Analysis
-
max time kernel
188s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe
Resource
win10v2004-20230915-en
General
-
Target
f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe
-
Size
1.2MB
-
MD5
41407e75c58bae34564d347697cfea2b
-
SHA1
e11e1cd0f5eda978fea5bafd1c442a506346890b
-
SHA256
f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3
-
SHA512
9acde0efc338e6e47a91ecd5dd3aff3c1b02dcf1a49bafa6563660136643663a22fed47695b203b179b9e7e5aa15af03796ed056a67e2ea42f135eb5a37f9c54
-
SSDEEP
24576:z74crMzMVZrNESV5H3GsXERjxYG4UFwxDMfG:X4crxrN5p8d42wxDMfG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4564-33-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 5016 x6502929.exe 1560 x3772919.exe 2000 x9974548.exe 2180 g8972569.exe 660 h7773921.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6502929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3772919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9974548.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 692 set thread context of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 2180 set thread context of 4564 2180 g8972569.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4564 AppLaunch.exe 4564 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4564 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 692 wrote to memory of 4960 692 f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe 84 PID 4960 wrote to memory of 5016 4960 AppLaunch.exe 85 PID 4960 wrote to memory of 5016 4960 AppLaunch.exe 85 PID 4960 wrote to memory of 5016 4960 AppLaunch.exe 85 PID 5016 wrote to memory of 1560 5016 x6502929.exe 86 PID 5016 wrote to memory of 1560 5016 x6502929.exe 86 PID 5016 wrote to memory of 1560 5016 x6502929.exe 86 PID 1560 wrote to memory of 2000 1560 x3772919.exe 87 PID 1560 wrote to memory of 2000 1560 x3772919.exe 87 PID 1560 wrote to memory of 2000 1560 x3772919.exe 87 PID 2000 wrote to memory of 2180 2000 x9974548.exe 88 PID 2000 wrote to memory of 2180 2000 x9974548.exe 88 PID 2000 wrote to memory of 2180 2000 x9974548.exe 88 PID 2180 wrote to memory of 4836 2180 g8972569.exe 91 PID 2180 wrote to memory of 4836 2180 g8972569.exe 91 PID 2180 wrote to memory of 4836 2180 g8972569.exe 91 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2180 wrote to memory of 4564 2180 g8972569.exe 92 PID 2000 wrote to memory of 660 2000 x9974548.exe 93 PID 2000 wrote to memory of 660 2000 x9974548.exe 93 PID 2000 wrote to memory of 660 2000 x9974548.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe"C:\Users\Admin\AppData\Local\Temp\f15c1027833e358527334c9fc6b59d1d917d755320b0ace4cb989f76983afea3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6502929.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6502929.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3772919.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3772919.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9974548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9974548.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8972569.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8972569.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7773921.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7773921.exe6⤵
- Executes dropped EXE
PID:660
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD539809b32cd8e349c5ce3072ad9ddc01c
SHA16044f558b52f931bf44f5d2a57a9b064191cb3d7
SHA256c657ee5a51708fd0440df48b7c359a21fcab64768d428aed59abf4abd5a1bc5d
SHA512e3ca9075789998454a83a3ec7b250bae762c1aa108d77a484c2a3e380279af88b6ba5e6cb74036ff24f0b9fd0b1ecb470270a9f6332fe79da62e73a724735a2c
-
Filesize
744KB
MD539809b32cd8e349c5ce3072ad9ddc01c
SHA16044f558b52f931bf44f5d2a57a9b064191cb3d7
SHA256c657ee5a51708fd0440df48b7c359a21fcab64768d428aed59abf4abd5a1bc5d
SHA512e3ca9075789998454a83a3ec7b250bae762c1aa108d77a484c2a3e380279af88b6ba5e6cb74036ff24f0b9fd0b1ecb470270a9f6332fe79da62e73a724735a2c
-
Filesize
480KB
MD539986342a3036de12b50b362701419ee
SHA147f97e4e923a184a112dd690bd359eab7b924038
SHA25612515d8e7c8d7310182759a21304a59a5b644561c8b02f861f0bcca3b922768f
SHA512e660eb2d8c161d56d460810a41f84e4e8ce0e21a8e6e36107d9a117a041a70230610ce98d4940170eb89aa6731e3cd08656f6ebfdc3dda9238a72977e0705b91
-
Filesize
480KB
MD539986342a3036de12b50b362701419ee
SHA147f97e4e923a184a112dd690bd359eab7b924038
SHA25612515d8e7c8d7310182759a21304a59a5b644561c8b02f861f0bcca3b922768f
SHA512e660eb2d8c161d56d460810a41f84e4e8ce0e21a8e6e36107d9a117a041a70230610ce98d4940170eb89aa6731e3cd08656f6ebfdc3dda9238a72977e0705b91
-
Filesize
314KB
MD55536bff59bc4060c8762abbe9ca4f57c
SHA17beec85042e218bca34c101764296a538e98965d
SHA256d01e3283d72da234ca9f7ab3fa91955ed7476a69d1284727b9f6e7a5106f2fcf
SHA5126a6d2cf17291cc77291a78bbf2c7da6e82a7be18e18608921f075c312227cd0aa191473655c3c019ae8f6e172e00b97c52d44c9fcb7b9b8057a6379ef86ba6f9
-
Filesize
314KB
MD55536bff59bc4060c8762abbe9ca4f57c
SHA17beec85042e218bca34c101764296a538e98965d
SHA256d01e3283d72da234ca9f7ab3fa91955ed7476a69d1284727b9f6e7a5106f2fcf
SHA5126a6d2cf17291cc77291a78bbf2c7da6e82a7be18e18608921f075c312227cd0aa191473655c3c019ae8f6e172e00b97c52d44c9fcb7b9b8057a6379ef86ba6f9
-
Filesize
229KB
MD5382f7a2bdccdfefa05c5f4218154cc2c
SHA1d43422d2cf46773a6d6f3cda6f2f9837c9c7eedc
SHA2567159b112d43ac9bac4dee33a538368f23100a6b11538010d0cf71c6408d8852b
SHA512e8e110a0bae85b68dc816a06f8cfb3641e6762ea2e1817380602f94a491e9ccc949912ff7d8b10a51bc3a0a0ed05ea26ec1291092ee45aadcdc1b4b4531152bc
-
Filesize
229KB
MD5382f7a2bdccdfefa05c5f4218154cc2c
SHA1d43422d2cf46773a6d6f3cda6f2f9837c9c7eedc
SHA2567159b112d43ac9bac4dee33a538368f23100a6b11538010d0cf71c6408d8852b
SHA512e8e110a0bae85b68dc816a06f8cfb3641e6762ea2e1817380602f94a491e9ccc949912ff7d8b10a51bc3a0a0ed05ea26ec1291092ee45aadcdc1b4b4531152bc
-
Filesize
174KB
MD5693b5d316b047b5a8d0c475977843446
SHA19fd1c8326bca013d6ccd3193db262fe304f6e4e0
SHA256000fe8f1286a24f8be816cb5bdf2c2a962ac6fb77d7995be7153a8c73bdb2a04
SHA512cc1ac122a9bf9d296dd245efbd51ab15aef26d65a725e06a712aa9844856a8b43fdb493f196b0b23a73a7c4ba38aaf0651a9279e586d59f7afd312e05eba5d6a
-
Filesize
174KB
MD5693b5d316b047b5a8d0c475977843446
SHA19fd1c8326bca013d6ccd3193db262fe304f6e4e0
SHA256000fe8f1286a24f8be816cb5bdf2c2a962ac6fb77d7995be7153a8c73bdb2a04
SHA512cc1ac122a9bf9d296dd245efbd51ab15aef26d65a725e06a712aa9844856a8b43fdb493f196b0b23a73a7c4ba38aaf0651a9279e586d59f7afd312e05eba5d6a