Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2023 13:28
Static task
static1
Behavioral task
behavioral1
Sample
e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe
-
Size
517KB
-
MD5
01011c5ec5c4acf036fa06ed812f1401
-
SHA1
5816bd6d4ca9e07975054a20b45275bfa3551e56
-
SHA256
e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39
-
SHA512
162bbf70003786c08cd918723b76ce26e38bee0857d8db9885be85661259524fad7d96296058c2afcf74179549f908df061a7809bda19aa09bf35506db9dd27a
-
SSDEEP
12288:MMr5y90syVFPyglv625Y10jsW6Kc8TyN:9yATPy6/Y0jN/c8eN
Malware Config
Extracted
amadey
3.86
5.42.92.67/norm/index.php
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exe healer C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exe healer behavioral2/memory/3288-157-0x0000000000F40000-0x0000000000F4A000-memory.dmp healer -
Processes:
p3858327.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3858327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3858327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3858327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3858327.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3858327.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3858327.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
Processes:
z9573139.exez3274844.exep3858327.exer4622886.exelegola.exes6865117.exelegola.exelegola.exepid process 3936 z9573139.exe 3956 z3274844.exe 3288 p3858327.exe 4800 r4622886.exe 532 legola.exe 636 s6865117.exe 4284 legola.exe 3116 legola.exe -
Processes:
p3858327.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3858327.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
z3274844.exee5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exez9573139.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3274844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9573139.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
p3858327.exepid process 3288 p3858327.exe 3288 p3858327.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p3858327.exedescription pid process Token: SeDebugPrivilege 3288 p3858327.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
r4622886.exepid process 4800 r4622886.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exez9573139.exez3274844.exer4622886.exelegola.execmd.exedescription pid process target process PID 1556 wrote to memory of 3936 1556 e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe z9573139.exe PID 1556 wrote to memory of 3936 1556 e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe z9573139.exe PID 1556 wrote to memory of 3936 1556 e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe z9573139.exe PID 3936 wrote to memory of 3956 3936 z9573139.exe z3274844.exe PID 3936 wrote to memory of 3956 3936 z9573139.exe z3274844.exe PID 3936 wrote to memory of 3956 3936 z9573139.exe z3274844.exe PID 3956 wrote to memory of 3288 3956 z3274844.exe p3858327.exe PID 3956 wrote to memory of 3288 3956 z3274844.exe p3858327.exe PID 3956 wrote to memory of 4800 3956 z3274844.exe r4622886.exe PID 3956 wrote to memory of 4800 3956 z3274844.exe r4622886.exe PID 3956 wrote to memory of 4800 3956 z3274844.exe r4622886.exe PID 4800 wrote to memory of 532 4800 r4622886.exe legola.exe PID 4800 wrote to memory of 532 4800 r4622886.exe legola.exe PID 4800 wrote to memory of 532 4800 r4622886.exe legola.exe PID 3936 wrote to memory of 636 3936 z9573139.exe s6865117.exe PID 3936 wrote to memory of 636 3936 z9573139.exe s6865117.exe PID 3936 wrote to memory of 636 3936 z9573139.exe s6865117.exe PID 532 wrote to memory of 3704 532 legola.exe schtasks.exe PID 532 wrote to memory of 3704 532 legola.exe schtasks.exe PID 532 wrote to memory of 3704 532 legola.exe schtasks.exe PID 532 wrote to memory of 1496 532 legola.exe cmd.exe PID 532 wrote to memory of 1496 532 legola.exe cmd.exe PID 532 wrote to memory of 1496 532 legola.exe cmd.exe PID 1496 wrote to memory of 3048 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 3048 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 3048 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 3872 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 3872 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 3872 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 1624 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 1624 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 1624 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 2756 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 2756 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 2756 1496 cmd.exe cmd.exe PID 1496 wrote to memory of 2324 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 2324 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 2324 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 4260 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 4260 1496 cmd.exe cacls.exe PID 1496 wrote to memory of 4260 1496 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\e5324b42b89c067618156dd86eee92cc4bb49367db5ade661ae800cde8878e39exe_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9573139.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9573139.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3274844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3274844.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4622886.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4622886.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6865117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6865117.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9573139.exeFilesize
390KB
MD5ccb082a13de7ef2c38cb599664715415
SHA1dfaddd9555dbc433a04cbd08b66ca9c25064ca6a
SHA256f60ab8529d51ec2559bd674cca7751e01e2e90b06303a8301f9684839d959e48
SHA5120fcf2783b20e92792fa3a5c48652c8821a98ca363d88b547c65e71eac40b665b5fb5bd9c878bd692d4e0b1ed95a10e93d8c676f9c887acf864340401925d4c2a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9573139.exeFilesize
390KB
MD5ccb082a13de7ef2c38cb599664715415
SHA1dfaddd9555dbc433a04cbd08b66ca9c25064ca6a
SHA256f60ab8529d51ec2559bd674cca7751e01e2e90b06303a8301f9684839d959e48
SHA5120fcf2783b20e92792fa3a5c48652c8821a98ca363d88b547c65e71eac40b665b5fb5bd9c878bd692d4e0b1ed95a10e93d8c676f9c887acf864340401925d4c2a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6865117.exeFilesize
173KB
MD563b37edeb4f3db9b7b4701cd07d9ee94
SHA1ef8448db0adf590417aa90227feea23a38797cfd
SHA256623827148f841e3bae94ac984dd6eb9abb5e2d021baa2689c3effa332fd49984
SHA51248769c2d237801092b664e35fb06c3a79d032cb8d24bbe89fc385df5c28a5b91949b12ed48b8e484e6eed6439a7fa3461ab0610633821db4d2359761585435a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6865117.exeFilesize
173KB
MD563b37edeb4f3db9b7b4701cd07d9ee94
SHA1ef8448db0adf590417aa90227feea23a38797cfd
SHA256623827148f841e3bae94ac984dd6eb9abb5e2d021baa2689c3effa332fd49984
SHA51248769c2d237801092b664e35fb06c3a79d032cb8d24bbe89fc385df5c28a5b91949b12ed48b8e484e6eed6439a7fa3461ab0610633821db4d2359761585435a6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3274844.exeFilesize
234KB
MD544da109c1839a5ab87bce73c5b7d9275
SHA113c386f95ca9ac36243d030b6776797458f8779e
SHA256ae79c1b5ec2245e1811004eca74d1743e23b5282007ce022f14169f7ec86b0cd
SHA5129651e70f5c5de498b22da47c17e8dd68a26aae9de378b94cefcb2ae0703fb418194f6a857f8445be3c0162d1a885f2866e261eadf56cf2a17c56b52bd2c271b2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3274844.exeFilesize
234KB
MD544da109c1839a5ab87bce73c5b7d9275
SHA113c386f95ca9ac36243d030b6776797458f8779e
SHA256ae79c1b5ec2245e1811004eca74d1743e23b5282007ce022f14169f7ec86b0cd
SHA5129651e70f5c5de498b22da47c17e8dd68a26aae9de378b94cefcb2ae0703fb418194f6a857f8445be3c0162d1a885f2866e261eadf56cf2a17c56b52bd2c271b2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exeFilesize
11KB
MD57cccedc416776760d131a844e9101abe
SHA15db2b361d70cde00e42a62ee146d4aae7a02ed03
SHA256849d20ab15fce28c2dcf8e898dd9e1a0f49749855e71a6afe130265049708e7f
SHA512b49880853caef3b79cebd99316a49ba2e1e81c64f4a0922c383fcc17f52c277e7a6f30eae67e4df771f3383795ff30c4be8508c7c8202245dd8d1ba878548adb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3858327.exeFilesize
11KB
MD57cccedc416776760d131a844e9101abe
SHA15db2b361d70cde00e42a62ee146d4aae7a02ed03
SHA256849d20ab15fce28c2dcf8e898dd9e1a0f49749855e71a6afe130265049708e7f
SHA512b49880853caef3b79cebd99316a49ba2e1e81c64f4a0922c383fcc17f52c277e7a6f30eae67e4df771f3383795ff30c4be8508c7c8202245dd8d1ba878548adb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4622886.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r4622886.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeFilesize
225KB
MD5c971c726d07efa4bf0dc4c2fc12391a3
SHA17e1db2cec8fb3d8549ed77201adee41047a704a9
SHA2560cb01a974dd81fec92bf695dfec974633b76031b9aa348a869be6b5b5764fbbb
SHA5122c51ab475613d6d1cf197a3d47f79245b3de1fc0a379c7415d028cc652cc1b98d5cbb2bcc0c89996fd7d6ef9f7c9475e3c2f3a4f2164a31bddc3c0334ee04255
-
memory/636-179-0x000000000A700000-0x000000000AD18000-memory.dmpFilesize
6.1MB
-
memory/636-177-0x0000000072B00000-0x00000000732B0000-memory.dmpFilesize
7.7MB
-
memory/636-178-0x00000000002C0000-0x00000000002F0000-memory.dmpFilesize
192KB
-
memory/636-180-0x000000000A270000-0x000000000A37A000-memory.dmpFilesize
1.0MB
-
memory/636-181-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/636-182-0x000000000A1B0000-0x000000000A1C2000-memory.dmpFilesize
72KB
-
memory/636-183-0x000000000A210000-0x000000000A24C000-memory.dmpFilesize
240KB
-
memory/636-184-0x0000000072B00000-0x00000000732B0000-memory.dmpFilesize
7.7MB
-
memory/636-185-0x0000000004C50000-0x0000000004C60000-memory.dmpFilesize
64KB
-
memory/3288-160-0x00007FFC35ED0000-0x00007FFC36991000-memory.dmpFilesize
10.8MB
-
memory/3288-158-0x00007FFC35ED0000-0x00007FFC36991000-memory.dmpFilesize
10.8MB
-
memory/3288-157-0x0000000000F40000-0x0000000000F4A000-memory.dmpFilesize
40KB