Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2023 14:12
Static task
static1
Behavioral task
behavioral1
Sample
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe
-
Size
517KB
-
MD5
925b6e7ee7dd429ace73bc4848334ae4
-
SHA1
30bcf3d74707b03d4b55dd4e23ed57607cf070b5
-
SHA256
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2f
-
SHA512
cca30812d1e6bb6a9d5832da30ee47f30185f3829412baaacc1c7d07b97b8b3d2d078c6b91476acc7c7813c042585c0e06f092ba5ae2a1147ecba99ede7b7c4d
-
SSDEEP
12288:4Mrly90AmzqpHvGyPVK1W80sj7FlRv1/DXM:dyzmYHvJVK19j7FlRt/jM
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3010451.exe healer C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3010451.exe healer behavioral2/memory/416-154-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
Processes:
p3010451.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3010451.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3010451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3010451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3010451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3010451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3010451.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
z4733631.exez7555111.exep3010451.exer6799912.exelegola.exes1449251.exelegola.exelegola.exepid process 3724 z4733631.exe 4724 z7555111.exe 416 p3010451.exe 1896 r6799912.exe 1392 legola.exe 3808 s1449251.exe 1776 legola.exe 4976 legola.exe -
Processes:
p3010451.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3010451.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exez4733631.exez7555111.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4733631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7555111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
p3010451.exepid process 416 p3010451.exe 416 p3010451.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p3010451.exedescription pid process Token: SeDebugPrivilege 416 p3010451.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
r6799912.exepid process 1896 r6799912.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exez4733631.exez7555111.exer6799912.exelegola.execmd.exedescription pid process target process PID 1316 wrote to memory of 3724 1316 bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe z4733631.exe PID 1316 wrote to memory of 3724 1316 bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe z4733631.exe PID 1316 wrote to memory of 3724 1316 bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe z4733631.exe PID 3724 wrote to memory of 4724 3724 z4733631.exe z7555111.exe PID 3724 wrote to memory of 4724 3724 z4733631.exe z7555111.exe PID 3724 wrote to memory of 4724 3724 z4733631.exe z7555111.exe PID 4724 wrote to memory of 416 4724 z7555111.exe p3010451.exe PID 4724 wrote to memory of 416 4724 z7555111.exe p3010451.exe PID 4724 wrote to memory of 1896 4724 z7555111.exe r6799912.exe PID 4724 wrote to memory of 1896 4724 z7555111.exe r6799912.exe PID 4724 wrote to memory of 1896 4724 z7555111.exe r6799912.exe PID 1896 wrote to memory of 1392 1896 r6799912.exe legola.exe PID 1896 wrote to memory of 1392 1896 r6799912.exe legola.exe PID 1896 wrote to memory of 1392 1896 r6799912.exe legola.exe PID 3724 wrote to memory of 3808 3724 z4733631.exe s1449251.exe PID 3724 wrote to memory of 3808 3724 z4733631.exe s1449251.exe PID 3724 wrote to memory of 3808 3724 z4733631.exe s1449251.exe PID 1392 wrote to memory of 4384 1392 legola.exe schtasks.exe PID 1392 wrote to memory of 4384 1392 legola.exe schtasks.exe PID 1392 wrote to memory of 4384 1392 legola.exe schtasks.exe PID 1392 wrote to memory of 3780 1392 legola.exe cmd.exe PID 1392 wrote to memory of 3780 1392 legola.exe cmd.exe PID 1392 wrote to memory of 3780 1392 legola.exe cmd.exe PID 3780 wrote to memory of 4136 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 4136 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 4136 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 3096 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 3096 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 3096 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 2268 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 2268 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 2268 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 4960 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 4960 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 4960 3780 cmd.exe cmd.exe PID 3780 wrote to memory of 1520 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 1520 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 1520 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 1176 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 1176 3780 cmd.exe cacls.exe PID 3780 wrote to memory of 1176 3780 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\bf71475ce459de4e4b9b9b6f053406da76d01eefe7f1ac259a078de0b5f5cf2fexe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4733631.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4733631.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7555111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7555111.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3010451.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3010451.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6799912.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r6799912.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F6⤵
- Creates scheduled task(s)
PID:4384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"7⤵PID:3096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E7⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:1520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:1176
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1449251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s1449251.exe3⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:1776
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD50c0b96b61e43ed3afd6ad82af879aad2
SHA1dba214f51e7642d16bd5cfce5e9fa25dbb2416b8
SHA256cdb8e1350efae7486ba7049532afe23e69dbae9e364c29e15584762056da9c0e
SHA51266de8f9a9221083eec34993327f9bbf2b3034d5d5733148b4485690a1185811506a3d4d19aa79f023745f32efc06eaae669986d96ccf3c066a3176e3a810d63c
-
Filesize
389KB
MD50c0b96b61e43ed3afd6ad82af879aad2
SHA1dba214f51e7642d16bd5cfce5e9fa25dbb2416b8
SHA256cdb8e1350efae7486ba7049532afe23e69dbae9e364c29e15584762056da9c0e
SHA51266de8f9a9221083eec34993327f9bbf2b3034d5d5733148b4485690a1185811506a3d4d19aa79f023745f32efc06eaae669986d96ccf3c066a3176e3a810d63c
-
Filesize
173KB
MD5923257a02cfc3fecf2413b6ddecef813
SHA1c22e37c584bb10236815cd57bc5f5327f05ea64f
SHA256cbe86b94521e9cfe51c454e63d72c87d5987fe08b4adbc5a825be686afe0ce59
SHA5124402c13a7f5f896bc0995f2cd3565825869f399bd4ead2c0e07d805e384e8a8ff302345c11d11a253d74f207c0fcb482d78ee3ff1818619ed40cdf65226176e9
-
Filesize
173KB
MD5923257a02cfc3fecf2413b6ddecef813
SHA1c22e37c584bb10236815cd57bc5f5327f05ea64f
SHA256cbe86b94521e9cfe51c454e63d72c87d5987fe08b4adbc5a825be686afe0ce59
SHA5124402c13a7f5f896bc0995f2cd3565825869f399bd4ead2c0e07d805e384e8a8ff302345c11d11a253d74f207c0fcb482d78ee3ff1818619ed40cdf65226176e9
-
Filesize
234KB
MD56200664a263e9dc17b415aa0686fbe29
SHA10613d96ae0d4d0ee64e16b24ba50e528c80c6ba9
SHA25622a41079d67549c3a9640b0176ab0cddc63627e43be6b21a7f54cd798467bf01
SHA5125b7e76b750e7fd0a55bc3f1e7c83b96ec38a777573a48785bb299760ce13d663165447d680de70913cfffd4f90e047811f5cbc198bec246e3c448bcff461bd4f
-
Filesize
234KB
MD56200664a263e9dc17b415aa0686fbe29
SHA10613d96ae0d4d0ee64e16b24ba50e528c80c6ba9
SHA25622a41079d67549c3a9640b0176ab0cddc63627e43be6b21a7f54cd798467bf01
SHA5125b7e76b750e7fd0a55bc3f1e7c83b96ec38a777573a48785bb299760ce13d663165447d680de70913cfffd4f90e047811f5cbc198bec246e3c448bcff461bd4f
-
Filesize
11KB
MD52fec6de63ab6a6cf51bbab5255960a53
SHA19314583a241079c34390bf23eb72116339e3ece1
SHA256f2ed67208f5a1360f246d20986e6b3dff6dfa72c94a0ff629b0197d561e13b5f
SHA5125703b10eeca5a51a410f3758fc47c8403c5597749abc0ff3cb6a131997b2950a330e736b85501f180a4dba385ae0a8a89d5f373168da3adbb7f7e1aab5013d5b
-
Filesize
11KB
MD52fec6de63ab6a6cf51bbab5255960a53
SHA19314583a241079c34390bf23eb72116339e3ece1
SHA256f2ed67208f5a1360f246d20986e6b3dff6dfa72c94a0ff629b0197d561e13b5f
SHA5125703b10eeca5a51a410f3758fc47c8403c5597749abc0ff3cb6a131997b2950a330e736b85501f180a4dba385ae0a8a89d5f373168da3adbb7f7e1aab5013d5b
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c
-
Filesize
225KB
MD53158a5806ef98483cfb0fabb55e8e274
SHA1c5ae9222f25429070651ec045386399f79b62fc0
SHA2565da5641e2a374fa414d9e889046d0af74a44178bcd9bb4560de27463cc1a4757
SHA512228b84da1f85a644a9a80e913d69119fc4461e9020550e6dc94b17c9275395ac836e54151d932a5d4bc7294d611286180ac67e0e217bfde6a8e14e3c3d75349c