Analysis
-
max time kernel
153s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe
-
Size
753KB
-
MD5
cd477aac77d7453206b9e984a4444fc3
-
SHA1
c798de0cf5623a3d7b4beb0e8fa98bb6f32e91b9
-
SHA256
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb
-
SHA512
a9ac3f52f11f0d4c439cbbcf99a864928b5fd4713bc867cc28d33655276e8c853310e7b4d28d99d64bab94377f199b35da24e68d11a0b260a099e1fb583764f8
-
SSDEEP
12288:qMrYy90EqcrEywjFwiKj1PC4/JTc557oUsiB3yPC/oVSnuFlx1GM7Hzj:eyUOiKFC4BTI57oUEkoVcWvnj
Malware Config
Extracted
redline
dusa
83.97.73.127:19045
-
auth_value
ee896466545fedf9de5406175fb82de5
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/740-23-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
y9143845.exey5457738.exek5231148.exel3651390.exepid process 796 y9143845.exe 4828 y5457738.exe 4952 k5231148.exe 2032 l3651390.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exey9143845.exey5457738.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9143845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5457738.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
k5231148.exedescription pid process target process PID 4952 set thread context of 740 4952 k5231148.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 740 AppLaunch.exe 740 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 740 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exey9143845.exey5457738.exek5231148.exedescription pid process target process PID 2832 wrote to memory of 796 2832 7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe y9143845.exe PID 2832 wrote to memory of 796 2832 7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe y9143845.exe PID 2832 wrote to memory of 796 2832 7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe y9143845.exe PID 796 wrote to memory of 4828 796 y9143845.exe y5457738.exe PID 796 wrote to memory of 4828 796 y9143845.exe y5457738.exe PID 796 wrote to memory of 4828 796 y9143845.exe y5457738.exe PID 4828 wrote to memory of 4952 4828 y5457738.exe k5231148.exe PID 4828 wrote to memory of 4952 4828 y5457738.exe k5231148.exe PID 4828 wrote to memory of 4952 4828 y5457738.exe k5231148.exe PID 4952 wrote to memory of 740 4952 k5231148.exe AppLaunch.exe PID 4952 wrote to memory of 740 4952 k5231148.exe AppLaunch.exe PID 4952 wrote to memory of 740 4952 k5231148.exe AppLaunch.exe PID 4952 wrote to memory of 740 4952 k5231148.exe AppLaunch.exe PID 4952 wrote to memory of 740 4952 k5231148.exe AppLaunch.exe PID 4828 wrote to memory of 2032 4828 y5457738.exe l3651390.exe PID 4828 wrote to memory of 2032 4828 y5457738.exe l3651390.exe PID 4828 wrote to memory of 2032 4828 y5457738.exe l3651390.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe"C:\Users\Admin\AppData\Local\Temp\7106d40d171b3795f4583a91e1b105bd7fc2cb102e290d33d9bbd01ce12622bb_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9143845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9143845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5457738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5457738.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5231148.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5231148.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3651390.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3651390.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9143845.exeFilesize
454KB
MD56a89839bef7babff13f0294d47999d4d
SHA12440d22d80ac9182bf20a23b7c941d26ef230bec
SHA2563736edc6b042256963bec450a629d417abc7420e91c6a92c2798779dc9d709fc
SHA51272228db8e23fb2fde2ab30fb55ade211c702f7ebb94f6f09258a1c8757f356208256340790705b5fe6e9a18cb0465f76d58e0435ef337a28724d409b55b241ec
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9143845.exeFilesize
454KB
MD56a89839bef7babff13f0294d47999d4d
SHA12440d22d80ac9182bf20a23b7c941d26ef230bec
SHA2563736edc6b042256963bec450a629d417abc7420e91c6a92c2798779dc9d709fc
SHA51272228db8e23fb2fde2ab30fb55ade211c702f7ebb94f6f09258a1c8757f356208256340790705b5fe6e9a18cb0465f76d58e0435ef337a28724d409b55b241ec
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5457738.exeFilesize
282KB
MD5a037743c2a6055e38a8c91b96a57d545
SHA16257e2ffd34798f5f8d1a3432723dd014d0fe76f
SHA2569c6cbdb70bcb4fea1fad0edf981595ae659bb7b30f185aee6734c2ed1a1e2e27
SHA512b9efdb8164ddd70b941c6b64d280786d27a0be93bb0cea0fc89d40a8393a68352caab34fb735e8b0ff55a522c3a22cfe2a5480463a6cdd2e0fec9a6d22c1e1e4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5457738.exeFilesize
282KB
MD5a037743c2a6055e38a8c91b96a57d545
SHA16257e2ffd34798f5f8d1a3432723dd014d0fe76f
SHA2569c6cbdb70bcb4fea1fad0edf981595ae659bb7b30f185aee6734c2ed1a1e2e27
SHA512b9efdb8164ddd70b941c6b64d280786d27a0be93bb0cea0fc89d40a8393a68352caab34fb735e8b0ff55a522c3a22cfe2a5480463a6cdd2e0fec9a6d22c1e1e4
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5231148.exeFilesize
169KB
MD557c4bc75f678ff9e333d9554e447766b
SHA1567b479ab59a67fff64ea7be793c55ade1b08137
SHA256e3f1b34eb94e0a77996ada95bda0559de49353a6c54694d96958a4643db47705
SHA512005a5481d4d19c7a2a89d34ba3f84cb99622241b8f1860c12df54652a888caeee6e806bb1c928b7217bbd325cb1f96aabcc7191745fa7c833be723a67c809dde
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5231148.exeFilesize
169KB
MD557c4bc75f678ff9e333d9554e447766b
SHA1567b479ab59a67fff64ea7be793c55ade1b08137
SHA256e3f1b34eb94e0a77996ada95bda0559de49353a6c54694d96958a4643db47705
SHA512005a5481d4d19c7a2a89d34ba3f84cb99622241b8f1860c12df54652a888caeee6e806bb1c928b7217bbd325cb1f96aabcc7191745fa7c833be723a67c809dde
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3651390.exeFilesize
168KB
MD508ff3d597c112cef0dacdf77e020d580
SHA1693de4609e08f7626d05c78b848abefa2e83a0df
SHA256c61e7f08640e7270f85e6f526f6f4d9ed9218df37c250d9fd59006ac3a895429
SHA512418c4042d92057fbe2e2fb488632d59f64b4d6f3b50f5be89c35d713f9a4d6712094ef944404752df685cd177fe78376c12e8bd0cb00ac4b47d10c77a0cf4415
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3651390.exeFilesize
168KB
MD508ff3d597c112cef0dacdf77e020d580
SHA1693de4609e08f7626d05c78b848abefa2e83a0df
SHA256c61e7f08640e7270f85e6f526f6f4d9ed9218df37c250d9fd59006ac3a895429
SHA512418c4042d92057fbe2e2fb488632d59f64b4d6f3b50f5be89c35d713f9a4d6712094ef944404752df685cd177fe78376c12e8bd0cb00ac4b47d10c77a0cf4415
-
memory/740-23-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/740-45-0x00000000746A0000-0x0000000074E50000-memory.dmpFilesize
7.7MB
-
memory/740-41-0x00000000746A0000-0x0000000074E50000-memory.dmpFilesize
7.7MB
-
memory/740-32-0x00000000746A0000-0x0000000074E50000-memory.dmpFilesize
7.7MB
-
memory/2032-33-0x0000000004A10000-0x0000000004A16000-memory.dmpFilesize
24KB
-
memory/2032-34-0x00000000746A0000-0x0000000074E50000-memory.dmpFilesize
7.7MB
-
memory/2032-35-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/2032-36-0x0000000004D00000-0x0000000004E0A000-memory.dmpFilesize
1.0MB
-
memory/2032-38-0x0000000004AA0000-0x0000000004AB2000-memory.dmpFilesize
72KB
-
memory/2032-37-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/2032-39-0x0000000004C30000-0x0000000004C6C000-memory.dmpFilesize
240KB
-
memory/2032-40-0x0000000004C70000-0x0000000004CBC000-memory.dmpFilesize
304KB
-
memory/2032-31-0x00000000000F0000-0x000000000011E000-memory.dmpFilesize
184KB
-
memory/2032-42-0x00000000746A0000-0x0000000074E50000-memory.dmpFilesize
7.7MB
-
memory/2032-43-0x0000000004AE0000-0x0000000004AF0000-memory.dmpFilesize
64KB
-
memory/4952-22-0x00000000000A0000-0x00000000001A0000-memory.dmpFilesize
1024KB