Analysis
-
max time kernel
275s -
max time network
292s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
x8752242.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
x8752242.exe
Resource
win10-20230703-en
General
-
Target
x8752242.exe
-
Size
433KB
-
MD5
2d259bdc5c80bef339c2a950c4a1acf4
-
SHA1
9d9d7ba31fdab4538fb333bc729908804426bf27
-
SHA256
50a3faf24c02b75c312b8ec117e2dc78cae98eb0e609978dd9f8cdd8239222c8
-
SHA512
6aaa351e6d68fe2dca18f4521ab214f7035468653ea84b13633b33c88d4042c58594bc73c8b99dd749f51d57bbd6e1ec1e4400939723084db0cf191128d094b6
-
SSDEEP
12288:nMrGy90f1AitEbwtmPOWZ347R+Ag3k5VNc:Jywxt04a2w3k5E
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000001b075-11.dat healer behavioral2/files/0x000700000001b075-13.dat healer behavioral2/memory/1724-14-0x0000000000030000-0x000000000003A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5684239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5684239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5684239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5684239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5684239.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1544 x2212717.exe 1724 g5684239.exe 4340 h7268411.exe 4016 saves.exe 2368 i9752058.exe 308 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3380 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5684239.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x8752242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2212717.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 g5684239.exe 1724 g5684239.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 g5684239.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1544 1856 x8752242.exe 70 PID 1856 wrote to memory of 1544 1856 x8752242.exe 70 PID 1856 wrote to memory of 1544 1856 x8752242.exe 70 PID 1544 wrote to memory of 1724 1544 x2212717.exe 71 PID 1544 wrote to memory of 1724 1544 x2212717.exe 71 PID 1544 wrote to memory of 4340 1544 x2212717.exe 72 PID 1544 wrote to memory of 4340 1544 x2212717.exe 72 PID 1544 wrote to memory of 4340 1544 x2212717.exe 72 PID 4340 wrote to memory of 4016 4340 h7268411.exe 73 PID 4340 wrote to memory of 4016 4340 h7268411.exe 73 PID 4340 wrote to memory of 4016 4340 h7268411.exe 73 PID 1856 wrote to memory of 2368 1856 x8752242.exe 74 PID 1856 wrote to memory of 2368 1856 x8752242.exe 74 PID 1856 wrote to memory of 2368 1856 x8752242.exe 74 PID 4016 wrote to memory of 4880 4016 saves.exe 75 PID 4016 wrote to memory of 4880 4016 saves.exe 75 PID 4016 wrote to memory of 4880 4016 saves.exe 75 PID 4016 wrote to memory of 1132 4016 saves.exe 77 PID 4016 wrote to memory of 1132 4016 saves.exe 77 PID 4016 wrote to memory of 1132 4016 saves.exe 77 PID 1132 wrote to memory of 4412 1132 cmd.exe 79 PID 1132 wrote to memory of 4412 1132 cmd.exe 79 PID 1132 wrote to memory of 4412 1132 cmd.exe 79 PID 1132 wrote to memory of 3384 1132 cmd.exe 80 PID 1132 wrote to memory of 3384 1132 cmd.exe 80 PID 1132 wrote to memory of 3384 1132 cmd.exe 80 PID 1132 wrote to memory of 4184 1132 cmd.exe 83 PID 1132 wrote to memory of 4184 1132 cmd.exe 83 PID 1132 wrote to memory of 4184 1132 cmd.exe 83 PID 1132 wrote to memory of 4384 1132 cmd.exe 81 PID 1132 wrote to memory of 4384 1132 cmd.exe 81 PID 1132 wrote to memory of 4384 1132 cmd.exe 81 PID 1132 wrote to memory of 3436 1132 cmd.exe 82 PID 1132 wrote to memory of 3436 1132 cmd.exe 82 PID 1132 wrote to memory of 3436 1132 cmd.exe 82 PID 1132 wrote to memory of 3156 1132 cmd.exe 84 PID 1132 wrote to memory of 3156 1132 cmd.exe 84 PID 1132 wrote to memory of 3156 1132 cmd.exe 84 PID 4016 wrote to memory of 3380 4016 saves.exe 86 PID 4016 wrote to memory of 3380 4016 saves.exe 86 PID 4016 wrote to memory of 3380 4016 saves.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\x8752242.exe"C:\Users\Admin\AppData\Local\Temp\x8752242.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2212717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2212717.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5684239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5684239.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7268411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7268411.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Creates scheduled task(s)
PID:4880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:3384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:3436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:4184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:3156
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9752058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9752058.exe2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD56fd9eef7f1ce4424c3bfc9a9fc0f2736
SHA15c1ac752828cc5121d2fdc2ec1ce36f547691fc3
SHA256bdd694d0acec1e4d349c2bee75a5873379f7e9f9e74c300d0abcbb4abc447fb4
SHA5122b09aa3414e4fcd26534aecf75f930207e8dbb1cbf3a863a065240d3f165ef10d9f986379bc19326cab6faa1e06a082ab36e579775b90f5c4ddda6485ef0cde7
-
Filesize
174KB
MD56fd9eef7f1ce4424c3bfc9a9fc0f2736
SHA15c1ac752828cc5121d2fdc2ec1ce36f547691fc3
SHA256bdd694d0acec1e4d349c2bee75a5873379f7e9f9e74c300d0abcbb4abc447fb4
SHA5122b09aa3414e4fcd26534aecf75f930207e8dbb1cbf3a863a065240d3f165ef10d9f986379bc19326cab6faa1e06a082ab36e579775b90f5c4ddda6485ef0cde7
-
Filesize
277KB
MD5f0b6d19dd371b60c98b0e3eb7a8603cc
SHA1dddba3b8e4766efe9ff40d7e2d6ba8f847ba5391
SHA256ed103182644fdae06f32f9f31da6b72ccf11e0ed33a568e0e29f9b4bed75a302
SHA5127bb1576aa1efa99d13c2d401288303ebb0c2aea05bb6eb5931b73bc00b79c165249bc7e927e03ca610fa8b578cf300a6034230ce8aaf0c9e28b672fa0a7820ff
-
Filesize
277KB
MD5f0b6d19dd371b60c98b0e3eb7a8603cc
SHA1dddba3b8e4766efe9ff40d7e2d6ba8f847ba5391
SHA256ed103182644fdae06f32f9f31da6b72ccf11e0ed33a568e0e29f9b4bed75a302
SHA5127bb1576aa1efa99d13c2d401288303ebb0c2aea05bb6eb5931b73bc00b79c165249bc7e927e03ca610fa8b578cf300a6034230ce8aaf0c9e28b672fa0a7820ff
-
Filesize
14KB
MD5f3622b7c624ad8076d9b3af8d5fcaaaa
SHA1d0071a78cc3292691928591c8a37a044238a05f4
SHA25651d98453f1211582d43c0d88926f0c9d7de0224f0efa636c823da78972f9714a
SHA512e301f7095c9978b1b6e93b657bdab02ed75493774fe487fe9f3554a43ce6e302e362a733fe75f3b1187163c0167564d3071939db09b68defc97639b8f8d4b7fe
-
Filesize
14KB
MD5f3622b7c624ad8076d9b3af8d5fcaaaa
SHA1d0071a78cc3292691928591c8a37a044238a05f4
SHA25651d98453f1211582d43c0d88926f0c9d7de0224f0efa636c823da78972f9714a
SHA512e301f7095c9978b1b6e93b657bdab02ed75493774fe487fe9f3554a43ce6e302e362a733fe75f3b1187163c0167564d3071939db09b68defc97639b8f8d4b7fe
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
319KB
MD50e5e11f5c3c9a8737fc41a01c317080f
SHA1138a662b0bd02f532a9791fc055db6d32a0d25ba
SHA2569c0f248446a0d8fd7c3f356c1deb0821de1e8abff1168f04f3e477d377087404
SHA512f7a82199b6db1c4b901e290306646ad10e5e9a87732f0a2fc6478fe17ddd2360438476048018f6f485864b91a891dcfbc398d714c888d9ffb1ce825d8e4e6956
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b