Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2023, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
-
Size
560KB
-
MD5
5090da2bd37fd95420f9af41e019c563
-
SHA1
6aa40d70dc932448801a97141f0381b102c32ce6
-
SHA256
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100
-
SHA512
f3b1d83031fe525cbcb3a2f571f6a544f56716cd3c9e1bb578680cf0e837e9cdb762326eb89e5ef2317627c02035f984cf0fe5f6fb06fe3a1d32e813f865a04f
-
SSDEEP
12288:gMrEy90DAH0cguNlYg5i3fAHZk2SZtIyhPNiv3i0DZQ:UyC3gYg5i3oHZktIypNGyJ
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023087-152.dat healer behavioral2/files/0x0007000000023087-153.dat healer behavioral2/memory/2160-154-0x0000000000500000-0x000000000050A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8717253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8717253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8717253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8717253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8717253.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8717253.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3032 z6175577.exe 3372 z3009205.exe 2160 p8717253.exe 4188 r4895242.exe 2268 legosa.exe 3464 s1366816.exe 2356 legosa.exe 4692 legosa.exe -
Loads dropped DLL 1 IoCs
pid Process 4236 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8717253.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6175577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3009205.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 p8717253.exe 2160 p8717253.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 p8717253.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3032 2916 8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe 81 PID 2916 wrote to memory of 3032 2916 8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe 81 PID 2916 wrote to memory of 3032 2916 8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe 81 PID 3032 wrote to memory of 3372 3032 z6175577.exe 82 PID 3032 wrote to memory of 3372 3032 z6175577.exe 82 PID 3032 wrote to memory of 3372 3032 z6175577.exe 82 PID 3372 wrote to memory of 2160 3372 z3009205.exe 83 PID 3372 wrote to memory of 2160 3372 z3009205.exe 83 PID 3372 wrote to memory of 4188 3372 z3009205.exe 90 PID 3372 wrote to memory of 4188 3372 z3009205.exe 90 PID 3372 wrote to memory of 4188 3372 z3009205.exe 90 PID 4188 wrote to memory of 2268 4188 r4895242.exe 93 PID 4188 wrote to memory of 2268 4188 r4895242.exe 93 PID 4188 wrote to memory of 2268 4188 r4895242.exe 93 PID 3032 wrote to memory of 3464 3032 z6175577.exe 94 PID 3032 wrote to memory of 3464 3032 z6175577.exe 94 PID 3032 wrote to memory of 3464 3032 z6175577.exe 94 PID 2268 wrote to memory of 448 2268 legosa.exe 95 PID 2268 wrote to memory of 448 2268 legosa.exe 95 PID 2268 wrote to memory of 448 2268 legosa.exe 95 PID 2268 wrote to memory of 3816 2268 legosa.exe 97 PID 2268 wrote to memory of 3816 2268 legosa.exe 97 PID 2268 wrote to memory of 3816 2268 legosa.exe 97 PID 3816 wrote to memory of 1016 3816 cmd.exe 100 PID 3816 wrote to memory of 1016 3816 cmd.exe 100 PID 3816 wrote to memory of 1016 3816 cmd.exe 100 PID 3816 wrote to memory of 2252 3816 cmd.exe 101 PID 3816 wrote to memory of 2252 3816 cmd.exe 101 PID 3816 wrote to memory of 2252 3816 cmd.exe 101 PID 3816 wrote to memory of 2136 3816 cmd.exe 102 PID 3816 wrote to memory of 2136 3816 cmd.exe 102 PID 3816 wrote to memory of 2136 3816 cmd.exe 102 PID 3816 wrote to memory of 5032 3816 cmd.exe 103 PID 3816 wrote to memory of 5032 3816 cmd.exe 103 PID 3816 wrote to memory of 5032 3816 cmd.exe 103 PID 3816 wrote to memory of 4952 3816 cmd.exe 104 PID 3816 wrote to memory of 4952 3816 cmd.exe 104 PID 3816 wrote to memory of 4952 3816 cmd.exe 104 PID 3816 wrote to memory of 3968 3816 cmd.exe 105 PID 3816 wrote to memory of 3968 3816 cmd.exe 105 PID 3816 wrote to memory of 3968 3816 cmd.exe 105 PID 2268 wrote to memory of 4236 2268 legosa.exe 107 PID 2268 wrote to memory of 4236 2268 legosa.exe 107 PID 2268 wrote to memory of 4236 2268 legosa.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6175577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6175577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3009205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3009205.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8717253.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8717253.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4895242.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4895242.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F6⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"7⤵PID:2252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E7⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:4952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:3968
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1366816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1366816.exe3⤵
- Executes dropped EXE
PID:3464
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:2356
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:4692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5a111f4bfc29d514161201e620340d0a7
SHA196bb194a12a45c2718293a6701f9e2ba63fe9963
SHA25614a7df6a1765672615d905694612f4d241dfdd3b1a7158b183cd469ad9aa60da
SHA512a40811ead17e2e96389b01106d1ee17c2345f8ee81de9ea9ad4241824a443fa14a5b7fc1c6acc7c1ce483231f1ac4f0fb0b1db0e6b9bd10e54cc72c62403285a
-
Filesize
432KB
MD5a111f4bfc29d514161201e620340d0a7
SHA196bb194a12a45c2718293a6701f9e2ba63fe9963
SHA25614a7df6a1765672615d905694612f4d241dfdd3b1a7158b183cd469ad9aa60da
SHA512a40811ead17e2e96389b01106d1ee17c2345f8ee81de9ea9ad4241824a443fa14a5b7fc1c6acc7c1ce483231f1ac4f0fb0b1db0e6b9bd10e54cc72c62403285a
-
Filesize
176KB
MD51347e0e1e6fc70938f74d2232d8ff06b
SHA115a52f9b78537faa1b758b38c9b8d1ea63041e04
SHA2562df54caaea652edc15ed18c6251de4bd58306240e5f6de24c82a1825459709ff
SHA51262d44c29027aea9475de2dc0971ae9cea099ca04f45243de359581caaaa11ed64d4274a364e8e55c07d8a4f90b9ece2b7a2725b2867980d9cc4402f730ac6f5f
-
Filesize
176KB
MD51347e0e1e6fc70938f74d2232d8ff06b
SHA115a52f9b78537faa1b758b38c9b8d1ea63041e04
SHA2562df54caaea652edc15ed18c6251de4bd58306240e5f6de24c82a1825459709ff
SHA51262d44c29027aea9475de2dc0971ae9cea099ca04f45243de359581caaaa11ed64d4274a364e8e55c07d8a4f90b9ece2b7a2725b2867980d9cc4402f730ac6f5f
-
Filesize
277KB
MD5c53100d4c0e0fda4bd2fda5c67d4242f
SHA1cbbaf2970d5a701d1727ebbff8db2e15bffc3129
SHA256c038e7bea4d8907baeb4167610b99a208a1bf827506b2d8f6e2933c4a9a847bc
SHA5128ce05e3e0254ef699ff6efe7e2b6cd362bd5ca8bfcdfaa03ab410c888abc877a827d3b10df5867a29da8806032d18de2da88c1fdf914427b704dbfcd230741d0
-
Filesize
277KB
MD5c53100d4c0e0fda4bd2fda5c67d4242f
SHA1cbbaf2970d5a701d1727ebbff8db2e15bffc3129
SHA256c038e7bea4d8907baeb4167610b99a208a1bf827506b2d8f6e2933c4a9a847bc
SHA5128ce05e3e0254ef699ff6efe7e2b6cd362bd5ca8bfcdfaa03ab410c888abc877a827d3b10df5867a29da8806032d18de2da88c1fdf914427b704dbfcd230741d0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5