Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
29-08-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe
Resource
win10-20230703-en
General
-
Target
8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe
-
Size
705KB
-
MD5
ea513423f3044938a32722643c1531c9
-
SHA1
f09fa54804f3e1a3a93c215f428c0c9cf8069794
-
SHA256
8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27
-
SHA512
cea10847525b5c0dbe9c20591a1e4831b21987b810e2de7c231224d0a3fb8a2ee2f5c4e592671a9467ab1b7e22e2e38402d9492f907260defd483c30770d4f71
-
SSDEEP
12288:hMrly90Ge3vLLtIN3ukiXfztF8aw1cTN/qu6bBDrhM:oyuXG3wPL6c5i9u
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af82-26.dat healer behavioral1/files/0x000700000001af82-27.dat healer behavioral1/memory/1508-28-0x0000000000480000-0x000000000048A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0682039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0682039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0682039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0682039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0682039.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 5044 x4514737.exe 1512 x1136301.exe 5012 x9716624.exe 1508 g0682039.exe 4232 h2606048.exe 2768 saves.exe 2228 i5644960.exe 4720 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3416 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0682039.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1136301.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9716624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4514737.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 g0682039.exe 1508 g0682039.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 g0682039.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4816 wrote to memory of 5044 4816 8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe 69 PID 4816 wrote to memory of 5044 4816 8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe 69 PID 4816 wrote to memory of 5044 4816 8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe 69 PID 5044 wrote to memory of 1512 5044 x4514737.exe 70 PID 5044 wrote to memory of 1512 5044 x4514737.exe 70 PID 5044 wrote to memory of 1512 5044 x4514737.exe 70 PID 1512 wrote to memory of 5012 1512 x1136301.exe 71 PID 1512 wrote to memory of 5012 1512 x1136301.exe 71 PID 1512 wrote to memory of 5012 1512 x1136301.exe 71 PID 5012 wrote to memory of 1508 5012 x9716624.exe 72 PID 5012 wrote to memory of 1508 5012 x9716624.exe 72 PID 5012 wrote to memory of 4232 5012 x9716624.exe 73 PID 5012 wrote to memory of 4232 5012 x9716624.exe 73 PID 5012 wrote to memory of 4232 5012 x9716624.exe 73 PID 4232 wrote to memory of 2768 4232 h2606048.exe 74 PID 4232 wrote to memory of 2768 4232 h2606048.exe 74 PID 4232 wrote to memory of 2768 4232 h2606048.exe 74 PID 1512 wrote to memory of 2228 1512 x1136301.exe 75 PID 1512 wrote to memory of 2228 1512 x1136301.exe 75 PID 1512 wrote to memory of 2228 1512 x1136301.exe 75 PID 2768 wrote to memory of 4840 2768 saves.exe 76 PID 2768 wrote to memory of 4840 2768 saves.exe 76 PID 2768 wrote to memory of 4840 2768 saves.exe 76 PID 2768 wrote to memory of 4968 2768 saves.exe 78 PID 2768 wrote to memory of 4968 2768 saves.exe 78 PID 2768 wrote to memory of 4968 2768 saves.exe 78 PID 4968 wrote to memory of 316 4968 cmd.exe 80 PID 4968 wrote to memory of 316 4968 cmd.exe 80 PID 4968 wrote to memory of 316 4968 cmd.exe 80 PID 4968 wrote to memory of 5000 4968 cmd.exe 81 PID 4968 wrote to memory of 5000 4968 cmd.exe 81 PID 4968 wrote to memory of 5000 4968 cmd.exe 81 PID 4968 wrote to memory of 1372 4968 cmd.exe 82 PID 4968 wrote to memory of 1372 4968 cmd.exe 82 PID 4968 wrote to memory of 1372 4968 cmd.exe 82 PID 4968 wrote to memory of 1476 4968 cmd.exe 83 PID 4968 wrote to memory of 1476 4968 cmd.exe 83 PID 4968 wrote to memory of 1476 4968 cmd.exe 83 PID 4968 wrote to memory of 3976 4968 cmd.exe 84 PID 4968 wrote to memory of 3976 4968 cmd.exe 84 PID 4968 wrote to memory of 3976 4968 cmd.exe 84 PID 4968 wrote to memory of 4224 4968 cmd.exe 85 PID 4968 wrote to memory of 4224 4968 cmd.exe 85 PID 4968 wrote to memory of 4224 4968 cmd.exe 85 PID 2768 wrote to memory of 3416 2768 saves.exe 87 PID 2768 wrote to memory of 3416 2768 saves.exe 87 PID 2768 wrote to memory of 3416 2768 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe"C:\Users\Admin\AppData\Local\Temp\8bb6b700ee4bf8e3b1b03d49c491eda8358b14e8a7b7c9aebf97310167497d27.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4514737.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4514737.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1136301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1136301.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9716624.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9716624.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0682039.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0682039.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2606048.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2606048.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:5000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3416
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5644960.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5644960.exe4⤵
- Executes dropped EXE
PID:2228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5dfeb71791e52cfb1b31c3182fbc7254c
SHA1629fd7e5d5db3756f29f3ea6db65ef75abfc67ff
SHA256fa9967ed6301d068b902915546d8eb2aa88beb9c376a509c9e7e65477d8c709f
SHA512977aa31a452d47ea2beadcb4358178ec9206c41a1aa7918b1940615b883444adef2301838ffc0fd1578ee1e41c1d425cd0b68f531b06ccdfbeb566d8fb274c58
-
Filesize
599KB
MD5dfeb71791e52cfb1b31c3182fbc7254c
SHA1629fd7e5d5db3756f29f3ea6db65ef75abfc67ff
SHA256fa9967ed6301d068b902915546d8eb2aa88beb9c376a509c9e7e65477d8c709f
SHA512977aa31a452d47ea2beadcb4358178ec9206c41a1aa7918b1940615b883444adef2301838ffc0fd1578ee1e41c1d425cd0b68f531b06ccdfbeb566d8fb274c58
-
Filesize
433KB
MD569afa46bc25dc6759af5912de2b93711
SHA127f535364119f9324e38c0e815ed70c49c638b90
SHA2566fa28cdfd81e4a9002908baaf3c1c450f4d80255d4fa4e57466d99e8962f0ec1
SHA512cfaae10baeb3bde7c15ddb2f8888269db3e010e64be056373f16e8c8c5d70ef1345d4db90eb02b4d36875dba700cb6717cc035d24838a48982ee87e80d015215
-
Filesize
433KB
MD569afa46bc25dc6759af5912de2b93711
SHA127f535364119f9324e38c0e815ed70c49c638b90
SHA2566fa28cdfd81e4a9002908baaf3c1c450f4d80255d4fa4e57466d99e8962f0ec1
SHA512cfaae10baeb3bde7c15ddb2f8888269db3e010e64be056373f16e8c8c5d70ef1345d4db90eb02b4d36875dba700cb6717cc035d24838a48982ee87e80d015215
-
Filesize
175KB
MD55b3766475545230096885085bc514364
SHA1c4421283f08eb04839af869ab0758b1f4d221f7c
SHA256f7b5a2beb14f1f2773c1d1001ebed6499134c7e8fbddfee42f207991403e36fe
SHA512112294bc7e700e226ef2126b627b6568d8c51690210bca1681c6a3ef80234865992fb8d21558f906e216737ab4da91b034fe1c8a9f1677807d4140fd6579080d
-
Filesize
175KB
MD55b3766475545230096885085bc514364
SHA1c4421283f08eb04839af869ab0758b1f4d221f7c
SHA256f7b5a2beb14f1f2773c1d1001ebed6499134c7e8fbddfee42f207991403e36fe
SHA512112294bc7e700e226ef2126b627b6568d8c51690210bca1681c6a3ef80234865992fb8d21558f906e216737ab4da91b034fe1c8a9f1677807d4140fd6579080d
-
Filesize
277KB
MD501d3c27f4a9785ee512590b0a435f7a0
SHA1df9f3ac02695a433f6feb396fc67ef9508edcf96
SHA256b1f5116cb34e6b33a6734b80986f6a81abc9694743e3114cd1addc647ef03a03
SHA512331356d2c14e57d5b95b1d8c61b9e388526a698e668efdfcb611e2396808ff436099489fe29070167112c6af6d55900089eb97f6e7a9683f5b913357cdf867a2
-
Filesize
277KB
MD501d3c27f4a9785ee512590b0a435f7a0
SHA1df9f3ac02695a433f6feb396fc67ef9508edcf96
SHA256b1f5116cb34e6b33a6734b80986f6a81abc9694743e3114cd1addc647ef03a03
SHA512331356d2c14e57d5b95b1d8c61b9e388526a698e668efdfcb611e2396808ff436099489fe29070167112c6af6d55900089eb97f6e7a9683f5b913357cdf867a2
-
Filesize
16KB
MD55046e0170e5bfff4dfde5404f140f4b0
SHA18b33fe908747657007cad96e4c26e740e41a87d7
SHA2563bc50f0f77a715f0bb83b3ea59e7a3deb3d1e3b7ce250c2c6dd8021497bacaf8
SHA5125e08d6ffd5e692d06d65a57a6343201ef5d8761632ddeda8fd56a07afb76ceea0e461e77789aa4b52a06628ee32dcee59dfbe2a68323df8f0a821e7fb01043f2
-
Filesize
16KB
MD55046e0170e5bfff4dfde5404f140f4b0
SHA18b33fe908747657007cad96e4c26e740e41a87d7
SHA2563bc50f0f77a715f0bb83b3ea59e7a3deb3d1e3b7ce250c2c6dd8021497bacaf8
SHA5125e08d6ffd5e692d06d65a57a6343201ef5d8761632ddeda8fd56a07afb76ceea0e461e77789aa4b52a06628ee32dcee59dfbe2a68323df8f0a821e7fb01043f2
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
325KB
MD5c743e14636f535a25d42c34e7e22c2d6
SHA1338bd951c9c581240c96ebaaa187fec7c2386b0b
SHA256858a0ac1766f40c0873f9af24aa4d813c9f929eaf2e36f3e355181a4751a660d
SHA512a7ed7665c920605d59c138343a12ea10efa934a87c761216c0fa384ac82e220df71483cedd48c457694c8feb9fcd9af8eef461f5c7a329b905953d41ddca8df5
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b