Analysis
-
max time kernel
139s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 11:59
Static task
static1
Behavioral task
behavioral1
Sample
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
Resource
win10v2004-20230915-en
General
-
Target
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
-
Size
2.6MB
-
MD5
417d0554c7f79458682763044a771084
-
SHA1
31386b623d1c36613dcd48bdc2ab5a1edf19edf4
-
SHA256
782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22
-
SHA512
07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b
-
SSDEEP
49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH
Malware Config
Extracted
redline
vasha
77.91.124.82:19071
-
auth_value
42fc61786274daca54d589b85a2c1954
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2240-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4296 x5360434.exe 2488 x3423245.exe 3424 x4451620.exe 4828 g7023018.exe 1756 h6840198.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5360434.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3423245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4451620.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4580 set thread context of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4828 set thread context of 2240 4828 g7023018.exe 101 -
Program crash 2 IoCs
pid pid_target Process procid_target 4840 4580 WerFault.exe 81 4816 4828 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 AppLaunch.exe 2240 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4516 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 89 PID 4580 wrote to memory of 4516 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 89 PID 4580 wrote to memory of 4516 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 89 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 4580 wrote to memory of 3736 4580 782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe 90 PID 3736 wrote to memory of 4296 3736 AppLaunch.exe 94 PID 3736 wrote to memory of 4296 3736 AppLaunch.exe 94 PID 3736 wrote to memory of 4296 3736 AppLaunch.exe 94 PID 4296 wrote to memory of 2488 4296 x5360434.exe 96 PID 4296 wrote to memory of 2488 4296 x5360434.exe 96 PID 4296 wrote to memory of 2488 4296 x5360434.exe 96 PID 2488 wrote to memory of 3424 2488 x3423245.exe 97 PID 2488 wrote to memory of 3424 2488 x3423245.exe 97 PID 2488 wrote to memory of 3424 2488 x3423245.exe 97 PID 3424 wrote to memory of 4828 3424 x4451620.exe 98 PID 3424 wrote to memory of 4828 3424 x4451620.exe 98 PID 3424 wrote to memory of 4828 3424 x4451620.exe 98 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 4828 wrote to memory of 2240 4828 g7023018.exe 101 PID 3424 wrote to memory of 1756 3424 x4451620.exe 104 PID 3424 wrote to memory of 1756 3424 x4451620.exe 104 PID 3424 wrote to memory of 1756 3424 x4451620.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe"C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1527⤵
- Program crash
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exe6⤵
- Executes dropped EXE
PID:1756
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 2722⤵
- Program crash
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4580 -ip 45801⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4828 -ip 48281⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58a68e904f64205e2ec90e43db3a7a1e8
SHA19f88b17311ff3c4c44e0405a087f4f3e0b2c5592
SHA25601f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03
SHA512f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593
-
Filesize
1.0MB
MD58a68e904f64205e2ec90e43db3a7a1e8
SHA19f88b17311ff3c4c44e0405a087f4f3e0b2c5592
SHA25601f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03
SHA512f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593
-
Filesize
651KB
MD5cd7d55036ef681f7602230d5979b2879
SHA1f0f46779d35477fe49115f2ef026cfcf88aa6a77
SHA256cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba
SHA512bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6
-
Filesize
651KB
MD5cd7d55036ef681f7602230d5979b2879
SHA1f0f46779d35477fe49115f2ef026cfcf88aa6a77
SHA256cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba
SHA512bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6
-
Filesize
465KB
MD58c768f79fb1012d8ec1474d97960b8cd
SHA1b6427a45aec52e24a1efd5130ddba5e2ae17511d
SHA25666aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e
SHA51256ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df
-
Filesize
465KB
MD58c768f79fb1012d8ec1474d97960b8cd
SHA1b6427a45aec52e24a1efd5130ddba5e2ae17511d
SHA25666aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e
SHA51256ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df
-
Filesize
899KB
MD589c946869f131eb7d37e928860bfeff8
SHA190237a4510913c03d142c917988dfa46081661d2
SHA256d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7
SHA5125ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621
-
Filesize
899KB
MD589c946869f131eb7d37e928860bfeff8
SHA190237a4510913c03d142c917988dfa46081661d2
SHA256d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7
SHA5125ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621
-
Filesize
174KB
MD5d5decef6cd97c2bbb09f35e42f06bb07
SHA107efb6a6144ba23d021c950474ce5a85789bf747
SHA256710048306084b0505e6bf8a4819fd8154d803de45fd8813eabc27af06c2ac17a
SHA5121ff5911d22560ded709a719b8208f0ac609ddf7dd7f148a8d7e21c0a7962d861afd94d306bb402548d15eeccfd4dbcf5137c35c4e318ef19236b794b50538f6b
-
Filesize
174KB
MD5d5decef6cd97c2bbb09f35e42f06bb07
SHA107efb6a6144ba23d021c950474ce5a85789bf747
SHA256710048306084b0505e6bf8a4819fd8154d803de45fd8813eabc27af06c2ac17a
SHA5121ff5911d22560ded709a719b8208f0ac609ddf7dd7f148a8d7e21c0a7962d861afd94d306bb402548d15eeccfd4dbcf5137c35c4e318ef19236b794b50538f6b