Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 10:16
Static task
static1
Behavioral task
behavioral1
Sample
a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe
Resource
win10v2004-20230915-en
General
-
Target
a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe
-
Size
1.1MB
-
MD5
45469de66c416be7c6a14c6c381f2eb6
-
SHA1
6c4a3f212d80804ce3abdd399d4314d375c97d5b
-
SHA256
a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2
-
SHA512
9aa1bf246812b876df8920a4148f47b43ff28023872a0a011f7c747ce372a1445cfab9677199a28e25bf8b73b88fd94b71468ebb3a50f0d2d53220d3fc139439
-
SSDEEP
24576:Eygx+DgHXmOyVLpc9jUqg0873jLSi89zzqSIXMViyv0:Tw2OopcVH4ubJiXMViS
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/5112-28-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4124 x3803016.exe 4532 x7693758.exe 3684 x2568520.exe 3808 g9754782.exe 3564 h4961463.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3803016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7693758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2568520.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3808 set thread context of 5112 3808 g9754782.exe 91 -
Program crash 1 IoCs
pid pid_target Process procid_target 4788 3808 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 AppLaunch.exe 5112 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5112 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4124 2024 a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe 85 PID 2024 wrote to memory of 4124 2024 a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe 85 PID 2024 wrote to memory of 4124 2024 a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe 85 PID 4124 wrote to memory of 4532 4124 x3803016.exe 86 PID 4124 wrote to memory of 4532 4124 x3803016.exe 86 PID 4124 wrote to memory of 4532 4124 x3803016.exe 86 PID 4532 wrote to memory of 3684 4532 x7693758.exe 87 PID 4532 wrote to memory of 3684 4532 x7693758.exe 87 PID 4532 wrote to memory of 3684 4532 x7693758.exe 87 PID 3684 wrote to memory of 3808 3684 x2568520.exe 88 PID 3684 wrote to memory of 3808 3684 x2568520.exe 88 PID 3684 wrote to memory of 3808 3684 x2568520.exe 88 PID 3808 wrote to memory of 3176 3808 g9754782.exe 90 PID 3808 wrote to memory of 3176 3808 g9754782.exe 90 PID 3808 wrote to memory of 3176 3808 g9754782.exe 90 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3808 wrote to memory of 5112 3808 g9754782.exe 91 PID 3684 wrote to memory of 3564 3684 x2568520.exe 96 PID 3684 wrote to memory of 3564 3684 x2568520.exe 96 PID 3684 wrote to memory of 3564 3684 x2568520.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe"C:\Users\Admin\AppData\Local\Temp\a4793e171af30dbed3e67ad00dabee05a6a6b21cb525121f39bf1945b694efd2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3803016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3803016.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7693758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7693758.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2568520.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2568520.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9754782.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9754782.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 5886⤵
- Program crash
PID:4788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4961463.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4961463.exe5⤵
- Executes dropped EXE
PID:3564
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3808 -ip 38081⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ab23aa818469c2a03f4d04cf42c9f5ac
SHA1a3ed56560e4a34cfddab536500dce8c049ffa8d9
SHA256325182af7a81816335f560f5182aaaeec4736abae71c2ac70a60b329326f8590
SHA512b07acb3bc99e6fecb645bb94368478b22e3dbb3a5265d77f3187a5683e3c0c1fcd8bb7d982a5080d5a47c56b231aceca32db521a1ef4dd1975ca16b782acc7f2
-
Filesize
1.0MB
MD5ab23aa818469c2a03f4d04cf42c9f5ac
SHA1a3ed56560e4a34cfddab536500dce8c049ffa8d9
SHA256325182af7a81816335f560f5182aaaeec4736abae71c2ac70a60b329326f8590
SHA512b07acb3bc99e6fecb645bb94368478b22e3dbb3a5265d77f3187a5683e3c0c1fcd8bb7d982a5080d5a47c56b231aceca32db521a1ef4dd1975ca16b782acc7f2
-
Filesize
651KB
MD5d513abe4a7e3f8e49c9bde2ea75e387c
SHA18aeca9cfa5c5b03efc3dce1825053f619b23e08f
SHA256007b4292df1a3d512785be803b3cce2aeb191eaedd5015232414af9d748e120e
SHA512cee0460b37995362d9c90ee34e69a730bd141e71a512d0f975bac7bce7356a671eaed8f738dab7c2785f53ad6cddc890c27c759ca7b6215a34c016edec3db059
-
Filesize
651KB
MD5d513abe4a7e3f8e49c9bde2ea75e387c
SHA18aeca9cfa5c5b03efc3dce1825053f619b23e08f
SHA256007b4292df1a3d512785be803b3cce2aeb191eaedd5015232414af9d748e120e
SHA512cee0460b37995362d9c90ee34e69a730bd141e71a512d0f975bac7bce7356a671eaed8f738dab7c2785f53ad6cddc890c27c759ca7b6215a34c016edec3db059
-
Filesize
466KB
MD5d9a440ccf93f67515ba919581918e568
SHA18a0ada8f8f9982c3c7a607a48c41a1f280beb76d
SHA256a7d5488691692178aa6a5eb59dc5e750d3e901bc5a84e48883db976e5d444b7a
SHA512c5bd2725c256184bb73eb174208dadbc9e2af18cc6e524dd2096239a2f6f3d508e3aa8c925eccf585300a58a04509e09730eabe8cb8bc93d0c29d9dc8f8e23f6
-
Filesize
466KB
MD5d9a440ccf93f67515ba919581918e568
SHA18a0ada8f8f9982c3c7a607a48c41a1f280beb76d
SHA256a7d5488691692178aa6a5eb59dc5e750d3e901bc5a84e48883db976e5d444b7a
SHA512c5bd2725c256184bb73eb174208dadbc9e2af18cc6e524dd2096239a2f6f3d508e3aa8c925eccf585300a58a04509e09730eabe8cb8bc93d0c29d9dc8f8e23f6
-
Filesize
899KB
MD53d35358489b3cc3687ad2d233c3ca8e2
SHA13cab271ba7502baa114c28fcfa912ce925c24797
SHA25682fbe0f411a4bf587e6ffbb57f878ce51609930527a48f4353b1a3ff1d9fc2e3
SHA5125c8a3796c1116706d1b0cbd5e513aaebef8f10a7d3651cb1a445e63e7d53dbaa79385a8903c7fd886e8aba82297d099a895592ba15af0f655995e41cb9a54cfc
-
Filesize
899KB
MD53d35358489b3cc3687ad2d233c3ca8e2
SHA13cab271ba7502baa114c28fcfa912ce925c24797
SHA25682fbe0f411a4bf587e6ffbb57f878ce51609930527a48f4353b1a3ff1d9fc2e3
SHA5125c8a3796c1116706d1b0cbd5e513aaebef8f10a7d3651cb1a445e63e7d53dbaa79385a8903c7fd886e8aba82297d099a895592ba15af0f655995e41cb9a54cfc
-
Filesize
174KB
MD5f5bc187098ee11e8a3daa4ec2ba4d826
SHA1f49c95fed7165365b98fc8d4e3acf8baddb182e3
SHA2565d965103ecb69e868c817e627a7be8d9eb92bad10bde8d2423e7f4beb5665f83
SHA512b64b71af7553ef7f7a81b4903ad3447246a1ef3af1c0db42dc3ba2914d0ea59c1d09aa38df858ee649d6440af67a20cb8de82b2e31a5f88ee3e7eb2ae3146b58
-
Filesize
174KB
MD5f5bc187098ee11e8a3daa4ec2ba4d826
SHA1f49c95fed7165365b98fc8d4e3acf8baddb182e3
SHA2565d965103ecb69e868c817e627a7be8d9eb92bad10bde8d2423e7f4beb5665f83
SHA512b64b71af7553ef7f7a81b4903ad3447246a1ef3af1c0db42dc3ba2914d0ea59c1d09aa38df858ee649d6440af67a20cb8de82b2e31a5f88ee3e7eb2ae3146b58