Analysis
-
max time kernel
290s -
max time network
308s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
x8731362.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x8731362.exe
Resource
win10-20230915-en
General
-
Target
x8731362.exe
-
Size
320KB
-
MD5
faa8635b24a3c8c194ea66f37770732e
-
SHA1
7a45390809e3fb5a228396d3b5ff05b3a99bc9be
-
SHA256
0fdbc770ea66f062af959235a3a6559123d5408a322c111592ef584215ef81c4
-
SHA512
e269067cd43197b7d6c6901cb3ab55cec1a7e8aeb80f9a1b938bfcb3b4d0cb847a90766fc22ac393f7c035022911fe5ace8ce56c3268fdc3503f60b266789db3
-
SSDEEP
6144:Khy+bnr+cp0yN90QENl926D2lD3Ka815dCpo8vYvZtAj0nwr43dlN4ZGEA:7Mroy90zl926SlDyBzPvzAj1EGjA
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4708-7-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
Processes:
g7935047.exeh3626941.exepid process 3096 g7935047.exe 1020 h3626941.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
x8731362.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x8731362.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g7935047.exedescription pid process target process PID 3096 set thread context of 4708 3096 g7935047.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4708 AppLaunch.exe 4708 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4708 AppLaunch.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
x8731362.exeg7935047.exedescription pid process target process PID 4428 wrote to memory of 3096 4428 x8731362.exe g7935047.exe PID 4428 wrote to memory of 3096 4428 x8731362.exe g7935047.exe PID 4428 wrote to memory of 3096 4428 x8731362.exe g7935047.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 3096 wrote to memory of 4708 3096 g7935047.exe AppLaunch.exe PID 4428 wrote to memory of 1020 4428 x8731362.exe h3626941.exe PID 4428 wrote to memory of 1020 4428 x8731362.exe h3626941.exe PID 4428 wrote to memory of 1020 4428 x8731362.exe h3626941.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\x8731362.exe"C:\Users\Admin\AppData\Local\Temp\x8731362.exe"
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7935047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7935047.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3626941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3626941.exe
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7935047.exeFilesize
236KB
MD5ae3c2011e6b28a83ed5ec20506e2e3eb
SHA134bcdb009271f3301b37346648ade33ceecf9556
SHA256797cfa22728210b5dfc1b746fda10be7684798629c168664d754440882c5dbcf
SHA5128c8f8a783cd2fa9de0a23735c958dab8563b7f100e77c3e821287a7a07d05db398dd2a3a00b447c11b34d89b0c48ef497a869003582159e7e6c134bba6cd3138
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7935047.exeFilesize
236KB
MD5ae3c2011e6b28a83ed5ec20506e2e3eb
SHA134bcdb009271f3301b37346648ade33ceecf9556
SHA256797cfa22728210b5dfc1b746fda10be7684798629c168664d754440882c5dbcf
SHA5128c8f8a783cd2fa9de0a23735c958dab8563b7f100e77c3e821287a7a07d05db398dd2a3a00b447c11b34d89b0c48ef497a869003582159e7e6c134bba6cd3138
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3626941.exeFilesize
174KB
MD543acc3d174d9c2da4013def25ed93107
SHA1c0e91ed2ab5c607fc0b22c8f4209db792c26fa5f
SHA256745e358e9b0eefe2efe8d14cdbf17a194b81a80f929df4514cc3fed696d259ee
SHA5126ddecd71a2e5f9d6670f297513fe3db5e2ed4e859857d8a25a42dbcfe03e6d5f70762af836061a0ebfdfc05be6ca102d6b9116fe6e627a989811da07c59b9614
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3626941.exeFilesize
174KB
MD543acc3d174d9c2da4013def25ed93107
SHA1c0e91ed2ab5c607fc0b22c8f4209db792c26fa5f
SHA256745e358e9b0eefe2efe8d14cdbf17a194b81a80f929df4514cc3fed696d259ee
SHA5126ddecd71a2e5f9d6670f297513fe3db5e2ed4e859857d8a25a42dbcfe03e6d5f70762af836061a0ebfdfc05be6ca102d6b9116fe6e627a989811da07c59b9614
-
memory/1020-17-0x0000000073080000-0x000000007376E000-memory.dmpFilesize
6MB
-
memory/1020-14-0x0000000000B80000-0x0000000000BB0000-memory.dmpFilesize
192KB
-
memory/1020-16-0x0000000005340000-0x0000000005346000-memory.dmpFilesize
24KB
-
memory/1020-18-0x000000000AED0000-0x000000000B4D6000-memory.dmpFilesize
6MB
-
memory/1020-19-0x000000000A9D0000-0x000000000AADA000-memory.dmpFilesize
1MB
-
memory/1020-20-0x000000000A8C0000-0x000000000A8D2000-memory.dmpFilesize
72KB
-
memory/1020-21-0x000000000A920000-0x000000000A95E000-memory.dmpFilesize
248KB
-
memory/1020-26-0x000000000A970000-0x000000000A9BB000-memory.dmpFilesize
300KB
-
memory/1020-47-0x0000000073080000-0x000000007376E000-memory.dmpFilesize
6MB
-
memory/4708-15-0x0000000073080000-0x000000007376E000-memory.dmpFilesize
6MB
-
memory/4708-7-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4708-31-0x0000000073080000-0x000000007376E000-memory.dmpFilesize
6MB
-
memory/4708-46-0x0000000073080000-0x000000007376E000-memory.dmpFilesize
6MB