Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2023, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe
Resource
win10-20230703-en
General
-
Target
9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe
-
Size
731KB
-
MD5
ffc32cf46f924b339ab7c4c44ed14a32
-
SHA1
369f0b606d0ca146d999960171bfd1ba5e0668df
-
SHA256
9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296
-
SHA512
6c853a33f94a2f8eb99659fe2a640367715c86bd77542f644034375abbae18814a696c90e8d31cabd56fad7e43aff7351a5e7a5331179ff487ae77fabecada96
-
SSDEEP
12288:TMrcy90q97L+OjjyjUklsd1c6nb/nZRquhW5WSqy40cWOP+Z3/:byp9evtaS+DnZRquMISSP+5/
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
maga
77.91.124.54:19071
-
auth_value
9dd7a0be219be9b6228dc9b4e112b812
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b001-144.dat healer behavioral1/files/0x000700000001b001-145.dat healer behavioral1/memory/772-146-0x0000000000260000-0x000000000026A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l3344126.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l3344126.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l3344126.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l3344126.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l3344126.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 816 y9227588.exe 3152 y2132481.exe 4416 y8868740.exe 772 l3344126.exe 4352 m9920648.exe 944 saves.exe 4812 n7804710.exe 3656 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3996 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" l3344126.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9227588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2132481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y8868740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 l3344126.exe 772 l3344126.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 l3344126.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 356 wrote to memory of 816 356 9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe 70 PID 356 wrote to memory of 816 356 9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe 70 PID 356 wrote to memory of 816 356 9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe 70 PID 816 wrote to memory of 3152 816 y9227588.exe 71 PID 816 wrote to memory of 3152 816 y9227588.exe 71 PID 816 wrote to memory of 3152 816 y9227588.exe 71 PID 3152 wrote to memory of 4416 3152 y2132481.exe 72 PID 3152 wrote to memory of 4416 3152 y2132481.exe 72 PID 3152 wrote to memory of 4416 3152 y2132481.exe 72 PID 4416 wrote to memory of 772 4416 y8868740.exe 73 PID 4416 wrote to memory of 772 4416 y8868740.exe 73 PID 4416 wrote to memory of 4352 4416 y8868740.exe 74 PID 4416 wrote to memory of 4352 4416 y8868740.exe 74 PID 4416 wrote to memory of 4352 4416 y8868740.exe 74 PID 4352 wrote to memory of 944 4352 m9920648.exe 75 PID 4352 wrote to memory of 944 4352 m9920648.exe 75 PID 4352 wrote to memory of 944 4352 m9920648.exe 75 PID 3152 wrote to memory of 4812 3152 y2132481.exe 76 PID 3152 wrote to memory of 4812 3152 y2132481.exe 76 PID 3152 wrote to memory of 4812 3152 y2132481.exe 76 PID 944 wrote to memory of 3848 944 saves.exe 77 PID 944 wrote to memory of 3848 944 saves.exe 77 PID 944 wrote to memory of 3848 944 saves.exe 77 PID 944 wrote to memory of 5036 944 saves.exe 78 PID 944 wrote to memory of 5036 944 saves.exe 78 PID 944 wrote to memory of 5036 944 saves.exe 78 PID 5036 wrote to memory of 396 5036 cmd.exe 81 PID 5036 wrote to memory of 396 5036 cmd.exe 81 PID 5036 wrote to memory of 396 5036 cmd.exe 81 PID 5036 wrote to memory of 3324 5036 cmd.exe 82 PID 5036 wrote to memory of 3324 5036 cmd.exe 82 PID 5036 wrote to memory of 3324 5036 cmd.exe 82 PID 5036 wrote to memory of 4576 5036 cmd.exe 83 PID 5036 wrote to memory of 4576 5036 cmd.exe 83 PID 5036 wrote to memory of 4576 5036 cmd.exe 83 PID 5036 wrote to memory of 5056 5036 cmd.exe 84 PID 5036 wrote to memory of 5056 5036 cmd.exe 84 PID 5036 wrote to memory of 5056 5036 cmd.exe 84 PID 5036 wrote to memory of 1420 5036 cmd.exe 85 PID 5036 wrote to memory of 1420 5036 cmd.exe 85 PID 5036 wrote to memory of 1420 5036 cmd.exe 85 PID 5036 wrote to memory of 2556 5036 cmd.exe 86 PID 5036 wrote to memory of 2556 5036 cmd.exe 86 PID 5036 wrote to memory of 2556 5036 cmd.exe 86 PID 944 wrote to memory of 3996 944 saves.exe 87 PID 944 wrote to memory of 3996 944 saves.exe 87 PID 944 wrote to memory of 3996 944 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe"C:\Users\Admin\AppData\Local\Temp\9f400ad0091c94774a6890837e320b0de68365f4cd0945bd09e12f2265063296.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9227588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9227588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2132481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2132481.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8868740.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8868740.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3344126.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3344126.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9920648.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9920648.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2556
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7804710.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n7804710.exe4⤵
- Executes dropped EXE
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5c07fe60e55fbb014d285953e36f67997
SHA1adce4f37827737d68bd6da638255daee3c4c2acd
SHA256e50fecb2a545e35e200ccfad1f8b98aa1a1e6e34dd98cd1af3e578dc4d62baf0
SHA51212e21759a646c7d71095e4fb06af4d2a501d96521be05cf6982f66bc68fdbd9959e44f9d71c207b9e64b729c41d69b3a0193a85ee1fab3980a58cdc420c61fa4
-
Filesize
599KB
MD5c07fe60e55fbb014d285953e36f67997
SHA1adce4f37827737d68bd6da638255daee3c4c2acd
SHA256e50fecb2a545e35e200ccfad1f8b98aa1a1e6e34dd98cd1af3e578dc4d62baf0
SHA51212e21759a646c7d71095e4fb06af4d2a501d96521be05cf6982f66bc68fdbd9959e44f9d71c207b9e64b729c41d69b3a0193a85ee1fab3980a58cdc420c61fa4
-
Filesize
433KB
MD5f9610791c6adbab4d14182d58a3701df
SHA13321ad87120e7d5c5341f022ec79182cd4a1263c
SHA2562cbf2713b9f480694a26aaff6a80ca1aacbdd5e22bf01af56fc5f8866b10f771
SHA5127f60f0cdb5b8f92779a2a96d21b0eebff11b82b7df734e85c9eae3384e39e29ff711769581cc0161a47685a41aca0cc94ca4806c415dabfc23264883bbefe18b
-
Filesize
433KB
MD5f9610791c6adbab4d14182d58a3701df
SHA13321ad87120e7d5c5341f022ec79182cd4a1263c
SHA2562cbf2713b9f480694a26aaff6a80ca1aacbdd5e22bf01af56fc5f8866b10f771
SHA5127f60f0cdb5b8f92779a2a96d21b0eebff11b82b7df734e85c9eae3384e39e29ff711769581cc0161a47685a41aca0cc94ca4806c415dabfc23264883bbefe18b
-
Filesize
174KB
MD5c5cc60ee496aae953fc094869e63a678
SHA1d40def236e26c3e0c73ecdc2255ebb68a84ca88a
SHA256dc33b91f579f930d017c6859593923ffc4f2bf96e4182840da127c64f98eb713
SHA51243c9515efc3bdd15259f10565317d575c852e9d64ee2c9ee82cf50d2cfb6a6dea430008a3ace3a40c615d70cccb64284584c4c249284fa61ed623803567487cc
-
Filesize
174KB
MD5c5cc60ee496aae953fc094869e63a678
SHA1d40def236e26c3e0c73ecdc2255ebb68a84ca88a
SHA256dc33b91f579f930d017c6859593923ffc4f2bf96e4182840da127c64f98eb713
SHA51243c9515efc3bdd15259f10565317d575c852e9d64ee2c9ee82cf50d2cfb6a6dea430008a3ace3a40c615d70cccb64284584c4c249284fa61ed623803567487cc
-
Filesize
277KB
MD5065b83d03ab13e575d12bd2497dd5de1
SHA1acb3f4667fd0257bfaece5ec2ab4d945d0b4620f
SHA256f09f5ef5cad6a4be285d2d94de43ca160d5443a35ef2ab8288f5c97fb5949f3c
SHA51263a066e378b9e909f0094cb61ad056ea51a634682a4f20b50777ab65c7eda2135b106637d6f48c1bde1a54ea7a2b0708f4785a5d652a13e7e5f15d38aa8f6c1b
-
Filesize
277KB
MD5065b83d03ab13e575d12bd2497dd5de1
SHA1acb3f4667fd0257bfaece5ec2ab4d945d0b4620f
SHA256f09f5ef5cad6a4be285d2d94de43ca160d5443a35ef2ab8288f5c97fb5949f3c
SHA51263a066e378b9e909f0094cb61ad056ea51a634682a4f20b50777ab65c7eda2135b106637d6f48c1bde1a54ea7a2b0708f4785a5d652a13e7e5f15d38aa8f6c1b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b