Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 10:26
Static task
static1
Behavioral task
behavioral1
Sample
3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe
Resource
win10v2004-20230703-en
General
-
Target
3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe
-
Size
703KB
-
MD5
cc877c8e407b05bf3cac2c14685e90ac
-
SHA1
2d3ea6f63e80d6f83c3f0dfd44bc316ff13d5b51
-
SHA256
3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b
-
SHA512
3269a3e5693dee878690379257cf31004094596f8af386c8f71e8360257cf4b14fa4d3e8598bbc652eb140083ff5338538ddead96e3e7859680cd23c26ed7ffd
-
SSDEEP
12288:/Mrby907Ko0+ODtDUn8RUlIuwqgULSphipbgCTBGPrhB:wyFRt48RUhxSvubZTBGPVB
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023177-26.dat healer behavioral1/files/0x0008000000023177-27.dat healer behavioral1/memory/4664-28-0x0000000000E80000-0x0000000000E8A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0382073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0382073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0382073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0382073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0382073.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g0382073.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 3860 x1563035.exe 1332 x6926697.exe 3616 x0792875.exe 4664 g0382073.exe 2208 h5220303.exe 3384 saves.exe 2076 i1123165.exe 4844 saves.exe 2760 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4696 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0382073.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1563035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6926697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0792875.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4664 g0382073.exe 4664 g0382073.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4664 g0382073.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3808 wrote to memory of 3860 3808 3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe 80 PID 3808 wrote to memory of 3860 3808 3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe 80 PID 3808 wrote to memory of 3860 3808 3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe 80 PID 3860 wrote to memory of 1332 3860 x1563035.exe 81 PID 3860 wrote to memory of 1332 3860 x1563035.exe 81 PID 3860 wrote to memory of 1332 3860 x1563035.exe 81 PID 1332 wrote to memory of 3616 1332 x6926697.exe 82 PID 1332 wrote to memory of 3616 1332 x6926697.exe 82 PID 1332 wrote to memory of 3616 1332 x6926697.exe 82 PID 3616 wrote to memory of 4664 3616 x0792875.exe 83 PID 3616 wrote to memory of 4664 3616 x0792875.exe 83 PID 3616 wrote to memory of 2208 3616 x0792875.exe 89 PID 3616 wrote to memory of 2208 3616 x0792875.exe 89 PID 3616 wrote to memory of 2208 3616 x0792875.exe 89 PID 2208 wrote to memory of 3384 2208 h5220303.exe 90 PID 2208 wrote to memory of 3384 2208 h5220303.exe 90 PID 2208 wrote to memory of 3384 2208 h5220303.exe 90 PID 1332 wrote to memory of 2076 1332 x6926697.exe 91 PID 1332 wrote to memory of 2076 1332 x6926697.exe 91 PID 1332 wrote to memory of 2076 1332 x6926697.exe 91 PID 3384 wrote to memory of 4700 3384 saves.exe 92 PID 3384 wrote to memory of 4700 3384 saves.exe 92 PID 3384 wrote to memory of 4700 3384 saves.exe 92 PID 3384 wrote to memory of 4684 3384 saves.exe 94 PID 3384 wrote to memory of 4684 3384 saves.exe 94 PID 3384 wrote to memory of 4684 3384 saves.exe 94 PID 4684 wrote to memory of 60 4684 cmd.exe 96 PID 4684 wrote to memory of 60 4684 cmd.exe 96 PID 4684 wrote to memory of 60 4684 cmd.exe 96 PID 4684 wrote to memory of 1648 4684 cmd.exe 97 PID 4684 wrote to memory of 1648 4684 cmd.exe 97 PID 4684 wrote to memory of 1648 4684 cmd.exe 97 PID 4684 wrote to memory of 2688 4684 cmd.exe 98 PID 4684 wrote to memory of 2688 4684 cmd.exe 98 PID 4684 wrote to memory of 2688 4684 cmd.exe 98 PID 4684 wrote to memory of 1868 4684 cmd.exe 99 PID 4684 wrote to memory of 1868 4684 cmd.exe 99 PID 4684 wrote to memory of 1868 4684 cmd.exe 99 PID 4684 wrote to memory of 4332 4684 cmd.exe 100 PID 4684 wrote to memory of 4332 4684 cmd.exe 100 PID 4684 wrote to memory of 4332 4684 cmd.exe 100 PID 4684 wrote to memory of 3828 4684 cmd.exe 101 PID 4684 wrote to memory of 3828 4684 cmd.exe 101 PID 4684 wrote to memory of 3828 4684 cmd.exe 101 PID 3384 wrote to memory of 4696 3384 saves.exe 108 PID 3384 wrote to memory of 4696 3384 saves.exe 108 PID 3384 wrote to memory of 4696 3384 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe"C:\Users\Admin\AppData\Local\Temp\3d34f95f7922295c5cdc33c0f827ab24154673a63f41c1dd7fdc4578e84b792b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1563035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1563035.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6926697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6926697.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0792875.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0792875.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0382073.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0382073.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5220303.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5220303.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:60
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3828
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1123165.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1123165.exe4⤵
- Executes dropped EXE
PID:2076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4844
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5e8f7b7d02cfbe379a0e653391244bc06
SHA14568a28e265e2461d6f0c47c9513768212ea5ac9
SHA256d6972545052d116651abe7668176cf6049cf4c4116fca72470c7765075deaf4e
SHA5121fd85307824748124351dcffdc4edfb3ca3222fd37b1071488c26a14d4fade26f04f6437654d0131cc8bdaf10867d0c13196ac3812af34f92a69514a594e9305
-
Filesize
599KB
MD5e8f7b7d02cfbe379a0e653391244bc06
SHA14568a28e265e2461d6f0c47c9513768212ea5ac9
SHA256d6972545052d116651abe7668176cf6049cf4c4116fca72470c7765075deaf4e
SHA5121fd85307824748124351dcffdc4edfb3ca3222fd37b1071488c26a14d4fade26f04f6437654d0131cc8bdaf10867d0c13196ac3812af34f92a69514a594e9305
-
Filesize
433KB
MD5fd07e5897649d6676f7bfb1b0fe793f3
SHA1ff043985024bb37a4597a57d8b5099b2dbeb2e5c
SHA256b5776fcd3a4b24752ed7d8d031edfe860cac0101d83af22c61e9e233e2a5a769
SHA51288cafb3002ee6b2bbf67c5982d17cbdaaea83925922c5ecb96882d5ad95f317e4f1b8cdab3bd844e207efab0f55cf1735b1cb37a61ab15fa8351949697e8e12f
-
Filesize
433KB
MD5fd07e5897649d6676f7bfb1b0fe793f3
SHA1ff043985024bb37a4597a57d8b5099b2dbeb2e5c
SHA256b5776fcd3a4b24752ed7d8d031edfe860cac0101d83af22c61e9e233e2a5a769
SHA51288cafb3002ee6b2bbf67c5982d17cbdaaea83925922c5ecb96882d5ad95f317e4f1b8cdab3bd844e207efab0f55cf1735b1cb37a61ab15fa8351949697e8e12f
-
Filesize
174KB
MD51e66e60e7f2e883a1fea7b3a7b3101bc
SHA185fda573c722cdfbff16f77cff450312f9c66fd3
SHA2565fd32aeac8c0102c8c439b9a22103d3ed1b6013bfdeb864b71c360c3ea37c046
SHA5127495b1cdbcd26af184752f97b238363520a35c9c15a6e670754a1163ddc7a33a7c889c96dd131837dfc46940428e7a092545a28bc038100ec1056997afa5b88c
-
Filesize
174KB
MD51e66e60e7f2e883a1fea7b3a7b3101bc
SHA185fda573c722cdfbff16f77cff450312f9c66fd3
SHA2565fd32aeac8c0102c8c439b9a22103d3ed1b6013bfdeb864b71c360c3ea37c046
SHA5127495b1cdbcd26af184752f97b238363520a35c9c15a6e670754a1163ddc7a33a7c889c96dd131837dfc46940428e7a092545a28bc038100ec1056997afa5b88c
-
Filesize
277KB
MD5a4892906022bb7a1b4bfc46a437ad74a
SHA19b1f4360921494a47cd32924db02a648539a4562
SHA25671e58c30b1e6527bb569f13be674619660104208c124cc9be26c524fc300fa27
SHA512db5307730aeab58c3ff7c052de941b2e9e2333a27e3112c77f705ca4b4794c9177694daa90d6b7c0482f614316385b049ec91589a8df6fe448f3366a52ab18dc
-
Filesize
277KB
MD5a4892906022bb7a1b4bfc46a437ad74a
SHA19b1f4360921494a47cd32924db02a648539a4562
SHA25671e58c30b1e6527bb569f13be674619660104208c124cc9be26c524fc300fa27
SHA512db5307730aeab58c3ff7c052de941b2e9e2333a27e3112c77f705ca4b4794c9177694daa90d6b7c0482f614316385b049ec91589a8df6fe448f3366a52ab18dc
-
Filesize
14KB
MD55bcdc02c7afb1601aa58b1489fc20d60
SHA142ec56b5ad7a4fa4770093ad260b5edca908d774
SHA2569c59fab30d189bd481e7e1bcb45a87a6c7f73ac3ab5be87966ac2d0bd5ce9dbc
SHA5120f9312b88f23bac2f0b0d9e26d2a3b312497d6ffc482677632d3ffb79312147435b718eec342682b2afa00be9b315b521554442cef759e10ba6e91c47a5ad326
-
Filesize
14KB
MD55bcdc02c7afb1601aa58b1489fc20d60
SHA142ec56b5ad7a4fa4770093ad260b5edca908d774
SHA2569c59fab30d189bd481e7e1bcb45a87a6c7f73ac3ab5be87966ac2d0bd5ce9dbc
SHA5120f9312b88f23bac2f0b0d9e26d2a3b312497d6ffc482677632d3ffb79312147435b718eec342682b2afa00be9b315b521554442cef759e10ba6e91c47a5ad326
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
320KB
MD5373f5742d7ad652a108536082ede2fd2
SHA11b25ec54fee5f9c41e453cddeffd0159dd89c341
SHA256aaf3d5c7950d120b168a70d35e571fb304542e67b6aaa6b4385ee4556a889ea7
SHA512dff91330b9e5e0afff520a845098eb03358d8a9885a5e67cd9902100527dd0024979028313c5e5f59399971c1a3d729070dd49756acc0f90a85ccae01f11acdd
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7