Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe
Resource
win10-20230703-en
General
-
Target
9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe
-
Size
704KB
-
MD5
5a03b3cc2511a1bf9997d576bb5e483c
-
SHA1
ab8f628199ec5b2bf670882d127e04c4ba4fc49b
-
SHA256
9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf
-
SHA512
bbee45bcd672250118f6cc78400ea35027a759d45b3f6bab602a7eee9a0f261ad0fbd7e3a7c9eca45ae6e4a4b0408ca98db8eea89923306a5da26dcc1bda898d
-
SSDEEP
12288:YMrJy90Dk/88csqWLqpaTwooOSDImowk/14bJpa3WyYMCAe:Rywk/KNzpKsDhg/1oaGYe
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b031-26.dat healer behavioral1/files/0x000700000001b031-27.dat healer behavioral1/memory/3976-28-0x00000000001B0000-0x00000000001BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3565502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3565502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3565502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3565502.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3565502.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b02f-42.dat family_redline behavioral1/files/0x000600000001b02f-43.dat family_redline behavioral1/memory/4464-44-0x0000000000A80000-0x0000000000AB0000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 3536 x1280475.exe 4520 x6809949.exe 4012 x9801625.exe 3976 g3565502.exe 3800 h8349790.exe 3940 saves.exe 4464 i9142016.exe 4468 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4756 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g3565502.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1280475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6809949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9801625.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3976 g3565502.exe 3976 g3565502.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3976 g3565502.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3536 4144 9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe 70 PID 4144 wrote to memory of 3536 4144 9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe 70 PID 4144 wrote to memory of 3536 4144 9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe 70 PID 3536 wrote to memory of 4520 3536 x1280475.exe 71 PID 3536 wrote to memory of 4520 3536 x1280475.exe 71 PID 3536 wrote to memory of 4520 3536 x1280475.exe 71 PID 4520 wrote to memory of 4012 4520 x6809949.exe 72 PID 4520 wrote to memory of 4012 4520 x6809949.exe 72 PID 4520 wrote to memory of 4012 4520 x6809949.exe 72 PID 4012 wrote to memory of 3976 4012 x9801625.exe 73 PID 4012 wrote to memory of 3976 4012 x9801625.exe 73 PID 4012 wrote to memory of 3800 4012 x9801625.exe 74 PID 4012 wrote to memory of 3800 4012 x9801625.exe 74 PID 4012 wrote to memory of 3800 4012 x9801625.exe 74 PID 3800 wrote to memory of 3940 3800 h8349790.exe 75 PID 3800 wrote to memory of 3940 3800 h8349790.exe 75 PID 3800 wrote to memory of 3940 3800 h8349790.exe 75 PID 4520 wrote to memory of 4464 4520 x6809949.exe 76 PID 4520 wrote to memory of 4464 4520 x6809949.exe 76 PID 4520 wrote to memory of 4464 4520 x6809949.exe 76 PID 3940 wrote to memory of 680 3940 saves.exe 77 PID 3940 wrote to memory of 680 3940 saves.exe 77 PID 3940 wrote to memory of 680 3940 saves.exe 77 PID 3940 wrote to memory of 4296 3940 saves.exe 79 PID 3940 wrote to memory of 4296 3940 saves.exe 79 PID 3940 wrote to memory of 4296 3940 saves.exe 79 PID 4296 wrote to memory of 676 4296 cmd.exe 81 PID 4296 wrote to memory of 676 4296 cmd.exe 81 PID 4296 wrote to memory of 676 4296 cmd.exe 81 PID 4296 wrote to memory of 536 4296 cmd.exe 82 PID 4296 wrote to memory of 536 4296 cmd.exe 82 PID 4296 wrote to memory of 536 4296 cmd.exe 82 PID 4296 wrote to memory of 2092 4296 cmd.exe 83 PID 4296 wrote to memory of 2092 4296 cmd.exe 83 PID 4296 wrote to memory of 2092 4296 cmd.exe 83 PID 4296 wrote to memory of 1544 4296 cmd.exe 84 PID 4296 wrote to memory of 1544 4296 cmd.exe 84 PID 4296 wrote to memory of 1544 4296 cmd.exe 84 PID 4296 wrote to memory of 3652 4296 cmd.exe 85 PID 4296 wrote to memory of 3652 4296 cmd.exe 85 PID 4296 wrote to memory of 3652 4296 cmd.exe 85 PID 4296 wrote to memory of 220 4296 cmd.exe 86 PID 4296 wrote to memory of 220 4296 cmd.exe 86 PID 4296 wrote to memory of 220 4296 cmd.exe 86 PID 3940 wrote to memory of 4756 3940 saves.exe 88 PID 3940 wrote to memory of 4756 3940 saves.exe 88 PID 3940 wrote to memory of 4756 3940 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe"C:\Users\Admin\AppData\Local\Temp\9fb460f55936c905500b39d089f2465d23766d536e032c60aa21b74d627c37bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6809949.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6809949.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9801625.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9801625.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3565502.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3565502.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8349790.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8349790.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:220
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9142016.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9142016.exe4⤵
- Executes dropped EXE
PID:4464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD592b711eea000af7769532930dcbcb156
SHA1b0d2553dcd91dc1f329374adcc32bf10e0d15f26
SHA256dabf571ec7c14cc943757f3da035a07f5abfcaa62248e500772979227f4a6370
SHA51231d0acdd921c34c4cc3fbe5db6e57381c2074c6ba38daa2c12e1520aabc2672e6cf9b521e60ee3e5b645583c7c4aa96bfaf0be8ce4665c2f048fc747a334fc77
-
Filesize
599KB
MD592b711eea000af7769532930dcbcb156
SHA1b0d2553dcd91dc1f329374adcc32bf10e0d15f26
SHA256dabf571ec7c14cc943757f3da035a07f5abfcaa62248e500772979227f4a6370
SHA51231d0acdd921c34c4cc3fbe5db6e57381c2074c6ba38daa2c12e1520aabc2672e6cf9b521e60ee3e5b645583c7c4aa96bfaf0be8ce4665c2f048fc747a334fc77
-
Filesize
433KB
MD509cd2437865573af797144e5cc53c577
SHA1b36b6d11febed125f6aefcf7150c066aaecb7a06
SHA256a257053534ee6a6b211ef1adedf5bc879d2d84e8513c30a970968408ea72bce5
SHA512e7c4a8971bad53e55cba989697345cbf0ce99680e593ab3267e79cf91642392cb15671dcb5fa9fa68909ee385b626d6dec4f2b59e76de039368870fc1fde5c63
-
Filesize
433KB
MD509cd2437865573af797144e5cc53c577
SHA1b36b6d11febed125f6aefcf7150c066aaecb7a06
SHA256a257053534ee6a6b211ef1adedf5bc879d2d84e8513c30a970968408ea72bce5
SHA512e7c4a8971bad53e55cba989697345cbf0ce99680e593ab3267e79cf91642392cb15671dcb5fa9fa68909ee385b626d6dec4f2b59e76de039368870fc1fde5c63
-
Filesize
173KB
MD56839400ac7c56063142bb36dcaa52592
SHA1ed203de10e70628807c1839e8d54661315c85c51
SHA256da7b1c8dc07d3d54305888392235d4498da6456172a726c5a45239a0f9f6578a
SHA5128aa3bc04dbb052af7a0495c1def38883b673648cc83427230242e881839f55d82838679a692004d8db54c726d1b298a08faa4c0330987db4542c42ec750e6471
-
Filesize
173KB
MD56839400ac7c56063142bb36dcaa52592
SHA1ed203de10e70628807c1839e8d54661315c85c51
SHA256da7b1c8dc07d3d54305888392235d4498da6456172a726c5a45239a0f9f6578a
SHA5128aa3bc04dbb052af7a0495c1def38883b673648cc83427230242e881839f55d82838679a692004d8db54c726d1b298a08faa4c0330987db4542c42ec750e6471
-
Filesize
277KB
MD516a23a856c7d115ab0f02ecbe63f2e53
SHA116189dae6f1dae9a348441e8a197341366b56e55
SHA256b4711d2f75ee681990cb57975bb9bb949dd7d85a0edf5c3fe8ce2ec27ea53e2d
SHA5123174841a785fd505b2ffac6911e9ad31d269da011de2b8b26cbe3d707fad35e4c9bb79dfef7c6ee5e9f648e2d66e02c8030c77ac338e4c19c33e4ba5dca45bf4
-
Filesize
277KB
MD516a23a856c7d115ab0f02ecbe63f2e53
SHA116189dae6f1dae9a348441e8a197341366b56e55
SHA256b4711d2f75ee681990cb57975bb9bb949dd7d85a0edf5c3fe8ce2ec27ea53e2d
SHA5123174841a785fd505b2ffac6911e9ad31d269da011de2b8b26cbe3d707fad35e4c9bb79dfef7c6ee5e9f648e2d66e02c8030c77ac338e4c19c33e4ba5dca45bf4
-
Filesize
15KB
MD57e0007d8bf468aa1c02444829bcaeff1
SHA1e0c31aad8d8883d402a65a9fbb05e964506229fc
SHA256313a92e5dd4decba59eb238bfd5a4524d2c6a105b9c1fb6c1ec4ee3788790118
SHA5125e169e7f9e713e2729036fcae1d6540456795bdf456809879d87b5bbaee44d96959412f443fa2acfd21389e057ff3e8deb1a79fddf56262649c3e0f97f8455f4
-
Filesize
15KB
MD57e0007d8bf468aa1c02444829bcaeff1
SHA1e0c31aad8d8883d402a65a9fbb05e964506229fc
SHA256313a92e5dd4decba59eb238bfd5a4524d2c6a105b9c1fb6c1ec4ee3788790118
SHA5125e169e7f9e713e2729036fcae1d6540456795bdf456809879d87b5bbaee44d96959412f443fa2acfd21389e057ff3e8deb1a79fddf56262649c3e0f97f8455f4
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
321KB
MD500723d94a56dbfe37e70bafb238bcf78
SHA19f6a7903e94a1ab57381feb244acb19675101700
SHA256ff056cda2770d3f6f5f52b160d62c6fd67296510474aec347cf2a6a41ecce9b5
SHA51291e2320ca74410c52b7e3e2c225907ad51cab1950f0d362e4761dfd1d6811cd046c2338b754381b46ea5584b78d0b61bd3d909ca1ad848e80ebdf0331218dc7e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b