Analysis
-
max time kernel
163s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 01:51
Static task
static1
Behavioral task
behavioral1
Sample
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
Resource
win10v2004-20230915-en
General
-
Target
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
-
Size
707KB
-
MD5
af2e92d8bc98c86c3230c8cfa9356da5
-
SHA1
896650bbd6962cee4ebe06ae03d95b2a80c4bb56
-
SHA256
f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932
-
SHA512
f621514c3bfd06f12e46868e2135cac382a97a31b480b6a76bcf2a44c8dd8619fc79a5d9e3df06faaa44831d8136fbef18f66f97454cb58a8b53fab173b946e9
-
SSDEEP
12288:6MrEy90tKhfjzGbx8A9eX3CqNmg7ow8EizLEzePJS5aLoey1FY4Js8aRdZ:ay+KFjzAOAIX9Nmioeiz+ehS5xWEafZ
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1600-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 472 v2683329.exe 4808 v4521125.exe 4784 a2687109.exe 4840 b4661470.exe 4588 c5813676.exe 2912 d2211551.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2683329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4521125.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4784 set thread context of 1600 4784 a2687109.exe 91 PID 4840 set thread context of 2868 4840 b4661470.exe 98 PID 4588 set thread context of 4452 4588 c5813676.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 4832 4784 WerFault.exe 89 2108 4840 WerFault.exe 96 3548 2868 WerFault.exe 98 4980 4588 WerFault.exe 106 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 AppLaunch.exe 1600 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 AppLaunch.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4236 wrote to memory of 472 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 87 PID 4236 wrote to memory of 472 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 87 PID 4236 wrote to memory of 472 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 87 PID 472 wrote to memory of 4808 472 v2683329.exe 88 PID 472 wrote to memory of 4808 472 v2683329.exe 88 PID 472 wrote to memory of 4808 472 v2683329.exe 88 PID 4808 wrote to memory of 4784 4808 v4521125.exe 89 PID 4808 wrote to memory of 4784 4808 v4521125.exe 89 PID 4808 wrote to memory of 4784 4808 v4521125.exe 89 PID 4784 wrote to memory of 1280 4784 a2687109.exe 90 PID 4784 wrote to memory of 1280 4784 a2687109.exe 90 PID 4784 wrote to memory of 1280 4784 a2687109.exe 90 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4784 wrote to memory of 1600 4784 a2687109.exe 91 PID 4808 wrote to memory of 4840 4808 v4521125.exe 96 PID 4808 wrote to memory of 4840 4808 v4521125.exe 96 PID 4808 wrote to memory of 4840 4808 v4521125.exe 96 PID 4840 wrote to memory of 1640 4840 b4661470.exe 97 PID 4840 wrote to memory of 1640 4840 b4661470.exe 97 PID 4840 wrote to memory of 1640 4840 b4661470.exe 97 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 4840 wrote to memory of 2868 4840 b4661470.exe 98 PID 472 wrote to memory of 4588 472 v2683329.exe 106 PID 472 wrote to memory of 4588 472 v2683329.exe 106 PID 472 wrote to memory of 4588 472 v2683329.exe 106 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4588 wrote to memory of 4452 4588 c5813676.exe 107 PID 4236 wrote to memory of 2912 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 110 PID 4236 wrote to memory of 2912 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 110 PID 4236 wrote to memory of 2912 4236 f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe"C:\Users\Admin\AppData\Local\Temp\f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 5725⤵
- Program crash
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1926⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 5725⤵
- Program crash
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 5524⤵
- Program crash
PID:4980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exe2⤵
- Executes dropped EXE
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 47841⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4840 -ip 48401⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2868 -ip 28681⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4588 -ip 45881⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
19KB
MD5a2e2e30f5eb57cb3077f72f9723ebd24
SHA120742d5adff3f08f3193a39164122a5016ac65a3
SHA256452aaf291cf1001cb353bed758571fb3c2b5ce1c1a11044b43581ebfeedd1998
SHA5129a5de96a09bf70d67e78f102ce09a9a15cd36511ac1cd89c3142d083271e8ecded76da9da1e30ec5fcdbd491c6189a952daeb44a80bcd869432f551df40d6260
-
Filesize
19KB
MD5a2e2e30f5eb57cb3077f72f9723ebd24
SHA120742d5adff3f08f3193a39164122a5016ac65a3
SHA256452aaf291cf1001cb353bed758571fb3c2b5ce1c1a11044b43581ebfeedd1998
SHA5129a5de96a09bf70d67e78f102ce09a9a15cd36511ac1cd89c3142d083271e8ecded76da9da1e30ec5fcdbd491c6189a952daeb44a80bcd869432f551df40d6260
-
Filesize
605KB
MD5d18d3f7e37e341e6206497ce5e16070d
SHA18e60bd9ca0f26ee9aff5df47b42f522c9035f9bb
SHA256ce95e9a205c0fef32d85d389c7c62fccd69a60fa02896913bf22ea20b74ee19b
SHA51294ae2f032535bc34eea4d9a21cef1f98776e6c5df735da225892a7a55cddfc9ac56610843e2128cec65a43cc67a296f7108040e685cb9df405114f0b869fb36a
-
Filesize
605KB
MD5d18d3f7e37e341e6206497ce5e16070d
SHA18e60bd9ca0f26ee9aff5df47b42f522c9035f9bb
SHA256ce95e9a205c0fef32d85d389c7c62fccd69a60fa02896913bf22ea20b74ee19b
SHA51294ae2f032535bc34eea4d9a21cef1f98776e6c5df735da225892a7a55cddfc9ac56610843e2128cec65a43cc67a296f7108040e685cb9df405114f0b869fb36a
-
Filesize
383KB
MD521e99b5de4bdf0faee3f07cfa02013c2
SHA1a1edc793c101d8103e3d559b64008b3a9fe9f8a3
SHA256548c5f61414b41b9be0f839ccf799e2d0a7b004afbe859472816093105e822de
SHA512502df432ddfa9dfcd38ec006d3602c705474ee4bfb8090f4e77e4ea22b98bc8dffd81da949c7bcc9a5a352ef54774427e12c7e67c23984cbd73417465ab266a5
-
Filesize
383KB
MD521e99b5de4bdf0faee3f07cfa02013c2
SHA1a1edc793c101d8103e3d559b64008b3a9fe9f8a3
SHA256548c5f61414b41b9be0f839ccf799e2d0a7b004afbe859472816093105e822de
SHA512502df432ddfa9dfcd38ec006d3602c705474ee4bfb8090f4e77e4ea22b98bc8dffd81da949c7bcc9a5a352ef54774427e12c7e67c23984cbd73417465ab266a5
-
Filesize
345KB
MD573e9dc1d4918d4fe10aeba6f95578003
SHA1c762b80aadcbff851f42d2207b7000bf14fde7bc
SHA256ed0553998627d8ff4d608eaebb98b4c294545c88143f6dc05e90fa41cbdc6ad3
SHA51226ced4b1d9d92f1d8881cdf7037996ce17c531358df632aa9a664691a152d106d5bc31b24d1646bd5770490e5c651b86f9450c5248cafdb2dd4296427b065be7
-
Filesize
345KB
MD573e9dc1d4918d4fe10aeba6f95578003
SHA1c762b80aadcbff851f42d2207b7000bf14fde7bc
SHA256ed0553998627d8ff4d608eaebb98b4c294545c88143f6dc05e90fa41cbdc6ad3
SHA51226ced4b1d9d92f1d8881cdf7037996ce17c531358df632aa9a664691a152d106d5bc31b24d1646bd5770490e5c651b86f9450c5248cafdb2dd4296427b065be7
-
Filesize
220KB
MD53f7239fd0eec63dbbc6e0e25072052ac
SHA162f12b4920760841a2fa35960537d446a4613cf4
SHA2563586e424b4431dbb96377f60a603979205201b6128e189091dd3efaf9a4b1aae
SHA512870e678610524d8edcdd20c4c26b18c876700354142f049c4aedc69790d170db156ea91dce46743570e2479edebf6a1ff668bf41efc7989213d7a6b856efea82
-
Filesize
220KB
MD53f7239fd0eec63dbbc6e0e25072052ac
SHA162f12b4920760841a2fa35960537d446a4613cf4
SHA2563586e424b4431dbb96377f60a603979205201b6128e189091dd3efaf9a4b1aae
SHA512870e678610524d8edcdd20c4c26b18c876700354142f049c4aedc69790d170db156ea91dce46743570e2479edebf6a1ff668bf41efc7989213d7a6b856efea82
-
Filesize
364KB
MD5beacaccc7027eeb103f12a8c5fbb4490
SHA1b6424bff86e8220777d0ecb15f1e30088832e15a
SHA25649aa5deb0b75b0ebc1c4052ba7a23dc6ebfe2693fb1dfe6e951a1af700318201
SHA512c32fa3cfc1309a8090c0a8d0893d9a9dc388aa8904a5e7a540596b2060f00eb956e7d32d5533496ba1e8808d68b457bfc0696b58ad06aae48c2b0ce1a6849386
-
Filesize
364KB
MD5beacaccc7027eeb103f12a8c5fbb4490
SHA1b6424bff86e8220777d0ecb15f1e30088832e15a
SHA25649aa5deb0b75b0ebc1c4052ba7a23dc6ebfe2693fb1dfe6e951a1af700318201
SHA512c32fa3cfc1309a8090c0a8d0893d9a9dc388aa8904a5e7a540596b2060f00eb956e7d32d5533496ba1e8808d68b457bfc0696b58ad06aae48c2b0ce1a6849386