Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30-08-2023 01:22
Static task
static1
Behavioral task
behavioral1
Sample
482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe
Resource
win10-20230703-en
General
-
Target
482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe
-
Size
704KB
-
MD5
7dd13b3e407bd572de08f744bd968dc0
-
SHA1
19c78d574b0ca6abe28b7aa68f2b41df6c195ad9
-
SHA256
482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4
-
SHA512
debb24329f7162f1cd31c99db8f026fa2aec860b7e5e9a092922e56d6d8073d954f9e134b5d5a3331978857f19e54090500af476284aaf1c07db0c4d4dbeeebd
-
SSDEEP
12288:HMray90cjMUJVxoPjq4suO8bnQ2qBirplFP2CNuEKExPVHeqZuwPm:5yaUzxobzsODXik2CNuEKcPXo
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b027-26.dat healer behavioral1/files/0x000700000001b027-27.dat healer behavioral1/memory/4804-28-0x0000000000240000-0x000000000024A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7714924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7714924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7714924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7714924.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7714924.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3204 x4090492.exe 3488 x8407046.exe 4092 x6252143.exe 4804 g7714924.exe 3368 h1972856.exe 4916 saves.exe 4368 i6648427.exe 2400 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3376 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7714924.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4090492.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8407046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6252143.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4804 g7714924.exe 4804 g7714924.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 g7714924.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3204 4892 482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe 70 PID 4892 wrote to memory of 3204 4892 482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe 70 PID 4892 wrote to memory of 3204 4892 482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe 70 PID 3204 wrote to memory of 3488 3204 x4090492.exe 71 PID 3204 wrote to memory of 3488 3204 x4090492.exe 71 PID 3204 wrote to memory of 3488 3204 x4090492.exe 71 PID 3488 wrote to memory of 4092 3488 x8407046.exe 72 PID 3488 wrote to memory of 4092 3488 x8407046.exe 72 PID 3488 wrote to memory of 4092 3488 x8407046.exe 72 PID 4092 wrote to memory of 4804 4092 x6252143.exe 73 PID 4092 wrote to memory of 4804 4092 x6252143.exe 73 PID 4092 wrote to memory of 3368 4092 x6252143.exe 74 PID 4092 wrote to memory of 3368 4092 x6252143.exe 74 PID 4092 wrote to memory of 3368 4092 x6252143.exe 74 PID 3368 wrote to memory of 4916 3368 h1972856.exe 75 PID 3368 wrote to memory of 4916 3368 h1972856.exe 75 PID 3368 wrote to memory of 4916 3368 h1972856.exe 75 PID 3488 wrote to memory of 4368 3488 x8407046.exe 76 PID 3488 wrote to memory of 4368 3488 x8407046.exe 76 PID 3488 wrote to memory of 4368 3488 x8407046.exe 76 PID 4916 wrote to memory of 4524 4916 saves.exe 77 PID 4916 wrote to memory of 4524 4916 saves.exe 77 PID 4916 wrote to memory of 4524 4916 saves.exe 77 PID 4916 wrote to memory of 2164 4916 saves.exe 79 PID 4916 wrote to memory of 2164 4916 saves.exe 79 PID 4916 wrote to memory of 2164 4916 saves.exe 79 PID 2164 wrote to memory of 1168 2164 cmd.exe 81 PID 2164 wrote to memory of 1168 2164 cmd.exe 81 PID 2164 wrote to memory of 1168 2164 cmd.exe 81 PID 2164 wrote to memory of 3044 2164 cmd.exe 82 PID 2164 wrote to memory of 3044 2164 cmd.exe 82 PID 2164 wrote to memory of 3044 2164 cmd.exe 82 PID 2164 wrote to memory of 1704 2164 cmd.exe 83 PID 2164 wrote to memory of 1704 2164 cmd.exe 83 PID 2164 wrote to memory of 1704 2164 cmd.exe 83 PID 2164 wrote to memory of 3344 2164 cmd.exe 84 PID 2164 wrote to memory of 3344 2164 cmd.exe 84 PID 2164 wrote to memory of 3344 2164 cmd.exe 84 PID 2164 wrote to memory of 3840 2164 cmd.exe 85 PID 2164 wrote to memory of 3840 2164 cmd.exe 85 PID 2164 wrote to memory of 3840 2164 cmd.exe 85 PID 2164 wrote to memory of 808 2164 cmd.exe 86 PID 2164 wrote to memory of 808 2164 cmd.exe 86 PID 2164 wrote to memory of 808 2164 cmd.exe 86 PID 4916 wrote to memory of 3376 4916 saves.exe 87 PID 4916 wrote to memory of 3376 4916 saves.exe 87 PID 4916 wrote to memory of 3376 4916 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe"C:\Users\Admin\AppData\Local\Temp\482c532f0933757950d49b2bbc881120dcca410d1ca7e0aaa08b4844eb3f5ad4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4090492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4090492.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8407046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8407046.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6252143.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6252143.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7714924.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7714924.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1972856.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1972856.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:808
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6648427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6648427.exe4⤵
- Executes dropped EXE
PID:4368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD548044b7904a4347d7e76b0fcda6d509d
SHA1a872326dcc58ff3d5f59b2ab19ae2211ea4d2d89
SHA256ed9dd65de5047fdc43064945c6b7846786e12bb18321eb7b0e085a660f72383e
SHA512c69423e09696e084fdf0bb951be65a7f045adf0a55b32dfc4492e162ab819d834a49614b3ed2f8ed0741c4ac4d56b74f84407fb6f28a8247ec3ee8e0176b9972
-
Filesize
599KB
MD548044b7904a4347d7e76b0fcda6d509d
SHA1a872326dcc58ff3d5f59b2ab19ae2211ea4d2d89
SHA256ed9dd65de5047fdc43064945c6b7846786e12bb18321eb7b0e085a660f72383e
SHA512c69423e09696e084fdf0bb951be65a7f045adf0a55b32dfc4492e162ab819d834a49614b3ed2f8ed0741c4ac4d56b74f84407fb6f28a8247ec3ee8e0176b9972
-
Filesize
433KB
MD5d6e9b646e60b6215d1e70b786855588c
SHA1bbbc3601698988d1d981c75b5b03f955f733149f
SHA2561a89f8fbc16ad92691f8a4a4fdb69e86b9a581065716ac6ce0ae41eab8a2a518
SHA5123582b7c02c3acda3716b316eadd014bb77c1ace5eed619c7a7b59033e56bfbaa6acdc3840bd0b0bb4fcf9c5b5d01631d13e1ded9445c26eedc50825cdf2ab835
-
Filesize
433KB
MD5d6e9b646e60b6215d1e70b786855588c
SHA1bbbc3601698988d1d981c75b5b03f955f733149f
SHA2561a89f8fbc16ad92691f8a4a4fdb69e86b9a581065716ac6ce0ae41eab8a2a518
SHA5123582b7c02c3acda3716b316eadd014bb77c1ace5eed619c7a7b59033e56bfbaa6acdc3840bd0b0bb4fcf9c5b5d01631d13e1ded9445c26eedc50825cdf2ab835
-
Filesize
174KB
MD5e33203d3ea24979729d6e97dbee7e1a2
SHA1cb478d3158a078c18f3cf72f6fa80f8345feb945
SHA2566a7c3eadf3a410a16bf97dd44af01251bcd4e42f3bda7a1b7cb7938d68b3e226
SHA512e69ec39a58b2952c554c537d3f24921425ce8ac16d9bb93a41799b0b2ec92e46264f0f98ae4516c00e0735538280baff1a04846b7e9981825eeaf068c2e700ee
-
Filesize
174KB
MD5e33203d3ea24979729d6e97dbee7e1a2
SHA1cb478d3158a078c18f3cf72f6fa80f8345feb945
SHA2566a7c3eadf3a410a16bf97dd44af01251bcd4e42f3bda7a1b7cb7938d68b3e226
SHA512e69ec39a58b2952c554c537d3f24921425ce8ac16d9bb93a41799b0b2ec92e46264f0f98ae4516c00e0735538280baff1a04846b7e9981825eeaf068c2e700ee
-
Filesize
277KB
MD5b1ac8476248413f894bb9e5a0e75727f
SHA18affeb918f0488bb7241bc86862136128f431f5e
SHA256cb5bf93268ea6f5fd6a97ad1a264804115dff94c5e684b556b9b290bd9f7da30
SHA5128750cbd33f4ba2bde3528cf1cf3e66b15ad9da3d2a846ae204e1371120ed367d64cb0606310f960d487fcf3fe92e68d54c769ba83a0480223836b02fe45b9131
-
Filesize
277KB
MD5b1ac8476248413f894bb9e5a0e75727f
SHA18affeb918f0488bb7241bc86862136128f431f5e
SHA256cb5bf93268ea6f5fd6a97ad1a264804115dff94c5e684b556b9b290bd9f7da30
SHA5128750cbd33f4ba2bde3528cf1cf3e66b15ad9da3d2a846ae204e1371120ed367d64cb0606310f960d487fcf3fe92e68d54c769ba83a0480223836b02fe45b9131
-
Filesize
17KB
MD56fb61a75a20cee6a2292b265a2634c2d
SHA1c6ed0b6e93757f7993ecd2425e7ad45c0bcf9fe3
SHA256cde11cd0c6effef6f9b0f83bf53f49d9ea04ac79d863e08c2ef0398e6b7e36ea
SHA512a7e3f2167fd71b1eb63bcb07abf0c5fd4d0d361fd8decf8671c11b3368eb1209b45e1f9afd34dd0b1a7d5cc0beeaf94b86233731fd35a57596a5077292bf7804
-
Filesize
17KB
MD56fb61a75a20cee6a2292b265a2634c2d
SHA1c6ed0b6e93757f7993ecd2425e7ad45c0bcf9fe3
SHA256cde11cd0c6effef6f9b0f83bf53f49d9ea04ac79d863e08c2ef0398e6b7e36ea
SHA512a7e3f2167fd71b1eb63bcb07abf0c5fd4d0d361fd8decf8671c11b3368eb1209b45e1f9afd34dd0b1a7d5cc0beeaf94b86233731fd35a57596a5077292bf7804
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
326KB
MD54fa4d517cd05390cf6779257a3be4033
SHA13cd8ceb2b15ca2aea789f7b502674654f724a63d
SHA2560442763b56ee36b46b368a5b6e4006043c82a023d7899ff7a654fd7dac798bb9
SHA5128d0b7d54021dd4cf17bb36ec462e32011a32d1528efc2c9b8bf74a3c0b4226228bd380de3bd1ea9dbf2a4a9743fb0a2fbbf967dd7a7cdec7b6b894574971da7f
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b