Analysis
-
max time kernel
276s -
max time network
291s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe
Resource
win10-20230703-en
General
-
Target
b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe
-
Size
705KB
-
MD5
096e0fb6fb14a6549d25433207e78be9
-
SHA1
d7e97ea3172215d7c0b0b0a1bb602fc7a1308199
-
SHA256
b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed
-
SHA512
79308b713e6ee61fb3049e24f14b70688f0ee4cc52d5e3724f1810d31e2b6f6b34709a3754e5cfaf91ba2e7725905f8f3bdfa59a83f5437249f821268f9447ab
-
SSDEEP
12288:RMrdy90FH2LitlS+USYiHgWyuPOgKYiegdRVSxmtjsshLw:wy+3tM+VbPOYwtph0
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000001b02b-26.dat healer behavioral2/files/0x000700000001b02b-27.dat healer behavioral2/memory/3936-28-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4271088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4271088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4271088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4271088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4271088.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1144 x6728851.exe 3004 x8989442.exe 3292 x2244072.exe 3936 g4271088.exe 2560 h5961095.exe 2420 saves.exe 4996 i3615382.exe 4716 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4340 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4271088.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6728851.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8989442.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2244072.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3936 g4271088.exe 3936 g4271088.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3936 g4271088.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1144 2304 b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe 70 PID 2304 wrote to memory of 1144 2304 b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe 70 PID 2304 wrote to memory of 1144 2304 b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe 70 PID 1144 wrote to memory of 3004 1144 x6728851.exe 71 PID 1144 wrote to memory of 3004 1144 x6728851.exe 71 PID 1144 wrote to memory of 3004 1144 x6728851.exe 71 PID 3004 wrote to memory of 3292 3004 x8989442.exe 72 PID 3004 wrote to memory of 3292 3004 x8989442.exe 72 PID 3004 wrote to memory of 3292 3004 x8989442.exe 72 PID 3292 wrote to memory of 3936 3292 x2244072.exe 73 PID 3292 wrote to memory of 3936 3292 x2244072.exe 73 PID 3292 wrote to memory of 2560 3292 x2244072.exe 74 PID 3292 wrote to memory of 2560 3292 x2244072.exe 74 PID 3292 wrote to memory of 2560 3292 x2244072.exe 74 PID 2560 wrote to memory of 2420 2560 h5961095.exe 75 PID 2560 wrote to memory of 2420 2560 h5961095.exe 75 PID 2560 wrote to memory of 2420 2560 h5961095.exe 75 PID 3004 wrote to memory of 4996 3004 x8989442.exe 76 PID 3004 wrote to memory of 4996 3004 x8989442.exe 76 PID 3004 wrote to memory of 4996 3004 x8989442.exe 76 PID 2420 wrote to memory of 4952 2420 saves.exe 77 PID 2420 wrote to memory of 4952 2420 saves.exe 77 PID 2420 wrote to memory of 4952 2420 saves.exe 77 PID 2420 wrote to memory of 2132 2420 saves.exe 79 PID 2420 wrote to memory of 2132 2420 saves.exe 79 PID 2420 wrote to memory of 2132 2420 saves.exe 79 PID 2132 wrote to memory of 2612 2132 cmd.exe 81 PID 2132 wrote to memory of 2612 2132 cmd.exe 81 PID 2132 wrote to memory of 2612 2132 cmd.exe 81 PID 2132 wrote to memory of 4324 2132 cmd.exe 82 PID 2132 wrote to memory of 4324 2132 cmd.exe 82 PID 2132 wrote to memory of 4324 2132 cmd.exe 82 PID 2132 wrote to memory of 5060 2132 cmd.exe 83 PID 2132 wrote to memory of 5060 2132 cmd.exe 83 PID 2132 wrote to memory of 5060 2132 cmd.exe 83 PID 2132 wrote to memory of 4464 2132 cmd.exe 84 PID 2132 wrote to memory of 4464 2132 cmd.exe 84 PID 2132 wrote to memory of 4464 2132 cmd.exe 84 PID 2132 wrote to memory of 4668 2132 cmd.exe 85 PID 2132 wrote to memory of 4668 2132 cmd.exe 85 PID 2132 wrote to memory of 4668 2132 cmd.exe 85 PID 2132 wrote to memory of 5052 2132 cmd.exe 86 PID 2132 wrote to memory of 5052 2132 cmd.exe 86 PID 2132 wrote to memory of 5052 2132 cmd.exe 86 PID 2420 wrote to memory of 4340 2420 saves.exe 88 PID 2420 wrote to memory of 4340 2420 saves.exe 88 PID 2420 wrote to memory of 4340 2420 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe"C:\Users\Admin\AppData\Local\Temp\b2417434ec0f47057c3b2ee6d9100361e85e3cb5eb98e5d7bfdcfceee817b5ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6728851.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8989442.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2244072.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4271088.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5961095.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5052
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4340
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3615382.exe4⤵
- Executes dropped EXE
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD555774feb7d21d1a8b160af5366d85dee
SHA1ea0b09b704aab794870645313f161f5bf1fd627a
SHA2564b8efb81b85fd8f51b5439dea738987b7a07eb4ef2d9e225ddc7f497398c2d8b
SHA51236587ea4412c9e2125066d77dab7d8cf3df97bb77f7490216f589584294cf6667f1f79fa2d7c6b03e7364462e08b0a1968a6548d64cf6b9eb2968649f2fd3d5d
-
Filesize
599KB
MD555774feb7d21d1a8b160af5366d85dee
SHA1ea0b09b704aab794870645313f161f5bf1fd627a
SHA2564b8efb81b85fd8f51b5439dea738987b7a07eb4ef2d9e225ddc7f497398c2d8b
SHA51236587ea4412c9e2125066d77dab7d8cf3df97bb77f7490216f589584294cf6667f1f79fa2d7c6b03e7364462e08b0a1968a6548d64cf6b9eb2968649f2fd3d5d
-
Filesize
433KB
MD59c1a534885656247e94833e240709ba2
SHA16a26448c60aa5cfe4d8f7fef26a77b3e135c9c81
SHA256daded14287befabdb83403db00c010f0bb79c4de5ddaec9acb8595331e8157c8
SHA5129cc3977592cd87e56d6c03bcd6e6bf6d879fc72bdb20a7cf30beec6e9b4420302481e35648dbf0de6fe6ba7322369d0ccd3286df3f4fcb2b70625850007dfa81
-
Filesize
433KB
MD59c1a534885656247e94833e240709ba2
SHA16a26448c60aa5cfe4d8f7fef26a77b3e135c9c81
SHA256daded14287befabdb83403db00c010f0bb79c4de5ddaec9acb8595331e8157c8
SHA5129cc3977592cd87e56d6c03bcd6e6bf6d879fc72bdb20a7cf30beec6e9b4420302481e35648dbf0de6fe6ba7322369d0ccd3286df3f4fcb2b70625850007dfa81
-
Filesize
175KB
MD5749eafc6127cf515e18e9398ef3ed88d
SHA175f0c35515db4cbf03ce09bb544281537680093e
SHA2562d208da9fe2c015505ae7dfe2f9992899cabac1eae39aecdda2941aa452eacdd
SHA512dee45038c65a9a239f63a1e21f5fe868bdf7019cd9676b8789d088c490abcd83bb845ee93e4215f44ea3145de28edf65f54efa085b8eabe1dbfb408568885b54
-
Filesize
175KB
MD5749eafc6127cf515e18e9398ef3ed88d
SHA175f0c35515db4cbf03ce09bb544281537680093e
SHA2562d208da9fe2c015505ae7dfe2f9992899cabac1eae39aecdda2941aa452eacdd
SHA512dee45038c65a9a239f63a1e21f5fe868bdf7019cd9676b8789d088c490abcd83bb845ee93e4215f44ea3145de28edf65f54efa085b8eabe1dbfb408568885b54
-
Filesize
277KB
MD56787e5f8a3ff1aac065e7eb4c05c771b
SHA1f86acc9d1f8b26030b503de8341fa1cc0d10bfc9
SHA25691cdbef701b1e0be1e5905d81bb9e0764e911b25d98760b94b1ded96bee37d0d
SHA512188fdd1e2b39e928e1246c92804479df491f5aaa82e656f0259ef56167a7f6106b7d2e96134fa4f4bd0a63d662118767587daa64a2bd410abfcf4da510e5a5f6
-
Filesize
277KB
MD56787e5f8a3ff1aac065e7eb4c05c771b
SHA1f86acc9d1f8b26030b503de8341fa1cc0d10bfc9
SHA25691cdbef701b1e0be1e5905d81bb9e0764e911b25d98760b94b1ded96bee37d0d
SHA512188fdd1e2b39e928e1246c92804479df491f5aaa82e656f0259ef56167a7f6106b7d2e96134fa4f4bd0a63d662118767587daa64a2bd410abfcf4da510e5a5f6
-
Filesize
14KB
MD54ad29a92a1bcc7ecf2bbe6121f0f6866
SHA18ea1fe5df778d21bd053f0f285c0aaa9fa7a316c
SHA256a543fde09f7b81f936b05ad389c9576541d531183cfb1d6e809c3b95aabbae47
SHA512ddbb0d86c3356488cfa330aac4e8746d1e8085c3ef36a74b03effb3a8875e2fe00c768bec33b08c94d529a42590d9808651f191c4520bf5366c786e0695f6a4b
-
Filesize
14KB
MD54ad29a92a1bcc7ecf2bbe6121f0f6866
SHA18ea1fe5df778d21bd053f0f285c0aaa9fa7a316c
SHA256a543fde09f7b81f936b05ad389c9576541d531183cfb1d6e809c3b95aabbae47
SHA512ddbb0d86c3356488cfa330aac4e8746d1e8085c3ef36a74b03effb3a8875e2fe00c768bec33b08c94d529a42590d9808651f191c4520bf5366c786e0695f6a4b
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
321KB
MD51a3c3e15ed6ac1778fdc2e620de5cc50
SHA1df628c751b184b7a5e9d38003b28e305db660358
SHA2560021ae84a5764c2160a15fcd8745bb18ecc6724948a27507c5ca2017c37e7588
SHA5125c98482fee20a24dca2f65b68efc434d9e9061ee57a84dc94b14cb41be3918872132c05bb60e560398a128e18798ea3a0bc8868e5846a02e09d6821597421063
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b