Analysis
-
max time kernel
291s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
x6103409.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x6103409.exe
Resource
win10-20230915-en
General
-
Target
x6103409.exe
-
Size
506KB
-
MD5
0161d5878fc9f3e1441c6d07fa80d8b6
-
SHA1
aafaee6eb2797c94d5b62a3a671f9bfe4b683022
-
SHA256
a637ad2cf121eafebf568f99bbe320aafe238f05fa722bd8d47f16b25d229696
-
SHA512
2547bf0a2f0f49de2ec04d075e8d8783663bfe8477cea2e494a8be1d113f94951679156e1661e0ac9c76f0c55ed65acb79a735a65e953a47354e73a2f539e71e
-
SSDEEP
12288:QMrey90E+G98plf4Yb+LKvaQdSOXwpQ4:eyDXyplffTBwj3
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3536-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
Processes:
x3716465.exeg4780743.exeh2391710.exepid process 1480 x3716465.exe 3284 g4780743.exe 964 h2391710.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
x6103409.exex3716465.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x6103409.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3716465.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g4780743.exedescription pid process target process PID 3284 set thread context of 3536 3284 g4780743.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3536 AppLaunch.exe 3536 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3536 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
x6103409.exex3716465.exeg4780743.exedescription pid process target process PID 2560 wrote to memory of 1480 2560 x6103409.exe x3716465.exe PID 2560 wrote to memory of 1480 2560 x6103409.exe x3716465.exe PID 2560 wrote to memory of 1480 2560 x6103409.exe x3716465.exe PID 1480 wrote to memory of 3284 1480 x3716465.exe g4780743.exe PID 1480 wrote to memory of 3284 1480 x3716465.exe g4780743.exe PID 1480 wrote to memory of 3284 1480 x3716465.exe g4780743.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 3284 wrote to memory of 3536 3284 g4780743.exe AppLaunch.exe PID 1480 wrote to memory of 964 1480 x3716465.exe h2391710.exe PID 1480 wrote to memory of 964 1480 x3716465.exe h2391710.exe PID 1480 wrote to memory of 964 1480 x3716465.exe h2391710.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\x6103409.exe"C:\Users\Admin\AppData\Local\Temp\x6103409.exe"
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3716465.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3716465.exe
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4780743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4780743.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2391710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2391710.exe
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3716465.exeFilesize
320KB
MD5bd8aac74df67f6fde61f5f9a924ed6d4
SHA1836e6a69bbef277e18383abe776abc058b9c5341
SHA2564e82ae18daf05be90f7731212b8b696a52e48d1a771d434e99c7705bf6e5486b
SHA512da1c41e43d9ef43eb78b39cd7a1aa1d443181d189385065e8380c188d981436cac43cc33d3d72c251739ce2719472c4bb5706d44adda540e2b50213c2722c727
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3716465.exeFilesize
320KB
MD5bd8aac74df67f6fde61f5f9a924ed6d4
SHA1836e6a69bbef277e18383abe776abc058b9c5341
SHA2564e82ae18daf05be90f7731212b8b696a52e48d1a771d434e99c7705bf6e5486b
SHA512da1c41e43d9ef43eb78b39cd7a1aa1d443181d189385065e8380c188d981436cac43cc33d3d72c251739ce2719472c4bb5706d44adda540e2b50213c2722c727
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4780743.exeFilesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4780743.exeFilesize
236KB
MD535e9af813fed242aacb760b30ef4bc9b
SHA1463fedc2556f79351422a4f35d5504ed05738f59
SHA25627884f346de6e135ffc7559cc22ad9075e643996665dde4f6ad9b85d3bf049c7
SHA5124c8538e180830b57e500f32e5d4416c4e5ae4c6442389c3578c60341a11df0bf61ef6499f0a9a473210f338c72101a285fa2c6b79b7c999944d26b970c3f7523
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2391710.exeFilesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2391710.exeFilesize
174KB
MD52f1b9cdf5437829d0b5dfc330aa68a46
SHA12b7e1d147bc90dc655275566f77343006e5aed83
SHA25646e347c5529f632394301cfa26bca532887f4e375d1e16438366ab9afed77015
SHA512ce9f8b5bf205734915b538f1a0d0c39e34e85e33694fbb255274fe990dbf7c9238b1a87f2407f31c02f0ddbef20fe152cbd6017fbbc4dbbfb677b11afa84df9a
-
memory/964-33-0x0000000005690000-0x00000000056DB000-memory.dmpFilesize
300KB
-
memory/964-21-0x0000000000CB0000-0x0000000000CE0000-memory.dmpFilesize
192KB
-
memory/964-39-0x00000000737B0000-0x0000000073E9E000-memory.dmpFilesize
6MB
-
memory/964-23-0x00000000737B0000-0x0000000073E9E000-memory.dmpFilesize
6MB
-
memory/964-24-0x00000000015D0000-0x00000000015D6000-memory.dmpFilesize
24KB
-
memory/964-25-0x0000000005CA0000-0x00000000062A6000-memory.dmpFilesize
6MB
-
memory/964-26-0x00000000057A0000-0x00000000058AA000-memory.dmpFilesize
1MB
-
memory/964-27-0x00000000054C0000-0x00000000054D2000-memory.dmpFilesize
72KB
-
memory/964-32-0x0000000005520000-0x000000000555E000-memory.dmpFilesize
248KB
-
memory/3536-14-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3536-38-0x00000000737B0000-0x0000000073E9E000-memory.dmpFilesize
6MB
-
memory/3536-22-0x00000000737B0000-0x0000000073E9E000-memory.dmpFilesize
6MB
-
memory/3536-54-0x00000000737B0000-0x0000000073E9E000-memory.dmpFilesize
6MB