Analysis
-
max time kernel
211s -
max time network
241s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
Resource
win10v2004-20230915-en
General
-
Target
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
-
Size
1.0MB
-
MD5
db8acd5be8a7c44b2ba095f8b7a0e4ca
-
SHA1
c76e2e44da677d0125552be5854446a38245783a
-
SHA256
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9
-
SHA512
417bee2b74914c8e304254ec7b346a18e8d053a6ca834378b32e380531d48373de4c31377855318574bc84bf763a8aba58c3b18113d42358390936110f839f36
-
SSDEEP
24576:4yx+FdLEae5sGpHBqDB57wt/TEKt4xi2xaF+yP:/gFdwae5sGHg7wTvOximaF
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4524-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4524-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4524-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4524-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4032-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 388 z8108492.exe 2440 z6831366.exe 4652 z2820256.exe 3768 z8902725.exe 4492 q6092041.exe 2308 r2624228.exe 5012 s0589481.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8902725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8108492.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6831366.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2820256.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4492 set thread context of 4032 4492 q6092041.exe 92 PID 2308 set thread context of 4524 2308 r2624228.exe 99 PID 5012 set thread context of 1628 5012 s0589481.exe 105 -
Program crash 4 IoCs
pid pid_target Process procid_target 2388 4492 WerFault.exe 91 4536 2308 WerFault.exe 98 2628 4524 WerFault.exe 99 3448 5012 WerFault.exe 104 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4032 AppLaunch.exe 4032 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4032 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2856 wrote to memory of 388 2856 d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe 87 PID 2856 wrote to memory of 388 2856 d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe 87 PID 2856 wrote to memory of 388 2856 d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe 87 PID 388 wrote to memory of 2440 388 z8108492.exe 88 PID 388 wrote to memory of 2440 388 z8108492.exe 88 PID 388 wrote to memory of 2440 388 z8108492.exe 88 PID 2440 wrote to memory of 4652 2440 z6831366.exe 89 PID 2440 wrote to memory of 4652 2440 z6831366.exe 89 PID 2440 wrote to memory of 4652 2440 z6831366.exe 89 PID 4652 wrote to memory of 3768 4652 z2820256.exe 90 PID 4652 wrote to memory of 3768 4652 z2820256.exe 90 PID 4652 wrote to memory of 3768 4652 z2820256.exe 90 PID 3768 wrote to memory of 4492 3768 z8902725.exe 91 PID 3768 wrote to memory of 4492 3768 z8902725.exe 91 PID 3768 wrote to memory of 4492 3768 z8902725.exe 91 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 4492 wrote to memory of 4032 4492 q6092041.exe 92 PID 3768 wrote to memory of 2308 3768 z8902725.exe 98 PID 3768 wrote to memory of 2308 3768 z8902725.exe 98 PID 3768 wrote to memory of 2308 3768 z8902725.exe 98 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 2308 wrote to memory of 4524 2308 r2624228.exe 99 PID 4652 wrote to memory of 5012 4652 z2820256.exe 104 PID 4652 wrote to memory of 5012 4652 z2820256.exe 104 PID 4652 wrote to memory of 5012 4652 z2820256.exe 104 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105 PID 5012 wrote to memory of 1628 5012 s0589481.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe"C:\Users\Admin\AppData\Local\Temp\d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 5527⤵
- Program crash
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2624228.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2624228.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 5408⤵
- Program crash
PID:2628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 5807⤵
- Program crash
PID:4536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0589481.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0589481.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 5526⤵
- Program crash
PID:3448
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4492 -ip 44921⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2308 -ip 23081⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4524 -ip 45241⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5012 -ip 50121⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
960KB
MD55aed6e76df3b8c8724ca52ca0ef9372b
SHA1dcfbf75722b99b03bd3a60b0aadc9391aba7d9af
SHA2565419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f
SHA512951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68
-
Filesize
960KB
MD55aed6e76df3b8c8724ca52ca0ef9372b
SHA1dcfbf75722b99b03bd3a60b0aadc9391aba7d9af
SHA2565419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f
SHA512951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68
-
Filesize
777KB
MD518a563479c3595a2a1ae02df067a4411
SHA11a7f67b6c0c9c471c2de5da303fda3166baa19b0
SHA256a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874
SHA5121ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899
-
Filesize
777KB
MD518a563479c3595a2a1ae02df067a4411
SHA11a7f67b6c0c9c471c2de5da303fda3166baa19b0
SHA256a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874
SHA5121ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899
-
Filesize
595KB
MD5095a1656d85be124deea780c6a2b7e84
SHA131da21614f669180d1084eb71ca971d24d01acc3
SHA2560c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655
SHA5129bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007
-
Filesize
595KB
MD5095a1656d85be124deea780c6a2b7e84
SHA131da21614f669180d1084eb71ca971d24d01acc3
SHA2560c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655
SHA5129bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007
-
Filesize
384KB
MD5d83eca2b61293eb44a8795e2d35d82c1
SHA133f7fa9a168fa79322eaf47e04184ce12794d08b
SHA25624082d9d02d9cb29d9e9601a2780a1eb607453c97873bd5dc40bde3bd05ea9fa
SHA5127d099950a4ebb55eb71df0dd9b4b78fcb0bfa0c4a37550adfbf5f2039dd5c8d283d042a0498d944a6ab4cd97ceace83ee391282eed47b2f35d03d1b4c99364d2
-
Filesize
384KB
MD5d83eca2b61293eb44a8795e2d35d82c1
SHA133f7fa9a168fa79322eaf47e04184ce12794d08b
SHA25624082d9d02d9cb29d9e9601a2780a1eb607453c97873bd5dc40bde3bd05ea9fa
SHA5127d099950a4ebb55eb71df0dd9b4b78fcb0bfa0c4a37550adfbf5f2039dd5c8d283d042a0498d944a6ab4cd97ceace83ee391282eed47b2f35d03d1b4c99364d2
-
Filesize
334KB
MD5858b235e76cd4210afc589742eb85509
SHA10727c7972d6b15b1260b10a60885bf4486b28252
SHA256fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8
SHA5128850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603
-
Filesize
334KB
MD5858b235e76cd4210afc589742eb85509
SHA10727c7972d6b15b1260b10a60885bf4486b28252
SHA256fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8
SHA5128850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603
-
Filesize
221KB
MD5d494f34caf7041adfafbc850166ed57b
SHA106f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d
SHA256f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac
SHA51277067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548
-
Filesize
221KB
MD5d494f34caf7041adfafbc850166ed57b
SHA106f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d
SHA256f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac
SHA51277067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548
-
Filesize
350KB
MD5b043eaf7eb3e6136e14e6b582dea7c23
SHA1146643831aad28a171184f30263b2d8def7d69e6
SHA25624369ae8fb7a9c025d99d374e39d7de729c6d5fcbce22eea664fa0e9b76f2f71
SHA512dc3eaf05f41cb414a4fc5418df3c4a671b40532fd3700215cf627fb3f90001e8cb3525efdcfff890315212a3432fda82af74101865d1cfaa3c3c5f11776507b9
-
Filesize
350KB
MD5b043eaf7eb3e6136e14e6b582dea7c23
SHA1146643831aad28a171184f30263b2d8def7d69e6
SHA25624369ae8fb7a9c025d99d374e39d7de729c6d5fcbce22eea664fa0e9b76f2f71
SHA512dc3eaf05f41cb414a4fc5418df3c4a671b40532fd3700215cf627fb3f90001e8cb3525efdcfff890315212a3432fda82af74101865d1cfaa3c3c5f11776507b9