Analysis
-
max time kernel
290s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 06:53
Static task
static1
Behavioral task
behavioral1
Sample
x5182030.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x5182030.exe
Resource
win10-20230915-en
General
-
Target
x5182030.exe
-
Size
326KB
-
MD5
11924a7c6b34d401fce9a0289a495d90
-
SHA1
7e07aa42127ad4e83b4db9988d42f36229275c72
-
SHA256
b610208386aff19bb310792255e5022f47fc360015fde0da73df201153ae013d
-
SHA512
1d1501b04e60ac2e2ebd31a9ec8d62690f556ad4f7b1e3aa7ca822ac8137dc7ae04f8c06e404798973e487f17930fac08237e6329ae0d860a6d3d27218931fb1
-
SSDEEP
6144:K7y+bnr+4p0yN90QErBzQZI0aFkyxWAQh17NpZKE+ShX8yd27JALErj7:pMrYy908xahxWTTxq2X8yUJALEL
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-19-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/1708-17-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/1708-22-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/1708-24-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/1708-26-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
Processes:
g6429604.exeh4643382.exepid process 1740 g6429604.exe 2364 h4643382.exe -
Loads dropped DLL 5 IoCs
Processes:
x5182030.exeg6429604.exeh4643382.exepid process 664 x5182030.exe 664 x5182030.exe 1740 g6429604.exe 664 x5182030.exe 2364 h4643382.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
x5182030.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x5182030.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g6429604.exedescription pid process target process PID 1740 set thread context of 1708 1740 g6429604.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1708 AppLaunch.exe 1708 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1708 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
x5182030.exeg6429604.exedescription pid process target process PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 664 wrote to memory of 1740 664 x5182030.exe g6429604.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 1740 wrote to memory of 1708 1740 g6429604.exe AppLaunch.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe PID 664 wrote to memory of 2364 664 x5182030.exe h4643382.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\x5182030.exe"C:\Users\Admin\AppData\Local\Temp\x5182030.exe"
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exe
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exe
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exeFilesize
174KB
MD51827ae586ad2402dc0adc144a7669594
SHA17c4c2a6be7c2cb469e0ca47d971957620938edea
SHA2560429a60d41dd59931c21923cfaf7158b5678f26d4cd8b2832ba200487a17ab78
SHA5120d20f12df977497f7959a22a5568bc5b681f2e7caad0c6014f19c5a70d49b1ee56e5bf548a3679ce51618d687c68975565ae13a2e1808ba64329d25d6a13f71e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exeFilesize
174KB
MD51827ae586ad2402dc0adc144a7669594
SHA17c4c2a6be7c2cb469e0ca47d971957620938edea
SHA2560429a60d41dd59931c21923cfaf7158b5678f26d4cd8b2832ba200487a17ab78
SHA5120d20f12df977497f7959a22a5568bc5b681f2e7caad0c6014f19c5a70d49b1ee56e5bf548a3679ce51618d687c68975565ae13a2e1808ba64329d25d6a13f71e
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\g6429604.exeFilesize
242KB
MD58989f700c821326027fe2fe0f49e5377
SHA142caa5229b3098681604d0ef16959b4bf0bbb4c2
SHA256f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
SHA5122405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exeFilesize
174KB
MD51827ae586ad2402dc0adc144a7669594
SHA17c4c2a6be7c2cb469e0ca47d971957620938edea
SHA2560429a60d41dd59931c21923cfaf7158b5678f26d4cd8b2832ba200487a17ab78
SHA5120d20f12df977497f7959a22a5568bc5b681f2e7caad0c6014f19c5a70d49b1ee56e5bf548a3679ce51618d687c68975565ae13a2e1808ba64329d25d6a13f71e
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4643382.exeFilesize
174KB
MD51827ae586ad2402dc0adc144a7669594
SHA17c4c2a6be7c2cb469e0ca47d971957620938edea
SHA2560429a60d41dd59931c21923cfaf7158b5678f26d4cd8b2832ba200487a17ab78
SHA5120d20f12df977497f7959a22a5568bc5b681f2e7caad0c6014f19c5a70d49b1ee56e5bf548a3679ce51618d687c68975565ae13a2e1808ba64329d25d6a13f71e
-
memory/1708-17-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1708-24-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-26-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-22-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-15-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-19-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1708-13-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2364-33-0x0000000000150000-0x0000000000180000-memory.dmpFilesize
192KB
-
memory/2364-34-0x00000000002E0000-0x00000000002E6000-memory.dmpFilesize
24KB