Analysis
-
max time kernel
159s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe
Resource
win10v2004-20230915-en
General
-
Target
9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe
-
Size
1.3MB
-
MD5
66517d9105802998a136a7232dc585b5
-
SHA1
d03716a9353992e300917bf202420c46baa30f3c
-
SHA256
9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43
-
SHA512
bece6e5efa02fb09b6cc3fa1f0a6aae07a340a3b9eeecbc30cf5d9283d86c02e4d86203675383b66cc7def0edec8d092aed8b3f9ecc0dd710517cddf60b7f9cd
-
SSDEEP
24576:+092Q+pf9HgPycWuPNpH9gLcJVuDBWhg+izBqyRC9eQ:+092Q0f9AfWS9JVyxzBTOeQ
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1020-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1132 x5059925.exe 4188 x4326485.exe 3668 x5916665.exe 3872 g1516631.exe 2112 h1066104.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5059925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4326485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5916665.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2736 set thread context of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 3872 set thread context of 1020 3872 g1516631.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1020 AppLaunch.exe 1020 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 2736 wrote to memory of 4720 2736 9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe 83 PID 4720 wrote to memory of 1132 4720 AppLaunch.exe 84 PID 4720 wrote to memory of 1132 4720 AppLaunch.exe 84 PID 4720 wrote to memory of 1132 4720 AppLaunch.exe 84 PID 1132 wrote to memory of 4188 1132 x5059925.exe 85 PID 1132 wrote to memory of 4188 1132 x5059925.exe 85 PID 1132 wrote to memory of 4188 1132 x5059925.exe 85 PID 4188 wrote to memory of 3668 4188 x4326485.exe 86 PID 4188 wrote to memory of 3668 4188 x4326485.exe 86 PID 4188 wrote to memory of 3668 4188 x4326485.exe 86 PID 3668 wrote to memory of 3872 3668 x5916665.exe 87 PID 3668 wrote to memory of 3872 3668 x5916665.exe 87 PID 3668 wrote to memory of 3872 3668 x5916665.exe 87 PID 3872 wrote to memory of 4428 3872 g1516631.exe 90 PID 3872 wrote to memory of 4428 3872 g1516631.exe 90 PID 3872 wrote to memory of 4428 3872 g1516631.exe 90 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3872 wrote to memory of 1020 3872 g1516631.exe 89 PID 3668 wrote to memory of 2112 3668 x5916665.exe 91 PID 3668 wrote to memory of 2112 3668 x5916665.exe 91 PID 3668 wrote to memory of 2112 3668 x5916665.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe"C:\Users\Admin\AppData\Local\Temp\9d414e0d1cf651f1d3021b81c4f834ec32b65020fe48838a1f4bd329ebe22b43.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5059925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5059925.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4326485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4326485.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5916665.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5916665.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1516631.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1516631.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1066104.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1066104.exe6⤵
- Executes dropped EXE
PID:2112
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD5a19d5b4fc8736a68196c38685643b202
SHA1c023b363ff7f643ca665b659fbff6982676c5fea
SHA256e523d543b80a6b8814bef1e176de7eb80d04c39d6d86a0c7a616faa54d2343e7
SHA512f0a280f3d8472027534e9660cfcc600534e5ff422cbfc64416e93220feaaabaed4365d1a077249fb0efb3d9c1546e10ab11fab8ba4429f7e5aa06b4974b7df83
-
Filesize
767KB
MD5a19d5b4fc8736a68196c38685643b202
SHA1c023b363ff7f643ca665b659fbff6982676c5fea
SHA256e523d543b80a6b8814bef1e176de7eb80d04c39d6d86a0c7a616faa54d2343e7
SHA512f0a280f3d8472027534e9660cfcc600534e5ff422cbfc64416e93220feaaabaed4365d1a077249fb0efb3d9c1546e10ab11fab8ba4429f7e5aa06b4974b7df83
-
Filesize
492KB
MD591bd5edaf9ac0c578d465ca8e97eba24
SHA1d584669e996831801ef1f87a15372d6b6421d085
SHA2568f38f9c33a3382ebbdb3597b9e83faa1604b8061741f2d8612062ada91ef5a93
SHA512b3d772f073f1b18095c96cda51ad39dd73d59da295363190e0c151573aa2da66f079fa95eb54883fde02c5e53d69c7abb7b2a606e3b93e0d141ec605a21a5c49
-
Filesize
492KB
MD591bd5edaf9ac0c578d465ca8e97eba24
SHA1d584669e996831801ef1f87a15372d6b6421d085
SHA2568f38f9c33a3382ebbdb3597b9e83faa1604b8061741f2d8612062ada91ef5a93
SHA512b3d772f073f1b18095c96cda51ad39dd73d59da295363190e0c151573aa2da66f079fa95eb54883fde02c5e53d69c7abb7b2a606e3b93e0d141ec605a21a5c49
-
Filesize
327KB
MD50738f3fb61f7352210abdfeead0a943e
SHA1610f71c23081c22c12805d5d4d68b5ca2984687f
SHA25659e16aac534e7c1058faaf77eed91a13ba7499f06ecabee93574bd7d3a45c605
SHA51236cb20aea587e1cd32c43fbda00944bec0819501b794ca6e05393099a8bdcf922ed6a81c37dbcb4e8d8909883b7e91e15e9290b665f2fc28e41811e52d1ab888
-
Filesize
327KB
MD50738f3fb61f7352210abdfeead0a943e
SHA1610f71c23081c22c12805d5d4d68b5ca2984687f
SHA25659e16aac534e7c1058faaf77eed91a13ba7499f06ecabee93574bd7d3a45c605
SHA51236cb20aea587e1cd32c43fbda00944bec0819501b794ca6e05393099a8bdcf922ed6a81c37dbcb4e8d8909883b7e91e15e9290b665f2fc28e41811e52d1ab888
-
Filesize
242KB
MD5133c167fe95badd4c1d2c378073219e2
SHA13a9d712f3cf7c91e77346e5d636c8f0c6f99897a
SHA256da8a5936c8b8e3dd2927a01d7edd509ccb5103590a23275597cbd74abcf356ea
SHA51205fc0769280ff87d20edbc81687f6f38bc58ce3153b7d62e7517f6675b243d8bd202dd3b0bc4061787eef494c6349360e5d97cf042a9719051ba0531546f76e2
-
Filesize
242KB
MD5133c167fe95badd4c1d2c378073219e2
SHA13a9d712f3cf7c91e77346e5d636c8f0c6f99897a
SHA256da8a5936c8b8e3dd2927a01d7edd509ccb5103590a23275597cbd74abcf356ea
SHA51205fc0769280ff87d20edbc81687f6f38bc58ce3153b7d62e7517f6675b243d8bd202dd3b0bc4061787eef494c6349360e5d97cf042a9719051ba0531546f76e2
-
Filesize
174KB
MD5a4aa91d885060e7dfaa138710e1e9166
SHA1f632e56ad4902a9d999fe828550ed2e98d59e708
SHA256c201d25c4b9d262de8af602123c3e6cf27e99f2820a928579aa109de8503575f
SHA51251435936f4b67bedaf1c37af099d0501734bec44fd9c4b70a1a5a3ad829e2d6b8f383dcd1b1b1b646eecbb06f0547217a324fcd44cf7981da93d3a662fb56379
-
Filesize
174KB
MD5a4aa91d885060e7dfaa138710e1e9166
SHA1f632e56ad4902a9d999fe828550ed2e98d59e708
SHA256c201d25c4b9d262de8af602123c3e6cf27e99f2820a928579aa109de8503575f
SHA51251435936f4b67bedaf1c37af099d0501734bec44fd9c4b70a1a5a3ad829e2d6b8f383dcd1b1b1b646eecbb06f0547217a324fcd44cf7981da93d3a662fb56379