Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:13
Static task
static1
Behavioral task
behavioral1
Sample
x9650930.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x9650930.exe
Resource
win10v2004-20230915-en
General
-
Target
x9650930.exe
-
Size
749KB
-
MD5
aa36b2a1ea43fb2ea6c2b59c6a953e19
-
SHA1
ce51623a197555c66e99ae00553564dbf5eda79e
-
SHA256
e2fd97d6bb9c399b161df318ef0ba99bdc8750a8d68a3fafd4b5a93007a6a572
-
SHA512
0491e62222688cfb81e2cdbbffe93fdd2f6fdde83b21a6d8b220160423389c47fa5fd794c334957c17417fb6b78ed8e3b728041f655f91321ec1e537e036d30c
-
SSDEEP
12288:0Mrey90oPsICI3tYawgC3H0RtI059O+iI717RnvMe1XpkDev:qyEfI9nQXI59O+P7fnUe1X6Dev
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4600-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5112 x7332066.exe 4632 x8410471.exe 4140 g6681924.exe 2552 h8948845.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x9650930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7332066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8410471.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4140 set thread context of 4600 4140 g6681924.exe 90 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 672 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4600 AppLaunch.exe 4600 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4600 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2572 wrote to memory of 5112 2572 x9650930.exe 86 PID 2572 wrote to memory of 5112 2572 x9650930.exe 86 PID 2572 wrote to memory of 5112 2572 x9650930.exe 86 PID 5112 wrote to memory of 4632 5112 x7332066.exe 87 PID 5112 wrote to memory of 4632 5112 x7332066.exe 87 PID 5112 wrote to memory of 4632 5112 x7332066.exe 87 PID 4632 wrote to memory of 4140 4632 x8410471.exe 88 PID 4632 wrote to memory of 4140 4632 x8410471.exe 88 PID 4632 wrote to memory of 4140 4632 x8410471.exe 88 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4140 wrote to memory of 4600 4140 g6681924.exe 90 PID 4632 wrote to memory of 2552 4632 x8410471.exe 91 PID 4632 wrote to memory of 2552 4632 x8410471.exe 91 PID 4632 wrote to memory of 2552 4632 x8410471.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\x9650930.exe"C:\Users\Admin\AppData\Local\Temp\x9650930.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7332066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7332066.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8410471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8410471.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6681924.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6681924.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8948845.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h8948845.exe4⤵
- Executes dropped EXE
PID:2552
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5590bc1d426c3b912f2d3bb456fca7a19
SHA18083e25137d2d376296008ac0dd58f0169924069
SHA256961462a7bb55c2a744336e74b2d162db5b015f63af1e1abb1ec30f728f8a625c
SHA5123fc02fcab8efee363f3dd0d991d858cf90e346b335817fb40ba69d8d9d83354c0a526724459893a9d593a67bf5ce0083aac0314bdc87bd341cdd8ea28e297885
-
Filesize
483KB
MD5590bc1d426c3b912f2d3bb456fca7a19
SHA18083e25137d2d376296008ac0dd58f0169924069
SHA256961462a7bb55c2a744336e74b2d162db5b015f63af1e1abb1ec30f728f8a625c
SHA5123fc02fcab8efee363f3dd0d991d858cf90e346b335817fb40ba69d8d9d83354c0a526724459893a9d593a67bf5ce0083aac0314bdc87bd341cdd8ea28e297885
-
Filesize
317KB
MD5a1c3e93185c8b185479bd1deccc23c7f
SHA1e31128342dc3ceb9b7bd15cb63d29b0d60c10eeb
SHA25639f35257264634ab31ddf5a69d7dec216fc6c55f8ba6356c663513926e6f6910
SHA5125d4a3faaf0bb2dcda164c0b85108666654fb9a32c65b5ef73f61b4311620146d9ae1e4bf214dc880d6730ab3a12f236dda539c2905a199112571743c2c69a686
-
Filesize
317KB
MD5a1c3e93185c8b185479bd1deccc23c7f
SHA1e31128342dc3ceb9b7bd15cb63d29b0d60c10eeb
SHA25639f35257264634ab31ddf5a69d7dec216fc6c55f8ba6356c663513926e6f6910
SHA5125d4a3faaf0bb2dcda164c0b85108666654fb9a32c65b5ef73f61b4311620146d9ae1e4bf214dc880d6730ab3a12f236dda539c2905a199112571743c2c69a686
-
Filesize
230KB
MD5363623b3523a6ee74d18ac7327807194
SHA1399ea7f42f1b986698af85f23eabfecebf487844
SHA2567402add3f209f2ef905ebac5ae92a8d5f5c14d83bdcf12af268127507fef365c
SHA512ad88f32c5daf82b1696e24b0fec7fa5d3226ce02f0ba2e301821f2cd9e8eb713d45f86f20c30a0b8d4f280b9d523f991471725b7b3f57ac53e17eaf5357acaab
-
Filesize
230KB
MD5363623b3523a6ee74d18ac7327807194
SHA1399ea7f42f1b986698af85f23eabfecebf487844
SHA2567402add3f209f2ef905ebac5ae92a8d5f5c14d83bdcf12af268127507fef365c
SHA512ad88f32c5daf82b1696e24b0fec7fa5d3226ce02f0ba2e301821f2cd9e8eb713d45f86f20c30a0b8d4f280b9d523f991471725b7b3f57ac53e17eaf5357acaab
-
Filesize
174KB
MD5bb3d12d155666469b962cad6f5abbed0
SHA1e7e91770ab81ac717dbd349f3f171ac7934fac89
SHA256bf6c1e6363a3f06ac378d6ad279b0065f9336538156e31f367a1798bcd69c97c
SHA512b0fce1e4bf6d72e3031897ff0897fcb086dc00c07b00ade18f4c3770e77532a360a3247f7f7fe45a21ead60627112377185d4b9aeec2deb25c80ecd7d8ad1444
-
Filesize
174KB
MD5bb3d12d155666469b962cad6f5abbed0
SHA1e7e91770ab81ac717dbd349f3f171ac7934fac89
SHA256bf6c1e6363a3f06ac378d6ad279b0065f9336538156e31f367a1798bcd69c97c
SHA512b0fce1e4bf6d72e3031897ff0897fcb086dc00c07b00ade18f4c3770e77532a360a3247f7f7fe45a21ead60627112377185d4b9aeec2deb25c80ecd7d8ad1444