Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe
Resource
win10v2004-20230915-en
General
-
Target
5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe
-
Size
1.3MB
-
MD5
f2bd5ad22f1f6df41140df8ae2d87952
-
SHA1
5ae6b29be07edba61b27a882a77ad784e8fcf430
-
SHA256
5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122
-
SHA512
b703b5f0bc813c2ad5542f36f450688d1c9b7c18f62cb2f6005da7e10a872aecfbb3a7bc546cc74cd128108272e43867596216e6a96d577bedaff56fa4dab2ec
-
SSDEEP
24576:g09VQ6COVYcyZmLT2pHvuGKyKgS0THROl5erNIye15OcQ:g09JLGKy200nete1McQ
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1648-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4652 x5997426.exe 4216 x1766588.exe 2320 x8313545.exe 1604 g4218416.exe 4924 h1105716.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5997426.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1766588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8313545.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 408 set thread context of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 1604 set thread context of 1648 1604 g4218416.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 AppLaunch.exe 1648 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 AppLaunch.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 408 wrote to memory of 3960 408 5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe 90 PID 3960 wrote to memory of 4652 3960 AppLaunch.exe 91 PID 3960 wrote to memory of 4652 3960 AppLaunch.exe 91 PID 3960 wrote to memory of 4652 3960 AppLaunch.exe 91 PID 4652 wrote to memory of 4216 4652 x5997426.exe 92 PID 4652 wrote to memory of 4216 4652 x5997426.exe 92 PID 4652 wrote to memory of 4216 4652 x5997426.exe 92 PID 4216 wrote to memory of 2320 4216 x1766588.exe 93 PID 4216 wrote to memory of 2320 4216 x1766588.exe 93 PID 4216 wrote to memory of 2320 4216 x1766588.exe 93 PID 2320 wrote to memory of 1604 2320 x8313545.exe 94 PID 2320 wrote to memory of 1604 2320 x8313545.exe 94 PID 2320 wrote to memory of 1604 2320 x8313545.exe 94 PID 1604 wrote to memory of 2964 1604 g4218416.exe 95 PID 1604 wrote to memory of 2964 1604 g4218416.exe 95 PID 1604 wrote to memory of 2964 1604 g4218416.exe 95 PID 1604 wrote to memory of 2072 1604 g4218416.exe 96 PID 1604 wrote to memory of 2072 1604 g4218416.exe 96 PID 1604 wrote to memory of 2072 1604 g4218416.exe 96 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 1604 wrote to memory of 1648 1604 g4218416.exe 97 PID 2320 wrote to memory of 4924 2320 x8313545.exe 98 PID 2320 wrote to memory of 4924 2320 x8313545.exe 98 PID 2320 wrote to memory of 4924 2320 x8313545.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe"C:\Users\Admin\AppData\Local\Temp\5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exe6⤵
- Executes dropped EXE
PID:4924
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD590980b85d8807805f0f0f5564dd75a14
SHA123ba24fedc86a9e98c7267a93a0ed9068d665f58
SHA256e8f0cf5d4cc5ffe75131e9c74313e37114125fbe2087f8e07220e7a2dc8d61a4
SHA512e60859c541f802d3e83b1c30219cbc435fb7fe23bda45ac80d1c0ea0bf99d67fc7a29dc13b4ff54664fa9f2735c6b3d75950cdafa331787cffa13ef8afa356f5
-
Filesize
767KB
MD590980b85d8807805f0f0f5564dd75a14
SHA123ba24fedc86a9e98c7267a93a0ed9068d665f58
SHA256e8f0cf5d4cc5ffe75131e9c74313e37114125fbe2087f8e07220e7a2dc8d61a4
SHA512e60859c541f802d3e83b1c30219cbc435fb7fe23bda45ac80d1c0ea0bf99d67fc7a29dc13b4ff54664fa9f2735c6b3d75950cdafa331787cffa13ef8afa356f5
-
Filesize
492KB
MD548669f8a60be4f400e4b6a54974e71d5
SHA15d0f115b1605c18826cbc783b89d10da0ea17746
SHA2567cc5b868112164f346327205ce98fcef9fdf0638f6615ef231579252de2ad889
SHA5126efa404f6cf0c92b269975c5714fa8b4ab754f2a385fbd8ae359a0d981d72b733e327cc043bb1355d34ed5c4e4bcdc1ec45f2800f2380d5812f300f4dd28a504
-
Filesize
492KB
MD548669f8a60be4f400e4b6a54974e71d5
SHA15d0f115b1605c18826cbc783b89d10da0ea17746
SHA2567cc5b868112164f346327205ce98fcef9fdf0638f6615ef231579252de2ad889
SHA5126efa404f6cf0c92b269975c5714fa8b4ab754f2a385fbd8ae359a0d981d72b733e327cc043bb1355d34ed5c4e4bcdc1ec45f2800f2380d5812f300f4dd28a504
-
Filesize
326KB
MD51791b0eab27af64304bdc41d9f425908
SHA1ad64dc460b3440d9562d34ae4bf8ac866d0658f4
SHA25612e3503e89c33fc2132506a5479eaed2ee99935941f9df1f70ea6cdc86107a11
SHA51272593b231574cf00c2b4df679008d2e34540fea5d1cd846d0863e66a7d69b6c572dc7cc8323136183cfd55247d6f3ad9fff66e125ad32f618ec99c6fd1dd10e3
-
Filesize
326KB
MD51791b0eab27af64304bdc41d9f425908
SHA1ad64dc460b3440d9562d34ae4bf8ac866d0658f4
SHA25612e3503e89c33fc2132506a5479eaed2ee99935941f9df1f70ea6cdc86107a11
SHA51272593b231574cf00c2b4df679008d2e34540fea5d1cd846d0863e66a7d69b6c572dc7cc8323136183cfd55247d6f3ad9fff66e125ad32f618ec99c6fd1dd10e3
-
Filesize
242KB
MD5d09477c966a58017d908a3d89b0402bd
SHA177c43dc3e9e0473b64b70f2e90e449c49fbaa1ba
SHA25630f301518192cf1003bf638695aad49853ecc61ebee643df3e70e8bd0292f966
SHA512741b69b617df7438d23bec936b5f29af9c43c35f7f3c6f7c9624e633afaf326151b8827bd50603c8e1d4a921e2a1662c56bfe83d6450a4dac687f8c8e0a5860b
-
Filesize
242KB
MD5d09477c966a58017d908a3d89b0402bd
SHA177c43dc3e9e0473b64b70f2e90e449c49fbaa1ba
SHA25630f301518192cf1003bf638695aad49853ecc61ebee643df3e70e8bd0292f966
SHA512741b69b617df7438d23bec936b5f29af9c43c35f7f3c6f7c9624e633afaf326151b8827bd50603c8e1d4a921e2a1662c56bfe83d6450a4dac687f8c8e0a5860b
-
Filesize
174KB
MD5b2116f4207ccd3d2ef8cd8a2b6298c95
SHA180a84b3f2c0fabf5a78a73f78cc91f482ba9c10a
SHA256058f0ae68a1089f11e63d594acca72560fe10b1f6ea30b8e93ff76f0d2560324
SHA5129fee6c38297bfe5502b4e5a32b6337335320763450f315e46f8816aa44fb6825fd4b5d7c43ab2f878d2190f0e2f24a00809a596393808571abc9939a2b91839e
-
Filesize
174KB
MD5b2116f4207ccd3d2ef8cd8a2b6298c95
SHA180a84b3f2c0fabf5a78a73f78cc91f482ba9c10a
SHA256058f0ae68a1089f11e63d594acca72560fe10b1f6ea30b8e93ff76f0d2560324
SHA5129fee6c38297bfe5502b4e5a32b6337335320763450f315e46f8816aa44fb6825fd4b5d7c43ab2f878d2190f0e2f24a00809a596393808571abc9939a2b91839e