Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28-08-2023 03:42
Static task
static1
Behavioral task
behavioral1
Sample
6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe
Resource
win10-20230703-en
General
-
Target
6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe
-
Size
705KB
-
MD5
006700caa601d5f0e8d844ec5e16de9c
-
SHA1
5aa5b253fe0ad83419d2a1ee094655bf25888c7e
-
SHA256
6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9
-
SHA512
762f325c48e93b99f66a3ca765b309fd11a53faff6bde0cf6e4782d3ef78e7871d373beaf71d4be7232134bba604e12763d3b056d43b669fc7a2fee958da7918
-
SSDEEP
12288:LMrVy902p2dVKnFnc47j1QuPaWmlVI/FD7HfqbroE2Gw8bQjLvcjio:myf2dVIncGpQuaWKG/FD7HSbroUw3LkN
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afe6-26.dat healer behavioral1/files/0x000700000001afe6-27.dat healer behavioral1/memory/3000-28-0x00000000006C0000-0x00000000006CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9885654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9885654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9885654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9885654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9885654.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2768 x0087188.exe 3848 x7736184.exe 4536 x4156903.exe 3000 g9885654.exe 4860 h6869527.exe 3116 saves.exe 4408 i5927149.exe 3284 saves.exe 5040 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9885654.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0087188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7736184.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4156903.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 g9885654.exe 3000 g9885654.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 g9885654.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2768 2504 6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe 69 PID 2504 wrote to memory of 2768 2504 6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe 69 PID 2504 wrote to memory of 2768 2504 6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe 69 PID 2768 wrote to memory of 3848 2768 x0087188.exe 70 PID 2768 wrote to memory of 3848 2768 x0087188.exe 70 PID 2768 wrote to memory of 3848 2768 x0087188.exe 70 PID 3848 wrote to memory of 4536 3848 x7736184.exe 71 PID 3848 wrote to memory of 4536 3848 x7736184.exe 71 PID 3848 wrote to memory of 4536 3848 x7736184.exe 71 PID 4536 wrote to memory of 3000 4536 x4156903.exe 72 PID 4536 wrote to memory of 3000 4536 x4156903.exe 72 PID 4536 wrote to memory of 4860 4536 x4156903.exe 73 PID 4536 wrote to memory of 4860 4536 x4156903.exe 73 PID 4536 wrote to memory of 4860 4536 x4156903.exe 73 PID 4860 wrote to memory of 3116 4860 h6869527.exe 74 PID 4860 wrote to memory of 3116 4860 h6869527.exe 74 PID 4860 wrote to memory of 3116 4860 h6869527.exe 74 PID 3848 wrote to memory of 4408 3848 x7736184.exe 75 PID 3848 wrote to memory of 4408 3848 x7736184.exe 75 PID 3848 wrote to memory of 4408 3848 x7736184.exe 75 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 808 3116 saves.exe 77 PID 3116 wrote to memory of 808 3116 saves.exe 77 PID 3116 wrote to memory of 808 3116 saves.exe 77 PID 808 wrote to memory of 3124 808 cmd.exe 80 PID 808 wrote to memory of 3124 808 cmd.exe 80 PID 808 wrote to memory of 3124 808 cmd.exe 80 PID 808 wrote to memory of 2228 808 cmd.exe 81 PID 808 wrote to memory of 2228 808 cmd.exe 81 PID 808 wrote to memory of 2228 808 cmd.exe 81 PID 808 wrote to memory of 4376 808 cmd.exe 82 PID 808 wrote to memory of 4376 808 cmd.exe 82 PID 808 wrote to memory of 4376 808 cmd.exe 82 PID 808 wrote to memory of 2240 808 cmd.exe 83 PID 808 wrote to memory of 2240 808 cmd.exe 83 PID 808 wrote to memory of 2240 808 cmd.exe 83 PID 808 wrote to memory of 2636 808 cmd.exe 84 PID 808 wrote to memory of 2636 808 cmd.exe 84 PID 808 wrote to memory of 2636 808 cmd.exe 84 PID 808 wrote to memory of 2204 808 cmd.exe 85 PID 808 wrote to memory of 2204 808 cmd.exe 85 PID 808 wrote to memory of 2204 808 cmd.exe 85 PID 3116 wrote to memory of 2700 3116 saves.exe 87 PID 3116 wrote to memory of 2700 3116 saves.exe 87 PID 3116 wrote to memory of 2700 3116 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe"C:\Users\Admin\AppData\Local\Temp\6e48374784e68096862f6740211bfc151128e025d5df554e210170780341bdc9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0087188.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0087188.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7736184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7736184.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4156903.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4156903.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9885654.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9885654.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6869527.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6869527.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2204
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5927149.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5927149.exe4⤵
- Executes dropped EXE
PID:4408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3284
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD50411ddc59d106cbbe296c62de908405a
SHA196869dbc970dce31879cb56bd4cdf7adb9c94895
SHA2568bd744ae380f0e1fe2433724677aceb6b09c8b328cb80300ee418feef20daa03
SHA512cde3423167b833b7492dde7db118c8f4486483cb7f16841d69d6e9966c8ff8e64e00dd0d2d04c08285cdfa8e27c7ff3a5d87aae8ed06d6c3d1b7a5d58a04414f
-
Filesize
599KB
MD50411ddc59d106cbbe296c62de908405a
SHA196869dbc970dce31879cb56bd4cdf7adb9c94895
SHA2568bd744ae380f0e1fe2433724677aceb6b09c8b328cb80300ee418feef20daa03
SHA512cde3423167b833b7492dde7db118c8f4486483cb7f16841d69d6e9966c8ff8e64e00dd0d2d04c08285cdfa8e27c7ff3a5d87aae8ed06d6c3d1b7a5d58a04414f
-
Filesize
433KB
MD5bae1b4e8d3c4ccf66879b4535e61920a
SHA114c400d161e85c5f505ebe446f2edae728f9481b
SHA25674cfd58a8a15ce7db1918a23fc5408ca92433870a734fc892de239aec79814d7
SHA51274cf1f1bef90ecde9d475d95c662fe9916f5da6ea6a07b6ce11bc32f7284505ffe6ca3317abdc35f61af5213a6eb8a4e24c72c2b9511d3945243649b710c8037
-
Filesize
433KB
MD5bae1b4e8d3c4ccf66879b4535e61920a
SHA114c400d161e85c5f505ebe446f2edae728f9481b
SHA25674cfd58a8a15ce7db1918a23fc5408ca92433870a734fc892de239aec79814d7
SHA51274cf1f1bef90ecde9d475d95c662fe9916f5da6ea6a07b6ce11bc32f7284505ffe6ca3317abdc35f61af5213a6eb8a4e24c72c2b9511d3945243649b710c8037
-
Filesize
174KB
MD5a4dc332470d8a974efaa80c46d70bb1b
SHA1810008151dad641c749d12dab43ec946c97bf567
SHA25638a9624463f1f8f0899d14ec91321054e20a0a31a0142a079ed2e355d8b377ff
SHA512ce657ec64e0c7da0e239bce41a09adbd707ecf48250633412733f2c702129c902205a0e09f80c861cb10d75a73c865fc8dd17cb8a522928197706652e5751f88
-
Filesize
174KB
MD5a4dc332470d8a974efaa80c46d70bb1b
SHA1810008151dad641c749d12dab43ec946c97bf567
SHA25638a9624463f1f8f0899d14ec91321054e20a0a31a0142a079ed2e355d8b377ff
SHA512ce657ec64e0c7da0e239bce41a09adbd707ecf48250633412733f2c702129c902205a0e09f80c861cb10d75a73c865fc8dd17cb8a522928197706652e5751f88
-
Filesize
277KB
MD551363ba924644b1b3db04b06b01cbb09
SHA12ac9bacca4325ca0ea9c3291542743cf7fcd50ad
SHA25658a76833468b5b0a59a78866c122c9c7f0a115bd1ad6cae45c8b32564f07657f
SHA51261e5e6a4d0b561a5eaf047db0d70f61fc43335953b68e4d5a48cb79eec657c915dc3d15741e4a35f9b970c18c642b3e16c68f972e8e0eed059ceac011e5cb4c8
-
Filesize
277KB
MD551363ba924644b1b3db04b06b01cbb09
SHA12ac9bacca4325ca0ea9c3291542743cf7fcd50ad
SHA25658a76833468b5b0a59a78866c122c9c7f0a115bd1ad6cae45c8b32564f07657f
SHA51261e5e6a4d0b561a5eaf047db0d70f61fc43335953b68e4d5a48cb79eec657c915dc3d15741e4a35f9b970c18c642b3e16c68f972e8e0eed059ceac011e5cb4c8
-
Filesize
15KB
MD5c16b010dc5199ea3b4b0cebb2a0e33ac
SHA137ca66ed80e08966dfeb185c450b0e8df389f9dd
SHA25636920a4575cc936d8f772ca0542db7e999cc17f0f00e39638b4ceb4764dbec48
SHA512fa9223a498f54ca638454430090730dd15c71090668d68276c322904d6c84246cb0a5e257148b5fd3348ef79907502f4eef3ebfed22119acfbcb6064665d7d8c
-
Filesize
15KB
MD5c16b010dc5199ea3b4b0cebb2a0e33ac
SHA137ca66ed80e08966dfeb185c450b0e8df389f9dd
SHA25636920a4575cc936d8f772ca0542db7e999cc17f0f00e39638b4ceb4764dbec48
SHA512fa9223a498f54ca638454430090730dd15c71090668d68276c322904d6c84246cb0a5e257148b5fd3348ef79907502f4eef3ebfed22119acfbcb6064665d7d8c
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
323KB
MD5616f8ede14e1c99fcd44b81dd30186b6
SHA1c7ff609f49c6593e271b5b2ee6b02aab7c952b1b
SHA2563e3b0522e65330bef61178772ab007231e5c942dcc7ddeb39f6c420f5eba38a8
SHA512adabaafa15fe161d2f6d8d7c78ef6381835fc3aa7706ce2e4ce50a98afd12b77fae725f5df7e5c732167ea20100c85db1c85c07e672c87fca1f18439c4c6141e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b