Analysis
-
max time kernel
297s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
x8002878.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x8002878.exe
Resource
win10-20230915-en
General
-
Target
x8002878.exe
-
Size
326KB
-
MD5
d450a74effe247298e76be251e9d20b6
-
SHA1
2ec5fbbbd9ea9125beb84d456fac275f9dc42adc
-
SHA256
c22b6ac1147733913380ba7c0f23d9e8802bb8f91b681e416aa5c5a0f942d105
-
SHA512
1d4d264d1e20603a5d9dccac06c5055b5ec2555f3d6d390b4bd066a45ff23ede0ea15df9eec5154ac3601c7f28537b4096d703ea294295973e99fbf2b149d678
-
SSDEEP
6144:K1y+bnr+Fp0yN90QEmnL5C8HqZiuNf0OSbCAVmEDus9CFst:HMr5y90A5OZiuN7oVcsGst
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4060-7-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 4856 g3089245.exe 4040 h8345542.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x8002878.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 4060 4856 g3089245.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4060 AppLaunch.exe 4060 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4060 AppLaunch.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4856 5048 x8002878.exe 69 PID 5048 wrote to memory of 4856 5048 x8002878.exe 69 PID 5048 wrote to memory of 4856 5048 x8002878.exe 69 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 4856 wrote to memory of 4060 4856 g3089245.exe 70 PID 5048 wrote to memory of 4040 5048 x8002878.exe 71 PID 5048 wrote to memory of 4040 5048 x8002878.exe 71 PID 5048 wrote to memory of 4040 5048 x8002878.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\x8002878.exe"C:\Users\Admin\AppData\Local\Temp\x8002878.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g3089245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g3089245.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h8345542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h8345542.exe2⤵
- Executes dropped EXE
PID:4040
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5d1139a672dbbf2080d65e428ab2a5e89
SHA1ba26ec755852555edba81f15f9937884666845c5
SHA2562f587191e89b78e30307e3d1c06e7fc8abcda40f2bbea21bb522c5c9dd07a8f6
SHA5125d9b0361549f6cc589dd9de63ed7af83b1a434524ff66cec60d6414d2fe3153f879f7a43d364e71fce933da89617d550d4b3858d48c2f19418f1db74809d52ca
-
Filesize
242KB
MD5d1139a672dbbf2080d65e428ab2a5e89
SHA1ba26ec755852555edba81f15f9937884666845c5
SHA2562f587191e89b78e30307e3d1c06e7fc8abcda40f2bbea21bb522c5c9dd07a8f6
SHA5125d9b0361549f6cc589dd9de63ed7af83b1a434524ff66cec60d6414d2fe3153f879f7a43d364e71fce933da89617d550d4b3858d48c2f19418f1db74809d52ca
-
Filesize
174KB
MD524a7f85e7aba85d56e39eabf594afb44
SHA133e1f059adfe93d5bdf2a7880a0193c88a7ad1c4
SHA256179783183da481296e77d35b9a3a73c8247ad2420d49a4e7fd35ae12efadd467
SHA512a19c25638b6209e447bd2ef8eabf7377188f4bf89d12333ca25c17fff91e5b0c52d2e0504df3c465b781d6e0b75776c02752492f8e24e54a0e19385c1f326c67
-
Filesize
174KB
MD524a7f85e7aba85d56e39eabf594afb44
SHA133e1f059adfe93d5bdf2a7880a0193c88a7ad1c4
SHA256179783183da481296e77d35b9a3a73c8247ad2420d49a4e7fd35ae12efadd467
SHA512a19c25638b6209e447bd2ef8eabf7377188f4bf89d12333ca25c17fff91e5b0c52d2e0504df3c465b781d6e0b75776c02752492f8e24e54a0e19385c1f326c67