Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
x7652216.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x7652216.exe
Resource
win10v2004-20230915-en
General
-
Target
x7652216.exe
-
Size
650KB
-
MD5
e4930d0402626380a49a84ff8a8b263e
-
SHA1
a0b45408d1f9f7358605e7c44f809c5c8635fb91
-
SHA256
bd8b8e72d230aac3d91cad7dd03ebce1c0910c62743c651af955373a76a724d8
-
SHA512
2064461cfa0e92fbcd82d22cff46d7434c3f19ecf1adb5544560e3edec8d9d29c1889b90e0debb5fb771e8b7262ffc18ced0ff1ba439b41abde41f1e7fa61fdc
-
SSDEEP
12288:pMrgy903SmNF9AGtXLrrNeFDZ+oEY3SnAXgypsudbcamgd:dyrmHyGtLrpeFZVSGgy/bcamgd
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4540-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3388 x2028485.exe 1936 g9158772.exe 3808 h8768023.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x7652216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2028485.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 4540 1936 g9158772.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 2036 1936 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4540 AppLaunch.exe 4540 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4540 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1120 wrote to memory of 3388 1120 x7652216.exe 83 PID 1120 wrote to memory of 3388 1120 x7652216.exe 83 PID 1120 wrote to memory of 3388 1120 x7652216.exe 83 PID 3388 wrote to memory of 1936 3388 x2028485.exe 84 PID 3388 wrote to memory of 1936 3388 x2028485.exe 84 PID 3388 wrote to memory of 1936 3388 x2028485.exe 84 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 1936 wrote to memory of 4540 1936 g9158772.exe 87 PID 3388 wrote to memory of 3808 3388 x2028485.exe 92 PID 3388 wrote to memory of 3808 3388 x2028485.exe 92 PID 3388 wrote to memory of 3808 3388 x2028485.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\x7652216.exe"C:\Users\Admin\AppData\Local\Temp\x7652216.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2028485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2028485.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9158772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9158772.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 1564⤵
- Program crash
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8768023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8768023.exe3⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1936 -ip 19361⤵PID:1888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD581d2d11c5d134859f6112c984f14c25c
SHA1399c1cb6eef99777d9a7a5edf33d759cd05144e7
SHA256f4282ae1b5c5224f999f4e5e1d5bf25bae5b95999f289ff76014ccc69c5004f9
SHA51292ff065195ffb2ad0e94aeb2dd5ab2cbe04a32672545a48d8e584a5f9b38f7406f0822fc93b4240d10c0c68413cbb5edc036d085cd66c72a233d2dc8b875ade3
-
Filesize
465KB
MD581d2d11c5d134859f6112c984f14c25c
SHA1399c1cb6eef99777d9a7a5edf33d759cd05144e7
SHA256f4282ae1b5c5224f999f4e5e1d5bf25bae5b95999f289ff76014ccc69c5004f9
SHA51292ff065195ffb2ad0e94aeb2dd5ab2cbe04a32672545a48d8e584a5f9b38f7406f0822fc93b4240d10c0c68413cbb5edc036d085cd66c72a233d2dc8b875ade3
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
174KB
MD5b6749d33678dc433c2b940c1c10d2ed6
SHA124d3e6fcadccf027f194e459d266c8b08db6681f
SHA2565a74bc3572bee60d4efc113a7d3412f7e98a0df1873b1d5458b81fbf93041825
SHA5125d2fd66129c8fc7f546f79913c969c8dcaab569eee0aec54964fe04c4f5d22b9babf70875574c0ee67f869b941681a6f1b6e97e73c512b6e35b5a6bfba8795d7
-
Filesize
174KB
MD5b6749d33678dc433c2b940c1c10d2ed6
SHA124d3e6fcadccf027f194e459d266c8b08db6681f
SHA2565a74bc3572bee60d4efc113a7d3412f7e98a0df1873b1d5458b81fbf93041825
SHA5125d2fd66129c8fc7f546f79913c969c8dcaab569eee0aec54964fe04c4f5d22b9babf70875574c0ee67f869b941681a6f1b6e97e73c512b6e35b5a6bfba8795d7