Analysis
-
max time kernel
293s -
max time network
302s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
x3716465.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x3716465.exe
Resource
win10-20230915-en
General
-
Target
x3716465.exe
-
Size
320KB
-
MD5
bd8aac74df67f6fde61f5f9a924ed6d4
-
SHA1
836e6a69bbef277e18383abe776abc058b9c5341
-
SHA256
4e82ae18daf05be90f7731212b8b696a52e48d1a771d434e99c7705bf6e5486b
-
SHA512
da1c41e43d9ef43eb78b39cd7a1aa1d443181d189385065e8380c188d981436cac43cc33d3d72c251739ce2719472c4bb5706d44adda540e2b50213c2722c727
-
SSDEEP
6144:K7y+bnr+mp0yN90QEAGp7GKQ1zpOOGAgkZSLx/6oAKpL2Ajdg:BMr6y90zJNeQVdp2OS
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2744-15-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2744-16-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2744-18-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2744-20-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2744-22-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2580 g4780743.exe 2416 h2391710.exe -
Loads dropped DLL 5 IoCs
pid Process 2568 x3716465.exe 2568 x3716465.exe 2580 g4780743.exe 2568 x3716465.exe 2416 h2391710.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x3716465.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2744 2580 g4780743.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2744 AppLaunch.exe 2744 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2568 wrote to memory of 2580 2568 x3716465.exe 28 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2580 wrote to memory of 2744 2580 g4780743.exe 30 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31 PID 2568 wrote to memory of 2416 2568 x3716465.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\x3716465.exe"C:\Users\Admin\AppData\Local\Temp\x3716465.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g4780743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g4780743.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h2391710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h2391710.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a
-
Filesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
Filesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a
-
Filesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a