Analysis
-
max time kernel
185s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
x7407766.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x7407766.exe
Resource
win10v2004-20230915-en
General
-
Target
x7407766.exe
-
Size
651KB
-
MD5
00672371288ace6692655c1466ee9080
-
SHA1
e71135c985a9f6c0af5e06bd2689733be286e39d
-
SHA256
3adcea8f6d2f73981a4e747c970e2aec39f7cbbcbe6762e73033bb00f7ec48a4
-
SHA512
e194221e83097bec50ddcf26cdebbf56440769260bdb3b36d93265b783735fddca36ba43484594b0e063d289d3148bd3476ba881e3c36590078d0cdf730df77d
-
SSDEEP
12288:ZMrdy90fIb5Lu7aQROboCICicpVhwUaGAQcHxssw9zB3:Ay8+QREVITM0BGBoxE3
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3256-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4216 x8868581.exe 1140 g9900190.exe 4140 h8946284.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x7407766.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8868581.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1140 set thread context of 3256 1140 g9900190.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 4920 1140 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3256 AppLaunch.exe 3256 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3256 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4216 2000 x7407766.exe 84 PID 2000 wrote to memory of 4216 2000 x7407766.exe 84 PID 2000 wrote to memory of 4216 2000 x7407766.exe 84 PID 4216 wrote to memory of 1140 4216 x8868581.exe 85 PID 4216 wrote to memory of 1140 4216 x8868581.exe 85 PID 4216 wrote to memory of 1140 4216 x8868581.exe 85 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 1140 wrote to memory of 3256 1140 g9900190.exe 87 PID 4216 wrote to memory of 4140 4216 x8868581.exe 92 PID 4216 wrote to memory of 4140 4216 x8868581.exe 92 PID 4216 wrote to memory of 4140 4216 x8868581.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\x7407766.exe"C:\Users\Admin\AppData\Local\Temp\x7407766.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8868581.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8868581.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9900190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9900190.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 5764⤵
- Program crash
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8946284.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8946284.exe3⤵
- Executes dropped EXE
PID:4140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1140 -ip 11401⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
466KB
MD555f55a751377f41bd455d308e4f213ec
SHA1ab947d9ec9d3b1a79dbc6def4ca4f30bbc0ab972
SHA256592d6e37ad95d2ea99041a035dc4a1ed21a7d2451cd29272511b015664109c29
SHA512a1bf556cc4dfed949be38008f06d6526e97a5ad4447ebfded11dcf02fa10976ffdcab1093812d1779264fc1a28e0d252ada79329733d2e1ca62fa3aed50e253b
-
Filesize
466KB
MD555f55a751377f41bd455d308e4f213ec
SHA1ab947d9ec9d3b1a79dbc6def4ca4f30bbc0ab972
SHA256592d6e37ad95d2ea99041a035dc4a1ed21a7d2451cd29272511b015664109c29
SHA512a1bf556cc4dfed949be38008f06d6526e97a5ad4447ebfded11dcf02fa10976ffdcab1093812d1779264fc1a28e0d252ada79329733d2e1ca62fa3aed50e253b
-
Filesize
899KB
MD5aa9812a5b19266d0cdd6b2c97b479a97
SHA1e48c0d1ff32152a0e6ecdc5cd326beae7436d811
SHA2565eb4c5a55527440dcda0ba44a4a20ff8e5c3b38405ecefb066b279dcbf34f813
SHA512b6427c7fab95c46bf6d749ed71d40335c6e00b5f14f9afce17edb42c40d62acd02296de3194687cc6b6a77e276d5915a6ef6deacbf646bd853ad92535b6df4af
-
Filesize
899KB
MD5aa9812a5b19266d0cdd6b2c97b479a97
SHA1e48c0d1ff32152a0e6ecdc5cd326beae7436d811
SHA2565eb4c5a55527440dcda0ba44a4a20ff8e5c3b38405ecefb066b279dcbf34f813
SHA512b6427c7fab95c46bf6d749ed71d40335c6e00b5f14f9afce17edb42c40d62acd02296de3194687cc6b6a77e276d5915a6ef6deacbf646bd853ad92535b6df4af
-
Filesize
174KB
MD585c52602579abcafc557dd15d76ed860
SHA1ced3758308d23f9c7b2e9cb24c0dd906d7a4b805
SHA2568cade6e5c239f99df48fb3a1cebf7ffcfa5b9ee61a6b730e105095fc554814c5
SHA512e3baff5d433af02ef4b0037dc708c9711a4ea9c7fd3eb17b64316d8dbafcf8dd74735e8e7c2e24edba6adbd65834720a72676188f5d99788898a94ac1ca990bc
-
Filesize
174KB
MD585c52602579abcafc557dd15d76ed860
SHA1ced3758308d23f9c7b2e9cb24c0dd906d7a4b805
SHA2568cade6e5c239f99df48fb3a1cebf7ffcfa5b9ee61a6b730e105095fc554814c5
SHA512e3baff5d433af02ef4b0037dc708c9711a4ea9c7fd3eb17b64316d8dbafcf8dd74735e8e7c2e24edba6adbd65834720a72676188f5d99788898a94ac1ca990bc