Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe
-
Size
517KB
-
MD5
86818b54abcb9714887b580624b1af43
-
SHA1
96aece978c389e1f9e791dc99c85bfcf04e434b2
-
SHA256
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfb
-
SHA512
bed70aed021237c3c5c3f96412cb0e896a5ff55fecc0d564213d67e9719ae59eb89821d921acb40374d87edd2230f54c7c2e3c1bcf3718dd8c07fbcfe0d371c0
-
SSDEEP
12288:qMray90oDKUQ79sC8K6DVZAQw2ifwKBz2oo2y3wu2tpTDyg:wyRTY9sPK6fl92e73wHvyg
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0819175.exe healer C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0819175.exe healer behavioral2/memory/4452-154-0x00000000000C0000-0x00000000000CA000-memory.dmp healer -
Processes:
p0819175.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p0819175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p0819175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p0819175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p0819175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p0819175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p0819175.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
z2460316.exez5728902.exep0819175.exer9696224.exelegola.exes4401612.exelegola.exelegola.exepid process 3960 z2460316.exe 2828 z5728902.exe 4452 p0819175.exe 4180 r9696224.exe 3968 legola.exe 4384 s4401612.exe 4688 legola.exe 3228 legola.exe -
Processes:
p0819175.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p0819175.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exez2460316.exez5728902.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2460316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5728902.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
p0819175.exepid process 4452 p0819175.exe 4452 p0819175.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p0819175.exedescription pid process Token: SeDebugPrivilege 4452 p0819175.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
r9696224.exepid process 4180 r9696224.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exez2460316.exez5728902.exer9696224.exelegola.execmd.exedescription pid process target process PID 2100 wrote to memory of 3960 2100 96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe z2460316.exe PID 2100 wrote to memory of 3960 2100 96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe z2460316.exe PID 2100 wrote to memory of 3960 2100 96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe z2460316.exe PID 3960 wrote to memory of 2828 3960 z2460316.exe z5728902.exe PID 3960 wrote to memory of 2828 3960 z2460316.exe z5728902.exe PID 3960 wrote to memory of 2828 3960 z2460316.exe z5728902.exe PID 2828 wrote to memory of 4452 2828 z5728902.exe p0819175.exe PID 2828 wrote to memory of 4452 2828 z5728902.exe p0819175.exe PID 2828 wrote to memory of 4180 2828 z5728902.exe r9696224.exe PID 2828 wrote to memory of 4180 2828 z5728902.exe r9696224.exe PID 2828 wrote to memory of 4180 2828 z5728902.exe r9696224.exe PID 4180 wrote to memory of 3968 4180 r9696224.exe legola.exe PID 4180 wrote to memory of 3968 4180 r9696224.exe legola.exe PID 4180 wrote to memory of 3968 4180 r9696224.exe legola.exe PID 3960 wrote to memory of 4384 3960 z2460316.exe s4401612.exe PID 3960 wrote to memory of 4384 3960 z2460316.exe s4401612.exe PID 3960 wrote to memory of 4384 3960 z2460316.exe s4401612.exe PID 3968 wrote to memory of 1628 3968 legola.exe schtasks.exe PID 3968 wrote to memory of 1628 3968 legola.exe schtasks.exe PID 3968 wrote to memory of 1628 3968 legola.exe schtasks.exe PID 3968 wrote to memory of 4592 3968 legola.exe cmd.exe PID 3968 wrote to memory of 4592 3968 legola.exe cmd.exe PID 3968 wrote to memory of 4592 3968 legola.exe cmd.exe PID 4592 wrote to memory of 4220 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 4220 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 4220 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 792 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 792 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 792 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 3752 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 3752 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 3752 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4596 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 4596 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 4596 4592 cmd.exe cmd.exe PID 4592 wrote to memory of 4440 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4440 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4440 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4468 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4468 4592 cmd.exe cacls.exe PID 4592 wrote to memory of 4468 4592 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\96aa8a40689f2588a79dee841589dce9b9da79737fb445259afce033646a1dfbexe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2460316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2460316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5728902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5728902.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0819175.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0819175.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r9696224.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r9696224.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F6⤵
- Creates scheduled task(s)
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"7⤵PID:792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E7⤵PID:3752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:4440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:4468
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4401612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4401612.exe3⤵
- Executes dropped EXE
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4688
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:3228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD542422bea3b0b432044a61635fb39ff2c
SHA13216d5c8c9ad6d8a3f17b2702edd754cb8f83e34
SHA256cabd28e4ed96e703be41acb33438eef31fa4664f3dc643aa9214a9db6af961a1
SHA51299be4c255e4a2a9e5b30df8bd67a32ecf73d0bbe9aa2f41930f97031c624eab9e51b13ea790bbe6edf9d6169d93e62f89014d8a225def4934f9bbb5ec8b08ca9
-
Filesize
390KB
MD542422bea3b0b432044a61635fb39ff2c
SHA13216d5c8c9ad6d8a3f17b2702edd754cb8f83e34
SHA256cabd28e4ed96e703be41acb33438eef31fa4664f3dc643aa9214a9db6af961a1
SHA51299be4c255e4a2a9e5b30df8bd67a32ecf73d0bbe9aa2f41930f97031c624eab9e51b13ea790bbe6edf9d6169d93e62f89014d8a225def4934f9bbb5ec8b08ca9
-
Filesize
173KB
MD58d96883e59ca2e9e5e67bfe91be8ed7e
SHA1b29c66faa71350d21856746e9c4060ce2b63b7be
SHA256ef37e1278ef032d792a5b96613c915d26f8dbd5e3aedcafc4b427c7121140ded
SHA5124c4e063b85f6486a3b895712189f746c74cf708b718c7fed29646f7c994ec44cea4e3eac36f02a24d555ec5332fb0fc11b95647a7ed87f5af601ae69e4d7f752
-
Filesize
173KB
MD58d96883e59ca2e9e5e67bfe91be8ed7e
SHA1b29c66faa71350d21856746e9c4060ce2b63b7be
SHA256ef37e1278ef032d792a5b96613c915d26f8dbd5e3aedcafc4b427c7121140ded
SHA5124c4e063b85f6486a3b895712189f746c74cf708b718c7fed29646f7c994ec44cea4e3eac36f02a24d555ec5332fb0fc11b95647a7ed87f5af601ae69e4d7f752
-
Filesize
234KB
MD5108d9c96c6bcfe27a7aa08cfb3252f0f
SHA156d76e6c0264704dd1aa473bacdb696a59622c1d
SHA256ab194ae224dc58b661586ad2ecb6c7e072cb7bbfa54510639810a8dc11a6f994
SHA512a7b18e483e16ad865db3a7a878877397c0e84af565923db656bf3d534adaeb0f1d8543d87901ef6694dff277f6b965893dc721544719f1330926e2e9af3a99a7
-
Filesize
234KB
MD5108d9c96c6bcfe27a7aa08cfb3252f0f
SHA156d76e6c0264704dd1aa473bacdb696a59622c1d
SHA256ab194ae224dc58b661586ad2ecb6c7e072cb7bbfa54510639810a8dc11a6f994
SHA512a7b18e483e16ad865db3a7a878877397c0e84af565923db656bf3d534adaeb0f1d8543d87901ef6694dff277f6b965893dc721544719f1330926e2e9af3a99a7
-
Filesize
11KB
MD52ba35091955f256e0da61c7eefd22eb4
SHA156e0d7b74f7a333619f37c4c39893c008af6904b
SHA25619024e8c617245a5955fd61314583eb94d8affa9902dd8b16f1dea799afad2c4
SHA5129a1e33011f61170a79bed6e2acccc491aa3d66b63b262a386ded0d5543e4459bb805a1ace540c4338a3aa1e4d0796359b135e13d904a3e08e72e9b68b37e17fa
-
Filesize
11KB
MD52ba35091955f256e0da61c7eefd22eb4
SHA156e0d7b74f7a333619f37c4c39893c008af6904b
SHA25619024e8c617245a5955fd61314583eb94d8affa9902dd8b16f1dea799afad2c4
SHA5129a1e33011f61170a79bed6e2acccc491aa3d66b63b262a386ded0d5543e4459bb805a1ace540c4338a3aa1e4d0796359b135e13d904a3e08e72e9b68b37e17fa
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf
-
Filesize
225KB
MD562b30998413261319fe2d3f89913c761
SHA150e7986130b7ef5568624d665b19179a1877510f
SHA256fa1849abef818f4b10d034cbd37b02f32e4b804e2a3984bc4a0dbfaf12ca72eb
SHA512be573c537ae7afaa0383bbb391eb34ac770ae5e92294f926213c0d43c876e65e04a4a96fe4680385800a9024aaf99901921f1c984f1585468b75a77767d992bf