Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 14:07
Static task
static1
Behavioral task
behavioral1
Sample
7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe
Resource
win10v2004-20230703-en
General
-
Target
7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe
-
Size
555KB
-
MD5
b15da5070af8f4979a30c5aef5d4f408
-
SHA1
5577250ff0c7293860ec0b8d5e73df98bfff1e10
-
SHA256
7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084
-
SHA512
1e35cfedbf68f038333bef9f41b7e623012a6e9f8cec1600c73a3dd38f270c4284a945eb3b49e9d5d7b8ff09428d70716b6c5e3fd420cd88bc155bc71fe6f931
-
SSDEEP
12288:pMrCy90+FPP4yUKdCWUrHiSMJVV7uPFfh/cgBYCr8CfCf/pNzr:jy5oWUeSw7uPvDzhaf/T
Malware Config
Extracted
amadey
3.86
77.91.68.61/rock/index.php
Extracted
redline
micky
77.91.124.172:19071
-
auth_value
748f3c67c004f4a994500f05127b4428
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023086-168.dat healer behavioral1/files/0x0006000000023086-169.dat healer behavioral1/memory/1164-170-0x0000000000D30000-0x0000000000D3A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h7085336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7085336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7085336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7085336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7085336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7085336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 432 x2513518.exe 3852 x5443388.exe 1368 g3367494.exe 1136 pdates.exe 1164 h7085336.exe 3168 i0286520.exe 3432 pdates.exe 1832 pdates.exe 4044 pdates.exe -
Loads dropped DLL 1 IoCs
pid Process 1912 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h7085336.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2513518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5443388.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1164 h7085336.exe 1164 h7085336.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 h7085336.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 g3367494.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4340 wrote to memory of 432 4340 7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe 80 PID 4340 wrote to memory of 432 4340 7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe 80 PID 4340 wrote to memory of 432 4340 7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe 80 PID 432 wrote to memory of 3852 432 x2513518.exe 81 PID 432 wrote to memory of 3852 432 x2513518.exe 81 PID 432 wrote to memory of 3852 432 x2513518.exe 81 PID 3852 wrote to memory of 1368 3852 x5443388.exe 82 PID 3852 wrote to memory of 1368 3852 x5443388.exe 82 PID 3852 wrote to memory of 1368 3852 x5443388.exe 82 PID 1368 wrote to memory of 1136 1368 g3367494.exe 84 PID 1368 wrote to memory of 1136 1368 g3367494.exe 84 PID 1368 wrote to memory of 1136 1368 g3367494.exe 84 PID 3852 wrote to memory of 1164 3852 x5443388.exe 85 PID 3852 wrote to memory of 1164 3852 x5443388.exe 85 PID 1136 wrote to memory of 2880 1136 pdates.exe 86 PID 1136 wrote to memory of 2880 1136 pdates.exe 86 PID 1136 wrote to memory of 2880 1136 pdates.exe 86 PID 1136 wrote to memory of 784 1136 pdates.exe 88 PID 1136 wrote to memory of 784 1136 pdates.exe 88 PID 1136 wrote to memory of 784 1136 pdates.exe 88 PID 784 wrote to memory of 264 784 cmd.exe 90 PID 784 wrote to memory of 264 784 cmd.exe 90 PID 784 wrote to memory of 264 784 cmd.exe 90 PID 784 wrote to memory of 2064 784 cmd.exe 91 PID 784 wrote to memory of 2064 784 cmd.exe 91 PID 784 wrote to memory of 2064 784 cmd.exe 91 PID 784 wrote to memory of 4072 784 cmd.exe 92 PID 784 wrote to memory of 4072 784 cmd.exe 92 PID 784 wrote to memory of 4072 784 cmd.exe 92 PID 784 wrote to memory of 4748 784 cmd.exe 93 PID 784 wrote to memory of 4748 784 cmd.exe 93 PID 784 wrote to memory of 4748 784 cmd.exe 93 PID 784 wrote to memory of 3704 784 cmd.exe 94 PID 784 wrote to memory of 3704 784 cmd.exe 94 PID 784 wrote to memory of 3704 784 cmd.exe 94 PID 784 wrote to memory of 3320 784 cmd.exe 95 PID 784 wrote to memory of 3320 784 cmd.exe 95 PID 784 wrote to memory of 3320 784 cmd.exe 95 PID 432 wrote to memory of 3168 432 x2513518.exe 100 PID 432 wrote to memory of 3168 432 x2513518.exe 100 PID 432 wrote to memory of 3168 432 x2513518.exe 100 PID 1136 wrote to memory of 1912 1136 pdates.exe 107 PID 1136 wrote to memory of 1912 1136 pdates.exe 107 PID 1136 wrote to memory of 1912 1136 pdates.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe"C:\Users\Admin\AppData\Local\Temp\7f4a5c3f9726a8fffcfb0d988972607a6233d8af3d88061c1265a8156ebaf084.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2513518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2513518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5443388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5443388.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3367494.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3367494.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F6⤵
- Creates scheduled task(s)
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"7⤵PID:2064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E7⤵PID:4072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"7⤵PID:3704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E7⤵PID:3320
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7085336.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7085336.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0286520.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0286520.exe3⤵
- Executes dropped EXE
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3432
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1832
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
390KB
MD541aa7fbe9606c876400ef599593ba153
SHA1f981f4ac420d60a0efe97563cb092512310b9a9c
SHA2561835744635a796f38d7e13928a73d70752b8352b9d63073fece3efd6d3c8d7b9
SHA512c3bc19f0cf3fe3d4a6a22e2f7ebc627f5b4a020841dcf4d012a33fc78d8af75b0b8ed3caecfcce2477675c9e9e0296b8ffc69fbad36a0e21a2f7ff205ebb7a60
-
Filesize
390KB
MD541aa7fbe9606c876400ef599593ba153
SHA1f981f4ac420d60a0efe97563cb092512310b9a9c
SHA2561835744635a796f38d7e13928a73d70752b8352b9d63073fece3efd6d3c8d7b9
SHA512c3bc19f0cf3fe3d4a6a22e2f7ebc627f5b4a020841dcf4d012a33fc78d8af75b0b8ed3caecfcce2477675c9e9e0296b8ffc69fbad36a0e21a2f7ff205ebb7a60
-
Filesize
175KB
MD52ef34637c398aa16d421751ca9cd62e2
SHA1cef54d7a1b394539572bd682ecefd6102cc1c8ea
SHA256cf427741e95100060b7a929bb20dcf9e6fbad8de4a8c1fee96e5e9236858d8fd
SHA512486106a054fdd2df0571859915a524a8c3b46ef5c3d9e0d4b2bc5aad91b9196857c1641813e476d29499fd6e405e2404bae70c227b7570806324f46e78bbd2be
-
Filesize
175KB
MD52ef34637c398aa16d421751ca9cd62e2
SHA1cef54d7a1b394539572bd682ecefd6102cc1c8ea
SHA256cf427741e95100060b7a929bb20dcf9e6fbad8de4a8c1fee96e5e9236858d8fd
SHA512486106a054fdd2df0571859915a524a8c3b46ef5c3d9e0d4b2bc5aad91b9196857c1641813e476d29499fd6e405e2404bae70c227b7570806324f46e78bbd2be
-
Filesize
234KB
MD563861cf8ec57909654caccd31e9cf15d
SHA14cb6c9826ea29efde04d54937b6ff51f3507f71b
SHA256d830676ed1d3697a2cd4c0cfebbbb7782b60239c1b28f63de55dcbbfa679dcce
SHA5122c1927c7f4e7b2d87c42577f6ff861f27e2641a74d47349b15c727bbb96d8584d4cdcd6a71c5f3156d1aabffaa95cb775401dcaca9e6840b671611bca762e6d6
-
Filesize
234KB
MD563861cf8ec57909654caccd31e9cf15d
SHA14cb6c9826ea29efde04d54937b6ff51f3507f71b
SHA256d830676ed1d3697a2cd4c0cfebbbb7782b60239c1b28f63de55dcbbfa679dcce
SHA5122c1927c7f4e7b2d87c42577f6ff861f27e2641a74d47349b15c727bbb96d8584d4cdcd6a71c5f3156d1aabffaa95cb775401dcaca9e6840b671611bca762e6d6
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
223KB
MD5aea234064483f651010cf9d981f59fea
SHA1002ad73a666d2d92d0c6d6b617e61c6fa0c5f3a6
SHA25658b02c8b4bc2bf7f5f1e8e45d7c206956f188ae56b648922ca75987b999db503
SHA512eae415ef55aeb1b4548c2422a72e618fce17c2c1322918d33dc6b9202a01c743a5684ba28e5d83b6cdb2b703bc12569e6bb0e87ef2decb4e8a18592e1380a434
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
273B
MD59851b884bf4aadfade57d911a3f03332
SHA1aaadd1c1856c22844bb9fbb030cf4f586ed8866a
SHA25603afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f
SHA512a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327