Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe
Resource
win10-20230703-en
General
-
Target
77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe
-
Size
704KB
-
MD5
3a6e4c80ac52a1388f99827a3c67e934
-
SHA1
9b88c558e35575302e99b2921c1ee9bd2c3fc478
-
SHA256
77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e
-
SHA512
1a947dd0f609b75736f0061ebd845fea6bc79f60be5f35dd33ae3a4eff020eb03652320886d1105d3dfd13edd5e02966fc16b7fcf83d20ef4406f0a4062d2204
-
SSDEEP
12288:yMrLy90QsdyusiMpA2+y0yDhyD7flGfLVP6UrCdsRVGTHuiF1gBW:pyfMbsiGoyhynlOLVPjr0scHBvgBW
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b01a-25.dat healer behavioral1/files/0x000700000001b01a-27.dat healer behavioral1/memory/2672-28-0x0000000000600000-0x000000000060A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4028592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4028592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4028592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4028592.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4028592.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3160 x3350414.exe 4416 x4382860.exe 1588 x9717773.exe 2672 g4028592.exe 4860 h0843593.exe 4588 saves.exe 2400 i7758211.exe 1912 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4924 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4028592.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4382860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9717773.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3350414.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 g4028592.exe 2672 g4028592.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 g4028592.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3532 wrote to memory of 3160 3532 77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe 70 PID 3532 wrote to memory of 3160 3532 77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe 70 PID 3532 wrote to memory of 3160 3532 77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe 70 PID 3160 wrote to memory of 4416 3160 x3350414.exe 71 PID 3160 wrote to memory of 4416 3160 x3350414.exe 71 PID 3160 wrote to memory of 4416 3160 x3350414.exe 71 PID 4416 wrote to memory of 1588 4416 x4382860.exe 72 PID 4416 wrote to memory of 1588 4416 x4382860.exe 72 PID 4416 wrote to memory of 1588 4416 x4382860.exe 72 PID 1588 wrote to memory of 2672 1588 x9717773.exe 73 PID 1588 wrote to memory of 2672 1588 x9717773.exe 73 PID 1588 wrote to memory of 4860 1588 x9717773.exe 74 PID 1588 wrote to memory of 4860 1588 x9717773.exe 74 PID 1588 wrote to memory of 4860 1588 x9717773.exe 74 PID 4860 wrote to memory of 4588 4860 h0843593.exe 75 PID 4860 wrote to memory of 4588 4860 h0843593.exe 75 PID 4860 wrote to memory of 4588 4860 h0843593.exe 75 PID 4416 wrote to memory of 2400 4416 x4382860.exe 76 PID 4416 wrote to memory of 2400 4416 x4382860.exe 76 PID 4416 wrote to memory of 2400 4416 x4382860.exe 76 PID 4588 wrote to memory of 2228 4588 saves.exe 77 PID 4588 wrote to memory of 2228 4588 saves.exe 77 PID 4588 wrote to memory of 2228 4588 saves.exe 77 PID 4588 wrote to memory of 2692 4588 saves.exe 78 PID 4588 wrote to memory of 2692 4588 saves.exe 78 PID 4588 wrote to memory of 2692 4588 saves.exe 78 PID 2692 wrote to memory of 4336 2692 cmd.exe 81 PID 2692 wrote to memory of 4336 2692 cmd.exe 81 PID 2692 wrote to memory of 4336 2692 cmd.exe 81 PID 2692 wrote to memory of 1744 2692 cmd.exe 82 PID 2692 wrote to memory of 1744 2692 cmd.exe 82 PID 2692 wrote to memory of 1744 2692 cmd.exe 82 PID 2692 wrote to memory of 4280 2692 cmd.exe 83 PID 2692 wrote to memory of 4280 2692 cmd.exe 83 PID 2692 wrote to memory of 4280 2692 cmd.exe 83 PID 2692 wrote to memory of 4832 2692 cmd.exe 84 PID 2692 wrote to memory of 4832 2692 cmd.exe 84 PID 2692 wrote to memory of 4832 2692 cmd.exe 84 PID 2692 wrote to memory of 3424 2692 cmd.exe 85 PID 2692 wrote to memory of 3424 2692 cmd.exe 85 PID 2692 wrote to memory of 3424 2692 cmd.exe 85 PID 2692 wrote to memory of 1384 2692 cmd.exe 86 PID 2692 wrote to memory of 1384 2692 cmd.exe 86 PID 2692 wrote to memory of 1384 2692 cmd.exe 86 PID 4588 wrote to memory of 4924 4588 saves.exe 88 PID 4588 wrote to memory of 4924 4588 saves.exe 88 PID 4588 wrote to memory of 4924 4588 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe"C:\Users\Admin\AppData\Local\Temp\77713b3cf2683848e2de22fd524e9b86a6bc152de7de1316ab0c38629e65669e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3350414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3350414.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4382860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4382860.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9717773.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9717773.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4028592.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4028592.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0843593.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0843593.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1384
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7758211.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7758211.exe4⤵
- Executes dropped EXE
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD558916b6470dc9bd06526f12c6f792162
SHA1de11501acd6eaa326af50d6a98ce6caf2a635a15
SHA2560ed79e25dcb386ad771208b6091fc83218106052c879436450dc752ff812d839
SHA512a5db14cf51762fe26330916444ac239d3e4f495a38ed159c239b76a4338dab786f79945d7c02fa1c61731eec2508c9cd8ddf2db4627cc5773419f3d273cfb7ed
-
Filesize
599KB
MD558916b6470dc9bd06526f12c6f792162
SHA1de11501acd6eaa326af50d6a98ce6caf2a635a15
SHA2560ed79e25dcb386ad771208b6091fc83218106052c879436450dc752ff812d839
SHA512a5db14cf51762fe26330916444ac239d3e4f495a38ed159c239b76a4338dab786f79945d7c02fa1c61731eec2508c9cd8ddf2db4627cc5773419f3d273cfb7ed
-
Filesize
433KB
MD57fe371b6d6eade689c7ab9aacc7c32d8
SHA16d42c46e287498b2f57253b2318bc91ed78a414e
SHA256bea2763400622f1e1197df73a1224d7d1a9828692f26d062a9bd48af1c7a6614
SHA5123a84c4d03826afd4630d3587e7ba852fd0c88f57bb6935ce466500be90c8653f60f663dc5f7b788ba82455468477b4c1a6edbe5965a349dfa6834091690e773f
-
Filesize
433KB
MD57fe371b6d6eade689c7ab9aacc7c32d8
SHA16d42c46e287498b2f57253b2318bc91ed78a414e
SHA256bea2763400622f1e1197df73a1224d7d1a9828692f26d062a9bd48af1c7a6614
SHA5123a84c4d03826afd4630d3587e7ba852fd0c88f57bb6935ce466500be90c8653f60f663dc5f7b788ba82455468477b4c1a6edbe5965a349dfa6834091690e773f
-
Filesize
176KB
MD5b25fd8d90ed5bd9b0184e1218287c040
SHA1bfbf179e960cbe9b42fd9a7fe6856946a785e124
SHA256ec1b219e69c5a1c99bf1348385e677c23c405039444292ac66de1abd79d08199
SHA512f7a1ac8e8f96db86b80d9beb4c51553a00753de8c9870c73fa097677761f94b0b19cbab1df3270a3ca7e45962329df362e189d319d3495a24cb1511a1809be5e
-
Filesize
176KB
MD5b25fd8d90ed5bd9b0184e1218287c040
SHA1bfbf179e960cbe9b42fd9a7fe6856946a785e124
SHA256ec1b219e69c5a1c99bf1348385e677c23c405039444292ac66de1abd79d08199
SHA512f7a1ac8e8f96db86b80d9beb4c51553a00753de8c9870c73fa097677761f94b0b19cbab1df3270a3ca7e45962329df362e189d319d3495a24cb1511a1809be5e
-
Filesize
277KB
MD54c3743e465d1042259e189e32b4cdd94
SHA186df3a845f355c72fae0fe78959ebcfd6e0081ba
SHA2569f3be0ba6e514de9a577ac02614e300d1ddd756c2d8ae4ee150bb9289f596dda
SHA512d57f87c3ddc754b798cc15cf9fff27a2c408fa0d4a18fa73fa435b585467272bff257a3b8765c63a5972febb183917451f692464ade10f285eae06a5b477b1ab
-
Filesize
277KB
MD54c3743e465d1042259e189e32b4cdd94
SHA186df3a845f355c72fae0fe78959ebcfd6e0081ba
SHA2569f3be0ba6e514de9a577ac02614e300d1ddd756c2d8ae4ee150bb9289f596dda
SHA512d57f87c3ddc754b798cc15cf9fff27a2c408fa0d4a18fa73fa435b585467272bff257a3b8765c63a5972febb183917451f692464ade10f285eae06a5b477b1ab
-
Filesize
18KB
MD51a5befd46ece1fc5f1295ebcbcfd3f86
SHA1fe1ca7d13eae410c146f5dd7e055c80693eea618
SHA256980b0be31363b48698bdf97d6befdd78aa0c2ed5306662ddbef741e697a158f5
SHA512f2c5b91f1bb54ce8f89601baece80038f7e7a37364c2363a2c7b6b3623865e3ed1dd8d4dcab9b432bfb4a326b0e1ebc94c370058d3d6a4346c4918ed8adbd8cc
-
Filesize
18KB
MD51a5befd46ece1fc5f1295ebcbcfd3f86
SHA1fe1ca7d13eae410c146f5dd7e055c80693eea618
SHA256980b0be31363b48698bdf97d6befdd78aa0c2ed5306662ddbef741e697a158f5
SHA512f2c5b91f1bb54ce8f89601baece80038f7e7a37364c2363a2c7b6b3623865e3ed1dd8d4dcab9b432bfb4a326b0e1ebc94c370058d3d6a4346c4918ed8adbd8cc
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
328KB
MD5fd3df0c3e13022619e6f925124c44ad2
SHA1260202423af93ac97f10cfd90f84dc42501d07d4
SHA256b7ee295512cb980959a8c010cb67f85d9b1b65d9969565cbc00de928621764b6
SHA5120f6daade091b5b7076699c875f29c44c11626d285f797f4eb13b29070a2a9cf4cf770ba505aa0dfe11f429c39bd8d2869931a8ef7d50bd167444c33e517619ff
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b