Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe
Resource
win10-20230703-en
General
-
Target
aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe
-
Size
705KB
-
MD5
b09d36769d8331bce1b5f035ee79c3ef
-
SHA1
21dc47437bd345e71b32fd5bf5c23b2d25aca569
-
SHA256
aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0
-
SHA512
20785f23924e6c353ab1f224ea9e6f021e5ff5654053fdb698c6e19c132f28bf9b48efb25499a955a72f498903220dcf20774456cc7935ed80743190acbb9f8e
-
SSDEEP
12288:vMrdy90vVGD+8tzOq/Z7+c0fiLoKiORXJphyvjbS9JRRohcDLYXal:2y0GTV/Z7+xfiniORrhgfS9JR6hcD2Y
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001affc-26.dat healer behavioral1/files/0x000700000001affc-27.dat healer behavioral1/memory/1364-28-0x0000000000D40000-0x0000000000D4A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2858618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2858618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2858618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2858618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2858618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4668 x2619016.exe 1136 x7609898.exe 5108 x1724690.exe 1364 g2858618.exe 216 h7731192.exe 3968 saves.exe 5084 i1004920.exe 404 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3212 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2858618.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1724690.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2619016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7609898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1364 g2858618.exe 1364 g2858618.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 g2858618.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4668 3060 aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe 70 PID 3060 wrote to memory of 4668 3060 aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe 70 PID 3060 wrote to memory of 4668 3060 aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe 70 PID 4668 wrote to memory of 1136 4668 x2619016.exe 71 PID 4668 wrote to memory of 1136 4668 x2619016.exe 71 PID 4668 wrote to memory of 1136 4668 x2619016.exe 71 PID 1136 wrote to memory of 5108 1136 x7609898.exe 72 PID 1136 wrote to memory of 5108 1136 x7609898.exe 72 PID 1136 wrote to memory of 5108 1136 x7609898.exe 72 PID 5108 wrote to memory of 1364 5108 x1724690.exe 73 PID 5108 wrote to memory of 1364 5108 x1724690.exe 73 PID 5108 wrote to memory of 216 5108 x1724690.exe 74 PID 5108 wrote to memory of 216 5108 x1724690.exe 74 PID 5108 wrote to memory of 216 5108 x1724690.exe 74 PID 216 wrote to memory of 3968 216 h7731192.exe 75 PID 216 wrote to memory of 3968 216 h7731192.exe 75 PID 216 wrote to memory of 3968 216 h7731192.exe 75 PID 1136 wrote to memory of 5084 1136 x7609898.exe 76 PID 1136 wrote to memory of 5084 1136 x7609898.exe 76 PID 1136 wrote to memory of 5084 1136 x7609898.exe 76 PID 3968 wrote to memory of 3760 3968 saves.exe 77 PID 3968 wrote to memory of 3760 3968 saves.exe 77 PID 3968 wrote to memory of 3760 3968 saves.exe 77 PID 3968 wrote to memory of 4984 3968 saves.exe 78 PID 3968 wrote to memory of 4984 3968 saves.exe 78 PID 3968 wrote to memory of 4984 3968 saves.exe 78 PID 4984 wrote to memory of 5096 4984 cmd.exe 81 PID 4984 wrote to memory of 5096 4984 cmd.exe 81 PID 4984 wrote to memory of 5096 4984 cmd.exe 81 PID 4984 wrote to memory of 4508 4984 cmd.exe 82 PID 4984 wrote to memory of 4508 4984 cmd.exe 82 PID 4984 wrote to memory of 4508 4984 cmd.exe 82 PID 4984 wrote to memory of 3188 4984 cmd.exe 83 PID 4984 wrote to memory of 3188 4984 cmd.exe 83 PID 4984 wrote to memory of 3188 4984 cmd.exe 83 PID 4984 wrote to memory of 4808 4984 cmd.exe 85 PID 4984 wrote to memory of 4808 4984 cmd.exe 85 PID 4984 wrote to memory of 4808 4984 cmd.exe 85 PID 4984 wrote to memory of 2960 4984 cmd.exe 84 PID 4984 wrote to memory of 2960 4984 cmd.exe 84 PID 4984 wrote to memory of 2960 4984 cmd.exe 84 PID 4984 wrote to memory of 2912 4984 cmd.exe 86 PID 4984 wrote to memory of 2912 4984 cmd.exe 86 PID 4984 wrote to memory of 2912 4984 cmd.exe 86 PID 3968 wrote to memory of 3212 3968 saves.exe 87 PID 3968 wrote to memory of 3212 3968 saves.exe 87 PID 3968 wrote to memory of 3212 3968 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe"C:\Users\Admin\AppData\Local\Temp\aca60148eb2c467be7d7ef67474b35d3c2deb51ef7ba6bc05cc20f78a428efd0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2619016.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7609898.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1724690.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2858618.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7731192.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2912
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1004920.exe4⤵
- Executes dropped EXE
PID:5084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5575344c2f9238bc708b28316de1a6cc6
SHA18c30d653af6ab3b6777e7e8bd0ddf139c44386f7
SHA25620a11a72f109a0a6ed0ac438cc5bfc64c79b07a0f48b786b86ae49afa3b0e0b9
SHA5124422f63024972614ee875f69c8b72348192eef6fff945ed289cb9f522b6651395ea4dafca500cbc812b72a2fd22ad697b2ddc1868ba69d23d3017d2400b97173
-
Filesize
599KB
MD5575344c2f9238bc708b28316de1a6cc6
SHA18c30d653af6ab3b6777e7e8bd0ddf139c44386f7
SHA25620a11a72f109a0a6ed0ac438cc5bfc64c79b07a0f48b786b86ae49afa3b0e0b9
SHA5124422f63024972614ee875f69c8b72348192eef6fff945ed289cb9f522b6651395ea4dafca500cbc812b72a2fd22ad697b2ddc1868ba69d23d3017d2400b97173
-
Filesize
433KB
MD5a6f33e838c6fd349db700d13ed6ea9b4
SHA1a94ee05d03471bbab0c2aec5894c2beca17670b7
SHA256c86dbe467e95f92f5c60cdbe0965c0437771daafbe82a9acf75209731445672d
SHA512eba9be68ca4aa6ea15ad7e53e304fd41cfd4ab4a6bc3c0925db207b3396c6f90c41accc0820ac1cd9dde1272174b64229f5b94cad1dcecebfa63f38755d9f12f
-
Filesize
433KB
MD5a6f33e838c6fd349db700d13ed6ea9b4
SHA1a94ee05d03471bbab0c2aec5894c2beca17670b7
SHA256c86dbe467e95f92f5c60cdbe0965c0437771daafbe82a9acf75209731445672d
SHA512eba9be68ca4aa6ea15ad7e53e304fd41cfd4ab4a6bc3c0925db207b3396c6f90c41accc0820ac1cd9dde1272174b64229f5b94cad1dcecebfa63f38755d9f12f
-
Filesize
175KB
MD5b602995207d10dd3b8ab501abf4d61a7
SHA18303f288bb06ee1467fd01c32b06d46888595778
SHA256b219fd53bd8cfbbbf2b9269065c3f18ecd95dcf40fe82c8386640c6d5d837eb2
SHA51267d9b58ecac81fd61eddb0f7a505adff36fe27c9beb5f6b500cf0d33f4d825ca2cf089454658be1f62d722e987db6ad463ccda547af5282bfdcbb01b1b3daa97
-
Filesize
175KB
MD5b602995207d10dd3b8ab501abf4d61a7
SHA18303f288bb06ee1467fd01c32b06d46888595778
SHA256b219fd53bd8cfbbbf2b9269065c3f18ecd95dcf40fe82c8386640c6d5d837eb2
SHA51267d9b58ecac81fd61eddb0f7a505adff36fe27c9beb5f6b500cf0d33f4d825ca2cf089454658be1f62d722e987db6ad463ccda547af5282bfdcbb01b1b3daa97
-
Filesize
277KB
MD59a3dec6464a3368f9949d4fab9cbe8bb
SHA16a727dbcb4978d1ddbfea83f16574f5a1335265f
SHA256f99a047a50b73b59653414ec2442191828a27389fc30860752abbfddebb85293
SHA512392f0ce2cf9a8735e801f67f515c93620bf7e2f63a8ce68d6e4ae68095a3a7e60c67b1a071fe84e5680c82c293149efcc34a553b7631c5f7ae07a751f5f7f128
-
Filesize
277KB
MD59a3dec6464a3368f9949d4fab9cbe8bb
SHA16a727dbcb4978d1ddbfea83f16574f5a1335265f
SHA256f99a047a50b73b59653414ec2442191828a27389fc30860752abbfddebb85293
SHA512392f0ce2cf9a8735e801f67f515c93620bf7e2f63a8ce68d6e4ae68095a3a7e60c67b1a071fe84e5680c82c293149efcc34a553b7631c5f7ae07a751f5f7f128
-
Filesize
18KB
MD5fbf58e8f9baf0369eb47609e938f6a15
SHA10e36635c09c6b20947aa75cc98d20def491fcc70
SHA256a076f1adf36614a025fb1fed21a4c84398be9e251b60d34c58bbd53fa6b764f7
SHA5121bbfffd6687d1608a3e4191931712fdcc6d7b6236a4cd3c280360d01966eefcc87721b4eb9d0019fd6ba0458981a8c252f951ab51fa3b04bfd79bd937f48906a
-
Filesize
18KB
MD5fbf58e8f9baf0369eb47609e938f6a15
SHA10e36635c09c6b20947aa75cc98d20def491fcc70
SHA256a076f1adf36614a025fb1fed21a4c84398be9e251b60d34c58bbd53fa6b764f7
SHA5121bbfffd6687d1608a3e4191931712fdcc6d7b6236a4cd3c280360d01966eefcc87721b4eb9d0019fd6ba0458981a8c252f951ab51fa3b04bfd79bd937f48906a
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
328KB
MD5fe9fda9e5dae99cbcffa77dd176f7205
SHA19c412093b39af371597367fd1fbcc0dfd9121717
SHA2565e864bb71fce0e08cf44cfafec9afcfa9f61d33f741417d6f4d98f35618c8587
SHA512f363d6cb8ac18f5887537011ce6c84627495c24f3344e4685db7b32873300276d9a4b0d7603f5821390138854748f3be00ee54d77f529b2b3ef58263915c130d
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b