Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2023 10:01
Static task
static1
Behavioral task
behavioral1
Sample
2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe
Resource
win10v2004-20230831-en
General
-
Target
2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe
-
Size
769KB
-
MD5
f67cbc2d576f1070b671c306fc10972f
-
SHA1
64d4fb9da61f659e1b807d443f73a84c6d2c866f
-
SHA256
2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf
-
SHA512
1ccc3d146015fd43701b24b251f578cdc0bc80f8def49c8e11ae62507d27e72f828de59e5febe9d536529b6909b468017bf84290024c473fbdf1009033eee613
-
SSDEEP
12288:MMrTy90dPfu4WPWrxaR0NjbOA1CjmW60UIp/MReXe50x3q5VJmT3di63ioxNq1j3:vymhrMQbDgV60UDeXo0TTI63wFGFM
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
x8990390.exex7643579.exeg9540812.exei6742569.exepid process 4108 x8990390.exe 636 x7643579.exe 3528 g9540812.exe 1476 i6742569.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exex8990390.exex7643579.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8990390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7643579.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g9540812.exedescription pid process target process PID 3528 set thread context of 1944 3528 g9540812.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1944 AppLaunch.exe 1944 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1944 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exex8990390.exex7643579.exeg9540812.exedescription pid process target process PID 2408 wrote to memory of 4108 2408 2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe x8990390.exe PID 2408 wrote to memory of 4108 2408 2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe x8990390.exe PID 2408 wrote to memory of 4108 2408 2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe x8990390.exe PID 4108 wrote to memory of 636 4108 x8990390.exe x7643579.exe PID 4108 wrote to memory of 636 4108 x8990390.exe x7643579.exe PID 4108 wrote to memory of 636 4108 x8990390.exe x7643579.exe PID 636 wrote to memory of 3528 636 x7643579.exe g9540812.exe PID 636 wrote to memory of 3528 636 x7643579.exe g9540812.exe PID 636 wrote to memory of 3528 636 x7643579.exe g9540812.exe PID 3528 wrote to memory of 3004 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 3004 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 3004 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 3528 wrote to memory of 1944 3528 g9540812.exe AppLaunch.exe PID 636 wrote to memory of 1476 636 x7643579.exe i6742569.exe PID 636 wrote to memory of 1476 636 x7643579.exe i6742569.exe PID 636 wrote to memory of 1476 636 x7643579.exe i6742569.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe"C:\Users\Admin\AppData\Local\Temp\2f85c62250f28ac7226da8b60cd6c03afa6fe92751f776359da9022df89ebfdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8990390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8990390.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7643579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7643579.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9540812.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9540812.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6742569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6742569.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8990390.exeFilesize
493KB
MD51b1fc35789673a32f209174c2a7cb079
SHA1e7cf76567c64c182ab26678831b5e9ca4dc06c6e
SHA256dfa074d7c1c52983f7eba8b9fadbededfc59a6f39b24154232df2fcdf273bf98
SHA51262c48cd333395168def12e7f61172cfd37957e49e030e74411c8db9a4a77df8e230ad913b62dfe3eff79dbd93819e4b1178ac03d0f6c098595ba73cdba02145e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8990390.exeFilesize
493KB
MD51b1fc35789673a32f209174c2a7cb079
SHA1e7cf76567c64c182ab26678831b5e9ca4dc06c6e
SHA256dfa074d7c1c52983f7eba8b9fadbededfc59a6f39b24154232df2fcdf273bf98
SHA51262c48cd333395168def12e7f61172cfd37957e49e030e74411c8db9a4a77df8e230ad913b62dfe3eff79dbd93819e4b1178ac03d0f6c098595ba73cdba02145e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7643579.exeFilesize
327KB
MD57422bedbb4ac084aaa41398117ea963b
SHA1529ba09178757dbc50e0fa14234b30c112f2ca92
SHA2562ae9e7870ff1516d99f67ccf77ef98267222eb34c7afbdbf2e36b6624e581b03
SHA5124fd349fabad21c744a48046712b8f172f4a0343b29d7ebafde8088a96a083a10d9b5aea84e7c8a6e4fc7fcbc8fd48ab210aee846474a8edac98bb77f15c568ef
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7643579.exeFilesize
327KB
MD57422bedbb4ac084aaa41398117ea963b
SHA1529ba09178757dbc50e0fa14234b30c112f2ca92
SHA2562ae9e7870ff1516d99f67ccf77ef98267222eb34c7afbdbf2e36b6624e581b03
SHA5124fd349fabad21c744a48046712b8f172f4a0343b29d7ebafde8088a96a083a10d9b5aea84e7c8a6e4fc7fcbc8fd48ab210aee846474a8edac98bb77f15c568ef
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9540812.exeFilesize
256KB
MD5e35d02a0e87a5c5f6eb5dd90a3a92426
SHA175d66b7b1738f76cf72ed10d75cbc14d72542463
SHA256d7ebbb3db76ed1c3a50ff4321de7927ccbc08e24cbea9254d6a60abf1ec2e63b
SHA512521650556d79ed5c0e45c4c0ed4f6b744903ebbabae0f7829cd1ed09a32446c88f7d26d6fb1a62aab4462c7acc947fd8eb012da93ebda9f50aa41582917d8126
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9540812.exeFilesize
256KB
MD5e35d02a0e87a5c5f6eb5dd90a3a92426
SHA175d66b7b1738f76cf72ed10d75cbc14d72542463
SHA256d7ebbb3db76ed1c3a50ff4321de7927ccbc08e24cbea9254d6a60abf1ec2e63b
SHA512521650556d79ed5c0e45c4c0ed4f6b744903ebbabae0f7829cd1ed09a32446c88f7d26d6fb1a62aab4462c7acc947fd8eb012da93ebda9f50aa41582917d8126
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6742569.exeFilesize
175KB
MD57d9186c307130be43a1b112453344e4d
SHA1b77f49f0c097792fe2949e662a3f9260cb4c260f
SHA2563e5b5044e5993c8ebf2fda399c0d6927cc3fd38be51f9c8cbde3dfcbbf4a797a
SHA5124875a5c982861fc2c2b4d91ce83d4819dba64e2f99677f3e1a21ca6f007a3f4277a3ca26819d73831e573dac07547ea6c2fe30c54ba0ba18208f7bfa360a6877
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6742569.exeFilesize
175KB
MD57d9186c307130be43a1b112453344e4d
SHA1b77f49f0c097792fe2949e662a3f9260cb4c260f
SHA2563e5b5044e5993c8ebf2fda399c0d6927cc3fd38be51f9c8cbde3dfcbbf4a797a
SHA5124875a5c982861fc2c2b4d91ce83d4819dba64e2f99677f3e1a21ca6f007a3f4277a3ca26819d73831e573dac07547ea6c2fe30c54ba0ba18208f7bfa360a6877
-
memory/1476-31-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/1476-25-0x00000000008C0000-0x00000000008F0000-memory.dmpFilesize
192KB
-
memory/1476-27-0x0000000073E50000-0x0000000074600000-memory.dmpFilesize
7.7MB
-
memory/1476-28-0x0000000005900000-0x0000000005F18000-memory.dmpFilesize
6.1MB
-
memory/1476-29-0x00000000053F0000-0x00000000054FA000-memory.dmpFilesize
1.0MB
-
memory/1476-30-0x0000000005240000-0x0000000005252000-memory.dmpFilesize
72KB
-
memory/1476-32-0x00000000052E0000-0x000000000531C000-memory.dmpFilesize
240KB
-
memory/1476-34-0x0000000073E50000-0x0000000074600000-memory.dmpFilesize
7.7MB
-
memory/1476-37-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/1944-26-0x0000000073E50000-0x0000000074600000-memory.dmpFilesize
7.7MB
-
memory/1944-21-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1944-33-0x0000000073E50000-0x0000000074600000-memory.dmpFilesize
7.7MB
-
memory/1944-36-0x0000000073E50000-0x0000000074600000-memory.dmpFilesize
7.7MB