Analysis
-
max time kernel
245s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:51
Static task
static1
Behavioral task
behavioral1
Sample
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe
Resource
win10v2004-20230915-en
General
-
Target
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe
-
Size
999KB
-
MD5
ec2c8ebaf5d16e2de6de1f81620295f3
-
SHA1
7dadf5eb689a7f5a83eb799086c17d7014d2b405
-
SHA256
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7
-
SHA512
799e9bc85421721b1f3b059eb84292d48d2ccce4e5b6ef0cca38ca40e3b222599528b71785733ed9471fb74be63b166e8518250a53e94287ff9e2606652861f3
-
SSDEEP
24576:r09xfRgjT5p2dgMbLY1mZFNp/rOMdYV1ULYa9HZUQ:r09s5ygCkAHNpDmV1ULYalZUQ
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3140-26-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
x3425732.exex7205861.exeg3369620.exeh4961445.exepid process 3128 x3425732.exe 2980 x7205861.exe 3644 g3369620.exe 1936 h4961445.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
AppLaunch.exex3425732.exex7205861.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3425732.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7205861.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exeg3369620.exedescription pid process target process PID 4460 set thread context of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 3644 set thread context of 3140 3644 g3369620.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3140 AppLaunch.exe 3140 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3140 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exeAppLaunch.exex3425732.exex7205861.exeg3369620.exedescription pid process target process PID 4460 wrote to memory of 1828 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 1828 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 1828 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 4460 wrote to memory of 3804 4460 97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe AppLaunch.exe PID 3804 wrote to memory of 3128 3804 AppLaunch.exe x3425732.exe PID 3804 wrote to memory of 3128 3804 AppLaunch.exe x3425732.exe PID 3804 wrote to memory of 3128 3804 AppLaunch.exe x3425732.exe PID 3128 wrote to memory of 2980 3128 x3425732.exe x7205861.exe PID 3128 wrote to memory of 2980 3128 x3425732.exe x7205861.exe PID 3128 wrote to memory of 2980 3128 x3425732.exe x7205861.exe PID 2980 wrote to memory of 3644 2980 x7205861.exe g3369620.exe PID 2980 wrote to memory of 3644 2980 x7205861.exe g3369620.exe PID 2980 wrote to memory of 3644 2980 x7205861.exe g3369620.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 3644 wrote to memory of 3140 3644 g3369620.exe AppLaunch.exe PID 2980 wrote to memory of 1936 2980 x7205861.exe h4961445.exe PID 2980 wrote to memory of 1936 2980 x7205861.exe h4961445.exe PID 2980 wrote to memory of 1936 2980 x7205861.exe h4961445.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe"C:\Users\Admin\AppData\Local\Temp\97ace22840143725b9f147027ad547cbbabc53892754597b4ec4071043a165b7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3425732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3425732.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7205861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7205861.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3369620.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3369620.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h4961445.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h4961445.exe5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3425732.exeFilesize
492KB
MD55a62b85447376a32410b17e3310ea728
SHA1db0acccfdadae54e5e3ce1a728ed50a11471446d
SHA256ee8af5770f1b60778cf97708a6900689f2e1834beb4a44770dfae12ae68705cd
SHA5121435492ea70656ecd9d9d972fd8a0123b5d9abaae3182c5b6d1522d567d968efe8f0907f0e4d416b5aae45b7885434a0e3794506ce0cef838682d0e21cba6344
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3425732.exeFilesize
492KB
MD55a62b85447376a32410b17e3310ea728
SHA1db0acccfdadae54e5e3ce1a728ed50a11471446d
SHA256ee8af5770f1b60778cf97708a6900689f2e1834beb4a44770dfae12ae68705cd
SHA5121435492ea70656ecd9d9d972fd8a0123b5d9abaae3182c5b6d1522d567d968efe8f0907f0e4d416b5aae45b7885434a0e3794506ce0cef838682d0e21cba6344
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7205861.exeFilesize
326KB
MD525b0b2c66ad1456bd115e7e9cf73e3d5
SHA11ad8f3d22e65f3cc118af4a3d8004c4a09c627d7
SHA256ef158dfaf419ec52c614dcf101291bdf4a29d793740c866f23a7e7c6613a7fc2
SHA512ae09eca3ac0eeb2d49c9fe8d5b2488997239fa0aa5290f2d6f89b11c00aa54d95a413095f5cb8cb826a3218c808381b35a0a51760ed5c0aca3bbdaca4a918cfb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7205861.exeFilesize
326KB
MD525b0b2c66ad1456bd115e7e9cf73e3d5
SHA11ad8f3d22e65f3cc118af4a3d8004c4a09c627d7
SHA256ef158dfaf419ec52c614dcf101291bdf4a29d793740c866f23a7e7c6613a7fc2
SHA512ae09eca3ac0eeb2d49c9fe8d5b2488997239fa0aa5290f2d6f89b11c00aa54d95a413095f5cb8cb826a3218c808381b35a0a51760ed5c0aca3bbdaca4a918cfb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3369620.exeFilesize
242KB
MD58b3120033ff4114bf024ff5a349f64cc
SHA136cfc6b1d98cd4da502f87cc1599cbbd4a7939a1
SHA2564d60d5cfa66eb051cb5e30d1db495d51c32965a7211b69499e9968ee37df767a
SHA512a718f1308ecbfe3c2038b6326279fffb082ed201c7ccccde5d96983ff0c51475e6c43610ef02e5073ac8a66d1428bf8d5bf99cd1a57b5d69b42c0b0c52a11da8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3369620.exeFilesize
242KB
MD58b3120033ff4114bf024ff5a349f64cc
SHA136cfc6b1d98cd4da502f87cc1599cbbd4a7939a1
SHA2564d60d5cfa66eb051cb5e30d1db495d51c32965a7211b69499e9968ee37df767a
SHA512a718f1308ecbfe3c2038b6326279fffb082ed201c7ccccde5d96983ff0c51475e6c43610ef02e5073ac8a66d1428bf8d5bf99cd1a57b5d69b42c0b0c52a11da8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h4961445.exeFilesize
174KB
MD5cc1795806afc9010cf6150d795524a95
SHA163f3d26d6fd3b41c59a89387eb11861991ae0249
SHA256d8d0ecd2967092e002cbf9b78154df6635162a054199a2d5aa71a4ef9ea93e3d
SHA512cf8cb46283a8cef5839fd0584b7404723389026e94cfd2f504168d166d488d4f02fbec66fded57d46ee8d4bcefb1782fec590a6db5c6056e04ce0f6fe3b7dc48
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h4961445.exeFilesize
174KB
MD5cc1795806afc9010cf6150d795524a95
SHA163f3d26d6fd3b41c59a89387eb11861991ae0249
SHA256d8d0ecd2967092e002cbf9b78154df6635162a054199a2d5aa71a4ef9ea93e3d
SHA512cf8cb46283a8cef5839fd0584b7404723389026e94cfd2f504168d166d488d4f02fbec66fded57d46ee8d4bcefb1782fec590a6db5c6056e04ce0f6fe3b7dc48
-
memory/1936-35-0x0000000005900000-0x0000000005A0A000-memory.dmpFilesize
1.0MB
-
memory/1936-37-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/1936-33-0x0000000002FE0000-0x0000000002FE6000-memory.dmpFilesize
24KB
-
memory/1936-40-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/1936-30-0x0000000000C70000-0x0000000000CA0000-memory.dmpFilesize
192KB
-
memory/1936-34-0x0000000005E10000-0x0000000006428000-memory.dmpFilesize
6.1MB
-
memory/1936-38-0x0000000074560000-0x0000000074D10000-memory.dmpFilesize
7.7MB
-
memory/1936-31-0x0000000074560000-0x0000000074D10000-memory.dmpFilesize
7.7MB
-
memory/1936-36-0x0000000005630000-0x0000000005642000-memory.dmpFilesize
72KB
-
memory/3140-32-0x0000000074560000-0x0000000074D10000-memory.dmpFilesize
7.7MB
-
memory/3140-26-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3140-39-0x0000000074560000-0x0000000074D10000-memory.dmpFilesize
7.7MB
-
memory/3804-3-0x0000000000400000-0x00000000004C5000-memory.dmpFilesize
788KB
-
memory/3804-4-0x0000000000400000-0x00000000004C5000-memory.dmpFilesize
788KB
-
memory/3804-0-0x0000000000400000-0x00000000004C5000-memory.dmpFilesize
788KB
-
memory/3804-1-0x0000000000400000-0x00000000004C5000-memory.dmpFilesize
788KB
-
memory/3804-2-0x0000000000400000-0x00000000004C5000-memory.dmpFilesize
788KB