Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2023 08:18
Static task
static1
Behavioral task
behavioral1
Sample
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe
Resource
win10v2004-20230703-en
General
-
Target
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe
-
Size
560KB
-
MD5
e46bab53bb4baffa59c8bbc9ab486127
-
SHA1
b48aa691eb711a79731e352a8814b32ddbe60d0b
-
SHA256
09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf
-
SHA512
e73a081945efc2c8e6acb07d02a2d2530cef2ed41d64d294385a60b9f7799f56c9f0fa2a3cd41f21b2274d608a97893f34aeb131e84f9250b3b8ce4f0f94a58c
-
SSDEEP
12288:rMrIy906bd94DDVhVC5Z1wpJ0mmycaWi/fh4FKcfT:/yhd94ZyoJ0mmyXWIfh4JT
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00060000000224dc-153.dat healer behavioral1/files/0x00060000000224dc-152.dat healer behavioral1/memory/1660-154-0x00000000000D0000-0x00000000000DA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8246682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8246682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8246682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8246682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8246682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8246682.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1452 z0307890.exe 3684 z3096992.exe 1660 p8246682.exe 3840 r2887900.exe 4444 legosa.exe 848 s3250767.exe 3828 legosa.exe 4872 legosa.exe -
Loads dropped DLL 1 IoCs
pid Process 4232 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8246682.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0307890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3096992.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1660 p8246682.exe 1660 p8246682.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1660 p8246682.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3844 wrote to memory of 1452 3844 09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe 85 PID 3844 wrote to memory of 1452 3844 09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe 85 PID 3844 wrote to memory of 1452 3844 09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe 85 PID 1452 wrote to memory of 3684 1452 z0307890.exe 86 PID 1452 wrote to memory of 3684 1452 z0307890.exe 86 PID 1452 wrote to memory of 3684 1452 z0307890.exe 86 PID 3684 wrote to memory of 1660 3684 z3096992.exe 87 PID 3684 wrote to memory of 1660 3684 z3096992.exe 87 PID 3684 wrote to memory of 3840 3684 z3096992.exe 93 PID 3684 wrote to memory of 3840 3684 z3096992.exe 93 PID 3684 wrote to memory of 3840 3684 z3096992.exe 93 PID 3840 wrote to memory of 4444 3840 r2887900.exe 94 PID 3840 wrote to memory of 4444 3840 r2887900.exe 94 PID 3840 wrote to memory of 4444 3840 r2887900.exe 94 PID 1452 wrote to memory of 848 1452 z0307890.exe 96 PID 1452 wrote to memory of 848 1452 z0307890.exe 96 PID 1452 wrote to memory of 848 1452 z0307890.exe 96 PID 4444 wrote to memory of 3972 4444 legosa.exe 98 PID 4444 wrote to memory of 3972 4444 legosa.exe 98 PID 4444 wrote to memory of 3972 4444 legosa.exe 98 PID 4444 wrote to memory of 380 4444 legosa.exe 100 PID 4444 wrote to memory of 380 4444 legosa.exe 100 PID 4444 wrote to memory of 380 4444 legosa.exe 100 PID 380 wrote to memory of 5012 380 cmd.exe 102 PID 380 wrote to memory of 5012 380 cmd.exe 102 PID 380 wrote to memory of 5012 380 cmd.exe 102 PID 380 wrote to memory of 3912 380 cmd.exe 103 PID 380 wrote to memory of 3912 380 cmd.exe 103 PID 380 wrote to memory of 3912 380 cmd.exe 103 PID 380 wrote to memory of 900 380 cmd.exe 104 PID 380 wrote to memory of 900 380 cmd.exe 104 PID 380 wrote to memory of 900 380 cmd.exe 104 PID 380 wrote to memory of 1284 380 cmd.exe 105 PID 380 wrote to memory of 1284 380 cmd.exe 105 PID 380 wrote to memory of 1284 380 cmd.exe 105 PID 380 wrote to memory of 4632 380 cmd.exe 106 PID 380 wrote to memory of 4632 380 cmd.exe 106 PID 380 wrote to memory of 4632 380 cmd.exe 106 PID 380 wrote to memory of 3208 380 cmd.exe 107 PID 380 wrote to memory of 3208 380 cmd.exe 107 PID 380 wrote to memory of 3208 380 cmd.exe 107 PID 4444 wrote to memory of 4232 4444 legosa.exe 117 PID 4444 wrote to memory of 4232 4444 legosa.exe 117 PID 4444 wrote to memory of 4232 4444 legosa.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe"C:\Users\Admin\AppData\Local\Temp\09c338bb9d7f0124cc16492ab5d0afe63f1501a32bb738b5cd86fc6ec69879bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0307890.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0307890.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3096992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3096992.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8246682.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8246682.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2887900.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2887900.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F6⤵
- Creates scheduled task(s)
PID:3972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"7⤵PID:3912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E7⤵PID:900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:4632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:3208
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3250767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3250767.exe3⤵
- Executes dropped EXE
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:3828
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:4872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD513c4d93fec372cb7f8f27bae336c7a9f
SHA140772fe81304ced5d0cea566046044a0ad6393cf
SHA2565821f1ad16dd2f4f28133cd656f1c08d76df26125b75ef7e8eff6e6ded1248fe
SHA512923b5eb27494fec409159bf651811ece7b615917dcca33a80ab5779b67a20e1ce44fd02f937ff7fa7abb99a186bb3547769f9528b8fc80db6c47a2fd0c572d2d
-
Filesize
432KB
MD513c4d93fec372cb7f8f27bae336c7a9f
SHA140772fe81304ced5d0cea566046044a0ad6393cf
SHA2565821f1ad16dd2f4f28133cd656f1c08d76df26125b75ef7e8eff6e6ded1248fe
SHA512923b5eb27494fec409159bf651811ece7b615917dcca33a80ab5779b67a20e1ce44fd02f937ff7fa7abb99a186bb3547769f9528b8fc80db6c47a2fd0c572d2d
-
Filesize
177KB
MD5d27c6c61ac3b600986bd561bcd7c3f32
SHA1349c4b5509a12760303dba7e3ad069469075a343
SHA2565469520b15890c17f84a5c66ea8602a5595a4b6150d49b7c08618fd914455771
SHA512210e34ebafc9d3bea69066b79ce76afebde1a727cc927e31200bd54f1c80102af392b1c7d5d2cd2abd1e2f3478e115361315910b418a5be3c257a9c666177634
-
Filesize
177KB
MD5d27c6c61ac3b600986bd561bcd7c3f32
SHA1349c4b5509a12760303dba7e3ad069469075a343
SHA2565469520b15890c17f84a5c66ea8602a5595a4b6150d49b7c08618fd914455771
SHA512210e34ebafc9d3bea69066b79ce76afebde1a727cc927e31200bd54f1c80102af392b1c7d5d2cd2abd1e2f3478e115361315910b418a5be3c257a9c666177634
-
Filesize
277KB
MD5ad3da7402fc3d32448707ceea7ff7625
SHA14bb6bba96904b5ad45bcfb743ad8f667520994ba
SHA2565d2bdef0be7d9fed833475b3d8dc720eab33e5a75d42bb668c62157726f3a498
SHA512cbbb1baac53ef89da9f4784fd424d79ed73f35d5f3d73d334707df14bde6c08fc4e67234fa81f3eca7cf9bbe91d1fc974289f9ee13b6783e75d3d10bac3a8e0c
-
Filesize
277KB
MD5ad3da7402fc3d32448707ceea7ff7625
SHA14bb6bba96904b5ad45bcfb743ad8f667520994ba
SHA2565d2bdef0be7d9fed833475b3d8dc720eab33e5a75d42bb668c62157726f3a498
SHA512cbbb1baac53ef89da9f4784fd424d79ed73f35d5f3d73d334707df14bde6c08fc4e67234fa81f3eca7cf9bbe91d1fc974289f9ee13b6783e75d3d10bac3a8e0c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5