Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
22/08/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe
Resource
win10-20230703-en
General
-
Target
7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe
-
Size
704KB
-
MD5
232b8f576232e0f10960541b92f5059a
-
SHA1
3a3de7ffea0993d5973a2daf82a7f17e26019af5
-
SHA256
7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3
-
SHA512
a078bb1d392c47d93fa1aa434f46db32ffa9c48aa92bfcb513af34818a60d5d5803027283d0f7cc0cdadc85f3d2f0e877726bcbb4d716d848be2022bb49fb92f
-
SSDEEP
12288:CMrBy90Su0USMRNEU7DGAyYqiq5GwCrHc87znUbO2NeH:jyBuEMHEU29sHc87eOdH
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afdf-146.dat healer behavioral1/files/0x000700000001afdf-147.dat healer behavioral1/memory/2672-148-0x0000000000990000-0x000000000099A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4927487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4927487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4927487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4927487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4927487.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4932 x2855606.exe 652 x6887189.exe 4608 x1172900.exe 2672 g4927487.exe 1524 h5417910.exe 4464 saves.exe 4456 i7723145.exe 868 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4460 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4927487.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2855606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6887189.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1172900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 g4927487.exe 2672 g4927487.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 g4927487.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3112 wrote to memory of 4932 3112 7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe 70 PID 3112 wrote to memory of 4932 3112 7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe 70 PID 3112 wrote to memory of 4932 3112 7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe 70 PID 4932 wrote to memory of 652 4932 x2855606.exe 71 PID 4932 wrote to memory of 652 4932 x2855606.exe 71 PID 4932 wrote to memory of 652 4932 x2855606.exe 71 PID 652 wrote to memory of 4608 652 x6887189.exe 72 PID 652 wrote to memory of 4608 652 x6887189.exe 72 PID 652 wrote to memory of 4608 652 x6887189.exe 72 PID 4608 wrote to memory of 2672 4608 x1172900.exe 73 PID 4608 wrote to memory of 2672 4608 x1172900.exe 73 PID 4608 wrote to memory of 1524 4608 x1172900.exe 74 PID 4608 wrote to memory of 1524 4608 x1172900.exe 74 PID 4608 wrote to memory of 1524 4608 x1172900.exe 74 PID 1524 wrote to memory of 4464 1524 h5417910.exe 75 PID 1524 wrote to memory of 4464 1524 h5417910.exe 75 PID 1524 wrote to memory of 4464 1524 h5417910.exe 75 PID 652 wrote to memory of 4456 652 x6887189.exe 76 PID 652 wrote to memory of 4456 652 x6887189.exe 76 PID 652 wrote to memory of 4456 652 x6887189.exe 76 PID 4464 wrote to memory of 2408 4464 saves.exe 77 PID 4464 wrote to memory of 2408 4464 saves.exe 77 PID 4464 wrote to memory of 2408 4464 saves.exe 77 PID 4464 wrote to memory of 860 4464 saves.exe 79 PID 4464 wrote to memory of 860 4464 saves.exe 79 PID 4464 wrote to memory of 860 4464 saves.exe 79 PID 860 wrote to memory of 2260 860 cmd.exe 81 PID 860 wrote to memory of 2260 860 cmd.exe 81 PID 860 wrote to memory of 2260 860 cmd.exe 81 PID 860 wrote to memory of 2212 860 cmd.exe 82 PID 860 wrote to memory of 2212 860 cmd.exe 82 PID 860 wrote to memory of 2212 860 cmd.exe 82 PID 860 wrote to memory of 3028 860 cmd.exe 83 PID 860 wrote to memory of 3028 860 cmd.exe 83 PID 860 wrote to memory of 3028 860 cmd.exe 83 PID 860 wrote to memory of 3712 860 cmd.exe 84 PID 860 wrote to memory of 3712 860 cmd.exe 84 PID 860 wrote to memory of 3712 860 cmd.exe 84 PID 860 wrote to memory of 4552 860 cmd.exe 85 PID 860 wrote to memory of 4552 860 cmd.exe 85 PID 860 wrote to memory of 4552 860 cmd.exe 85 PID 860 wrote to memory of 4436 860 cmd.exe 86 PID 860 wrote to memory of 4436 860 cmd.exe 86 PID 860 wrote to memory of 4436 860 cmd.exe 86 PID 4464 wrote to memory of 4460 4464 saves.exe 88 PID 4464 wrote to memory of 4460 4464 saves.exe 88 PID 4464 wrote to memory of 4460 4464 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe"C:\Users\Admin\AppData\Local\Temp\7357d190328bedbcc9bd04dbc210a9e0b146ebf1eed3328db4d94eca2f2637c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2855606.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2855606.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6887189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6887189.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1172900.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1172900.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4927487.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4927487.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5417910.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5417910.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4436
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7723145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7723145.exe4⤵
- Executes dropped EXE
PID:4456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5bc2c05cbda05a0607b2f0ec0285eb108
SHA11555ca8d2c93f6d7cc9f61c967a88b7e56b40da5
SHA2562c3d7ed8ee1bfd7b543489b6ce3222532e2f72490badec77b585f42801c16fd4
SHA512a792e351a740a2165ef5b97ce57d7000cf77b299935193c04d1761acfb49563d60285e3f066abcdf7295189b3b406a44ba039ca57cd578e834481b639ac9d581
-
Filesize
599KB
MD5bc2c05cbda05a0607b2f0ec0285eb108
SHA11555ca8d2c93f6d7cc9f61c967a88b7e56b40da5
SHA2562c3d7ed8ee1bfd7b543489b6ce3222532e2f72490badec77b585f42801c16fd4
SHA512a792e351a740a2165ef5b97ce57d7000cf77b299935193c04d1761acfb49563d60285e3f066abcdf7295189b3b406a44ba039ca57cd578e834481b639ac9d581
-
Filesize
433KB
MD53a5c4a59a49e32175856fe21327f43e5
SHA1da51dd9115416062b2a9dc31334e53ad513c41df
SHA25614230bc037c42a15ae81b622a3fa8649005d5aab0873e0688bb57a92a0ced1b8
SHA5126146105d8cc8cc2837760373ef8cc9239b2a565d35bc1deaf4cf931d1410630e454aad6c34720b09c765aa879f5420c479b43135f0796739a3a622aa0e342d15
-
Filesize
433KB
MD53a5c4a59a49e32175856fe21327f43e5
SHA1da51dd9115416062b2a9dc31334e53ad513c41df
SHA25614230bc037c42a15ae81b622a3fa8649005d5aab0873e0688bb57a92a0ced1b8
SHA5126146105d8cc8cc2837760373ef8cc9239b2a565d35bc1deaf4cf931d1410630e454aad6c34720b09c765aa879f5420c479b43135f0796739a3a622aa0e342d15
-
Filesize
174KB
MD5979525698f1cbf8f3e4a26f9d53c2d10
SHA1ed0569190513f918fd26cba3b4fe0e77bb622337
SHA256c3f7dfc8e8b1a637851bd95bce4cebe9ee2ad8ecd756e07a3a702922ad7d99e3
SHA512c01b9584b966872ace0a8880b5ec69cfd9fcc2b48ae4d6b74219596df753a4bfbb4ca968eaaf092f3a36cf7773dcf670b8e07edf76ab63623884003fc6df8986
-
Filesize
174KB
MD5979525698f1cbf8f3e4a26f9d53c2d10
SHA1ed0569190513f918fd26cba3b4fe0e77bb622337
SHA256c3f7dfc8e8b1a637851bd95bce4cebe9ee2ad8ecd756e07a3a702922ad7d99e3
SHA512c01b9584b966872ace0a8880b5ec69cfd9fcc2b48ae4d6b74219596df753a4bfbb4ca968eaaf092f3a36cf7773dcf670b8e07edf76ab63623884003fc6df8986
-
Filesize
277KB
MD5de32bc883062c2db7e09295a83b751f7
SHA1fe4588836ecb4823de2415572d79ec375ed61b0c
SHA25602bdeb45a974b1ce7594bfdef7101c52eed50488727030f318f3377c0369b686
SHA51279cceb4513e87d07aa04dd26550e9ac3449c893c2986f4760fa16b3157e52b1db3c0c3587a9290706486666543c47772c63a77b29a48c09a9c5c10abd0b01510
-
Filesize
277KB
MD5de32bc883062c2db7e09295a83b751f7
SHA1fe4588836ecb4823de2415572d79ec375ed61b0c
SHA25602bdeb45a974b1ce7594bfdef7101c52eed50488727030f318f3377c0369b686
SHA51279cceb4513e87d07aa04dd26550e9ac3449c893c2986f4760fa16b3157e52b1db3c0c3587a9290706486666543c47772c63a77b29a48c09a9c5c10abd0b01510
-
Filesize
12KB
MD5de99fbb9a1cc67925eaed3727e0ba059
SHA1a7d6464f64fb19e1fb6a06df4cd4c09ff082dbd4
SHA256b707ef146562d9c4c0d167d03f6b8738d237cd7cbf97a55b8c27adb0a008f249
SHA5129d794c3bb0ddec3f2b9726a2318712eec56bb400272b8b396a7cf97858b87e6650896e224559d0261bf4cdf2367db3472eefcdf0c655280321b198f7be46ef87
-
Filesize
12KB
MD5de99fbb9a1cc67925eaed3727e0ba059
SHA1a7d6464f64fb19e1fb6a06df4cd4c09ff082dbd4
SHA256b707ef146562d9c4c0d167d03f6b8738d237cd7cbf97a55b8c27adb0a008f249
SHA5129d794c3bb0ddec3f2b9726a2318712eec56bb400272b8b396a7cf97858b87e6650896e224559d0261bf4cdf2367db3472eefcdf0c655280321b198f7be46ef87
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
315KB
MD533b2913bad0c9bca4c0dc9ae4dd8b76b
SHA1ae3802c1fe882e95fe871b8c484403dd90043f2f
SHA25606164a08c8ed6135649d1205bfdd1ea5ed85241c64fb740e33e3dcdb3a44084d
SHA512e59c2359a4799b5396d8a145bf76f44f43696f9c5062c6de7a90e5505d147dc07e60266bf0a0d6fc55d23472227a0b50a465589261c4f8f6e857a73bac9f3830
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b