola.exe 98 PID 4180 wrote to memory of 3108 4180 legola.exe 98 PID 4180 wrote to memory of 260 4180 legola.exe 100 PID 4180 wrote to memory of 260 4180 legola.exe 100 PID 4180 wrote to memory of 260 4180 legola.exe 100 PID 260 wrote to memory of 1048 260 cmd.exe 103 PID 260 wrote to memory of 1048 260 cmd.exe 103 PID 260 wrote to memory of 1048 260 cmd.exe 103 PID 260 wrote to memory of 4316 260 cmd.exe 104 PID 260 wrote to memory of 4316 260 cmd.exe 104 PID 260 wrote to memory of 4316 260 cmd.exe 104 PID 260 wrote to memory of 1556 260 cmd.exe 105 PID 260 wrote to memory of 1556 260 cmd.exe 105 PID 260 wrote to memory of 1556 260 cmd.exe 105 PID 260 wrote to memory of 1648 260 cmd.exe 106 PID 260 wrote to memory of 1648 260 cmd.exe 106 PID 260 wrote to memory of 1648 260 cmd.exe 106 PID 260 wrote to memory of 1828 260 cmd.exe 107 PID 260 wrote to memory of 1828 260 cmd.exe 107 PID 260 wrote to memory of 1828 260 cmd.exe 107 PID 260 wrote to memory of 2036 260 cmd.exe 108 PID 260 wrote to memory of 2036 260 cmd.exe 108 PID 260 wrote to memory of 2036 260 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\517b7a6e5ff57790304577097c24ec1d41da2d460bde72216b6afdbb7701f7f1exe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5171723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5171723.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8892864.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8892864.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2661925.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2661925.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8428819.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8428819.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F6⤵
- Creates scheduled task(s)
PID:3108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"7⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E7⤵PID:1556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:2036
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5568208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5568208.exe3⤵
- Executes dropped EXE
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:908
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:2356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD58fcd53d9207e67bde0f2b31af34a8c92
SHA1153f7cea5fef652e3d6813e79133345dbbd698f9
SHA2565e20d6233a15cb3d36359402696b133772af859d00130ca141ac9d0282a2c47a
SHA5123e96bccc0db922beac45b1e9bb79b397855a1efcd109c51209ed2d2c28b7d1d5a162d555b44464c8a500c0feb54dcf48396fffbff62ae034ecda8f544ca825a5
-
Filesize
390KB
MD58fcd53d9207e67bde0f2b31af34a8c92
SHA1153f7cea5fef652e3d6813e79133345dbbd698f9
SHA2565e20d6233a15cb3d36359402696b133772af859d00130ca141ac9d0282a2c47a
SHA5123e96bccc0db922beac45b1e9bb79b397855a1efcd109c51209ed2d2c28b7d1d5a162d555b44464c8a500c0feb54dcf48396fffbff62ae034ecda8f544ca825a5
-
Filesize
173KB
MD5958c33886443a9f4f1df92272fcbdade
SHA15e136febb3fbcac15a8e4d7493a6a6ad18a29a9f
SHA25655e0332b57ab282a64e7c6f51b32cb755be2ffda5635feea0193cff43a0f8b15
SHA5125e791d3a0e85ae43887ef2a858055f1fc07e6563cbaf96d74f5b7478d0fcc387ab6c8d0b362208d32f3c9f568a84e887ab0ee18d5a9cca804b52f5a355bc86dc
-
Filesize
173KB
MD5958c33886443a9f4f1df92272fcbdade
SHA15e136febb3fbcac15a8e4d7493a6a6ad18a29a9f
SHA25655e0332b57ab282a64e7c6f51b32cb755be2ffda5635feea0193cff43a0f8b15
SHA5125e791d3a0e85ae43887ef2a858055f1fc07e6563cbaf96d74f5b7478d0fcc387ab6c8d0b362208d32f3c9f568a84e887ab0ee18d5a9cca804b52f5a355bc86dc
-
Filesize
234KB
MD5563a9d2e148eba4101556b4a5ebd1542
SHA11d952b5f61a12b3eaed84749825d5ced0111e920
SHA256ae911395ea055d5ae792e1e766dd250557d7a1c999bc86c005a88fb1db7fed17
SHA512e135c4cee4ed72a06fe927c543c8d8a21900e4af37e1badf9c3ead249ea7c175c4155fa3eeda949f9a9f0b9910c18a31a9e20004f3b0e1ce04da5ed3de3630de
-
Filesize
234KB
MD5563a9d2e148eba4101556b4a5ebd1542
SHA11d952b5f61a12b3eaed84749825d5ced0111e920
SHA256ae911395ea055d5ae792e1e766dd250557d7a1c999bc86c005a88fb1db7fed17
SHA512e135c4cee4ed72a06fe927c543c8d8a21900e4af37e1badf9c3ead249ea7c175c4155fa3eeda949f9a9f0b9910c18a31a9e20004f3b0e1ce04da5ed3de3630de
-
Filesize
11KB
MD502c0ae56a15162a2fa0ee242725fe263
SHA1b9fcf099bed67968c1145ef628c25356f0a5fe52
SHA256affc086af4a088e14a737f32778f33ae1a740299f68398f18cab65047cccadd4
SHA51230b76eded29aab21f4013f25972cf0dde65f21af081f13c90ec85b00140568112dd27c2da6f412cf61247156a0c2c3579b5fe96aa33d0c3c79e7a36fee7ca37f
-
Filesize
11KB
MD502c0ae56a15162a2fa0ee242725fe263
SHA1b9fcf099bed67968c1145ef628c25356f0a5fe52
SHA256affc086af4a088e14a737f32778f33ae1a740299f68398f18cab65047cccadd4
SHA51230b76eded29aab21f4013f25972cf0dde65f21af081f13c90ec85b00140568112dd27c2da6f412cf61247156a0c2c3579b5fe96aa33d0c3c79e7a36fee7ca37f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f
-
Filesize
225KB
MD56e2a0ade7e82210be17d0814bfce42e0
SHA10b081926fe98b66ce51081eab4218bef1a7d25e1
SHA256c5abfe451d8eb1622dd0ad7e2028509593a6f6196c6f4a083466be2fc72c7c16
SHA5123f0fe3665a3cb6e0997cb180398c19be340362352ea3b4ba5ed958d4ccbf15d0b9094cf3c531dfece9db81142f9616ad48b3ab759c69cb08dc5b890244e0c90f