Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2023 15:14
Static task
static1
Behavioral task
behavioral1
Sample
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe
-
Size
517KB
-
MD5
cd1bd95b7236ce0ed66ac9f3bae5aa5d
-
SHA1
48362bbe6e2d1d20942f683ef1dba4cb4ee1381e
-
SHA256
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedc
-
SHA512
6d26006f1dd6cb3c04db6a46c688f87ece29e6171cf24af76a7535eb8d39375fff1383291e109285f46e233185fc0fd1564c3d2de246a55e1e11ef4a22230f4b
-
SSDEEP
12288:SMr7y9054e0md9jVORdL5i1eYw2naFbANoY5Eyu:hyk4OkdL51Yw244Ef
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2057240.exe healer C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2057240.exe healer behavioral2/memory/3184-154-0x0000000000A40000-0x0000000000A4A000-memory.dmp healer -
Processes:
p2057240.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2057240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2057240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2057240.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2057240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2057240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2057240.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
Processes:
z4294584.exez2956121.exep2057240.exer5085028.exelegola.exes3096480.exelegola.exelegola.exelegola.exepid process 1656 z4294584.exe 1984 z2956121.exe 3184 p2057240.exe 2428 r5085028.exe 1428 legola.exe 3424 s3096480.exe 2196 legola.exe 1028 legola.exe 4428 legola.exe -
Processes:
p2057240.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2057240.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exez4294584.exez2956121.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4294584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2956121.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
p2057240.exepid process 3184 p2057240.exe 3184 p2057240.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p2057240.exedescription pid process Token: SeDebugPrivilege 3184 p2057240.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
r5085028.exepid process 2428 r5085028.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exez4294584.exez2956121.exer5085028.exelegola.execmd.exedescription pid process target process PID 716 wrote to memory of 1656 716 c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe z4294584.exe PID 716 wrote to memory of 1656 716 c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe z4294584.exe PID 716 wrote to memory of 1656 716 c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe z4294584.exe PID 1656 wrote to memory of 1984 1656 z4294584.exe z2956121.exe PID 1656 wrote to memory of 1984 1656 z4294584.exe z2956121.exe PID 1656 wrote to memory of 1984 1656 z4294584.exe z2956121.exe PID 1984 wrote to memory of 3184 1984 z2956121.exe p2057240.exe PID 1984 wrote to memory of 3184 1984 z2956121.exe p2057240.exe PID 1984 wrote to memory of 2428 1984 z2956121.exe r5085028.exe PID 1984 wrote to memory of 2428 1984 z2956121.exe r5085028.exe PID 1984 wrote to memory of 2428 1984 z2956121.exe r5085028.exe PID 2428 wrote to memory of 1428 2428 r5085028.exe legola.exe PID 2428 wrote to memory of 1428 2428 r5085028.exe legola.exe PID 2428 wrote to memory of 1428 2428 r5085028.exe legola.exe PID 1656 wrote to memory of 3424 1656 z4294584.exe s3096480.exe PID 1656 wrote to memory of 3424 1656 z4294584.exe s3096480.exe PID 1656 wrote to memory of 3424 1656 z4294584.exe s3096480.exe PID 1428 wrote to memory of 4496 1428 legola.exe schtasks.exe PID 1428 wrote to memory of 4496 1428 legola.exe schtasks.exe PID 1428 wrote to memory of 4496 1428 legola.exe schtasks.exe PID 1428 wrote to memory of 1836 1428 legola.exe cmd.exe PID 1428 wrote to memory of 1836 1428 legola.exe cmd.exe PID 1428 wrote to memory of 1836 1428 legola.exe cmd.exe PID 1836 wrote to memory of 3848 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 3848 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 3848 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 1336 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1336 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1336 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1368 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1368 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1368 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 2708 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 2708 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 2708 1836 cmd.exe cmd.exe PID 1836 wrote to memory of 3920 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 3920 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 3920 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1264 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1264 1836 cmd.exe cacls.exe PID 1836 wrote to memory of 1264 1836 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\c32d36f5e946e2b2e2b3a04bd9d223beda5d728514ffb04e841c71856061dedcexe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4294584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4294584.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2956121.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2956121.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2057240.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p2057240.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r5085028.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r5085028.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F6⤵
- Creates scheduled task(s)
PID:4496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"7⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E7⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:3920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:1264
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3096480.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3096480.exe3⤵
- Executes dropped EXE
PID:3424
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:2196
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:1028
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD56a547e89160c43519dc2b2ee44ca0c14
SHA10f5a40d381c507e437abba97dc217526f994b6e4
SHA25669fde1d92e0e8ce402cf415b1ddeadedd1b7119d6c0d7953a9469b90cc28c9e4
SHA512153d70afecd45996fc191c639c42583399c849ea743aa070bbf8bd141540aa819006e83e065d17dc656fc8c5934e1e3637c88d3fc7d21982e8e8c0858287b9b4
-
Filesize
390KB
MD56a547e89160c43519dc2b2ee44ca0c14
SHA10f5a40d381c507e437abba97dc217526f994b6e4
SHA25669fde1d92e0e8ce402cf415b1ddeadedd1b7119d6c0d7953a9469b90cc28c9e4
SHA512153d70afecd45996fc191c639c42583399c849ea743aa070bbf8bd141540aa819006e83e065d17dc656fc8c5934e1e3637c88d3fc7d21982e8e8c0858287b9b4
-
Filesize
173KB
MD515f2f394842a24f9272a8f26474301d1
SHA14c4f8829c6833f6ccd2bd6cbf7590d2b8e2221f9
SHA25620dadc52d8509ac447c72b2db29300450af3011d9a36a8460ab881a3296f9198
SHA51266c623cfd96b53fe11671fffdf63f7dad0c0297cafa401d60f7a1dbfd98d8a44e102155dd2d108c28f77ef39d527546a44c48ec055d684e85cfd6e55dbfb4ea0
-
Filesize
173KB
MD515f2f394842a24f9272a8f26474301d1
SHA14c4f8829c6833f6ccd2bd6cbf7590d2b8e2221f9
SHA25620dadc52d8509ac447c72b2db29300450af3011d9a36a8460ab881a3296f9198
SHA51266c623cfd96b53fe11671fffdf63f7dad0c0297cafa401d60f7a1dbfd98d8a44e102155dd2d108c28f77ef39d527546a44c48ec055d684e85cfd6e55dbfb4ea0
-
Filesize
234KB
MD5b87150890116b643214f9fb6e842c158
SHA1c36715661b77c88e969ec7d4ad293d803582fa5d
SHA25602a33bde6387ed1f8a333a10570111b99a0939d05f06f1bf5b4b2e851dd8cc39
SHA512323bbbca570df7c1329515224eeb04b77a139f1ea475237fbcb5cde55f134198b41b55d90192dee258aa308e612b3d2ab792cc8382c3eb1c82b855b7cf2af53c
-
Filesize
234KB
MD5b87150890116b643214f9fb6e842c158
SHA1c36715661b77c88e969ec7d4ad293d803582fa5d
SHA25602a33bde6387ed1f8a333a10570111b99a0939d05f06f1bf5b4b2e851dd8cc39
SHA512323bbbca570df7c1329515224eeb04b77a139f1ea475237fbcb5cde55f134198b41b55d90192dee258aa308e612b3d2ab792cc8382c3eb1c82b855b7cf2af53c
-
Filesize
11KB
MD5e19aa1ba3fd61fac8419edd06bcc46d0
SHA1978ef10281af1fdbbb4f42f5bbf930af91a1b161
SHA25663aa778b681ae9dc85f261cf1d0f58fc4188636de026e0c14d96f7d995c093bb
SHA512c74fb78b3aae86e52413bceba2e5e5b726ca621cdec4cd9904e3b38efd107cdba8c09b51425fa31d69dc7a54cd3719a7aba6ea52ac8b0742251589d1cbe0226c
-
Filesize
11KB
MD5e19aa1ba3fd61fac8419edd06bcc46d0
SHA1978ef10281af1fdbbb4f42f5bbf930af91a1b161
SHA25663aa778b681ae9dc85f261cf1d0f58fc4188636de026e0c14d96f7d995c093bb
SHA512c74fb78b3aae86e52413bceba2e5e5b726ca621cdec4cd9904e3b38efd107cdba8c09b51425fa31d69dc7a54cd3719a7aba6ea52ac8b0742251589d1cbe0226c
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6
-
Filesize
225KB
MD53c0240c5aaf01c58ecc298f1b27a85e9
SHA14e8cfe29c9f335bababbc72115770688ff38d1d2
SHA2568c47f74c4f7fddb702b44b25f4241c80f0d78d5c8cf5c7aa46e360232eec620a
SHA5121547403de305d71b359e4f86ac6000b4ca39884d95ce7162dd9db49e8f7dde4acd119b7a39a8cb87fa2d11ca561c30028fb1a715679e1f0b8d1c97413b7a9fb6