Analysis
-
max time kernel
167s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe
Resource
win10v2004-20230915-en
General
-
Target
5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe
-
Size
1.2MB
-
MD5
c05705864c85e54836ae624d3aebd98b
-
SHA1
0e08b69da37dfe83204af568480d18e81a19b0a1
-
SHA256
5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39
-
SHA512
dd33a64ad11619502909aaaa92b0bcf2331a5d25ab11c770e115931daef1bd85d3c064703610858158309e04b1a66a29ee2cc77fa8d3d7296f07f3bc0154e4bc
-
SSDEEP
24576:H74crM7gaMCFQLilokdKHcVuAhbgplActivoQQJlwN56EuQ2DzKesCn42ZG:b4crytMCFQYkTgqlActyoryZFue92ZG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/5056-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 400 x6565437.exe 2008 x8970700.exe 4880 x0813478.exe 2488 g1232129.exe 1900 h0143120.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6565437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8970700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0813478.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 2488 set thread context of 5056 2488 g1232129.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5056 AppLaunch.exe 5056 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5056 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 1652 wrote to memory of 3376 1652 5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe 91 PID 3376 wrote to memory of 400 3376 AppLaunch.exe 92 PID 3376 wrote to memory of 400 3376 AppLaunch.exe 92 PID 3376 wrote to memory of 400 3376 AppLaunch.exe 92 PID 400 wrote to memory of 2008 400 x6565437.exe 93 PID 400 wrote to memory of 2008 400 x6565437.exe 93 PID 400 wrote to memory of 2008 400 x6565437.exe 93 PID 2008 wrote to memory of 4880 2008 x8970700.exe 94 PID 2008 wrote to memory of 4880 2008 x8970700.exe 94 PID 2008 wrote to memory of 4880 2008 x8970700.exe 94 PID 4880 wrote to memory of 2488 4880 x0813478.exe 95 PID 4880 wrote to memory of 2488 4880 x0813478.exe 95 PID 4880 wrote to memory of 2488 4880 x0813478.exe 95 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 2488 wrote to memory of 5056 2488 g1232129.exe 97 PID 4880 wrote to memory of 1900 4880 x0813478.exe 98 PID 4880 wrote to memory of 1900 4880 x0813478.exe 98 PID 4880 wrote to memory of 1900 4880 x0813478.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe"C:\Users\Admin\AppData\Local\Temp\5af9665965bf8689a2908e3dd0392ef128d78a2b6130fd989223b54f69c06e39.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6565437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6565437.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8970700.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8970700.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0813478.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0813478.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1232129.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1232129.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0143120.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0143120.exe6⤵
- Executes dropped EXE
PID:1900
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD56f57dcd5a641a5d86bc13eba95172e41
SHA1be835639701dd9f1b3ddb1e0e20c1b2faa0cca7c
SHA256c482eaac16069ff7e7bf5073b5d6bc696c4294028bd519329b7fa42e4913a4be
SHA5129fbd53b9daa49ddda2e7b99b84978bce781aced8a9c688c4aadb11eb1751c1ab513623aa6e27398efb342c2de1c6c7b89eefb9b0905d00586331f5c0ee2540a9
-
Filesize
744KB
MD56f57dcd5a641a5d86bc13eba95172e41
SHA1be835639701dd9f1b3ddb1e0e20c1b2faa0cca7c
SHA256c482eaac16069ff7e7bf5073b5d6bc696c4294028bd519329b7fa42e4913a4be
SHA5129fbd53b9daa49ddda2e7b99b84978bce781aced8a9c688c4aadb11eb1751c1ab513623aa6e27398efb342c2de1c6c7b89eefb9b0905d00586331f5c0ee2540a9
-
Filesize
480KB
MD56424bad449144bf167093e681b8b3453
SHA19c662c7cd5e3d75f210dfcb8f62f0fa1bee0a2de
SHA256ae1d47c85027ca2efb240a4686e29c3067354f21b3d713ada4d59800eb2f3f92
SHA5129e07ab4bd7a5abfa7afeabc760f0db4e4486ec9a5b645fc9c6f8a14a66c9e2c8353db4bb3db2f8cf12c995836b746480ad8696ddc19e26e3c3dffea86d724b38
-
Filesize
480KB
MD56424bad449144bf167093e681b8b3453
SHA19c662c7cd5e3d75f210dfcb8f62f0fa1bee0a2de
SHA256ae1d47c85027ca2efb240a4686e29c3067354f21b3d713ada4d59800eb2f3f92
SHA5129e07ab4bd7a5abfa7afeabc760f0db4e4486ec9a5b645fc9c6f8a14a66c9e2c8353db4bb3db2f8cf12c995836b746480ad8696ddc19e26e3c3dffea86d724b38
-
Filesize
314KB
MD55981cb31841283610194910edfe5ec8e
SHA1b3c09bb8662cf9ee0d10378d08f2b458451f14ef
SHA256810e22eb59855ab7688a8141fe85d0dc67cdb9da354c20a0997de4a2099d9038
SHA512ff3ba82dfb7d30da16e30cd628129df2a2eafb00d10941af0d4b9a898c1c10883e17d4a3364778d2d89a218d113cf55fdcb4595ddd6f3491210619b438b15598
-
Filesize
314KB
MD55981cb31841283610194910edfe5ec8e
SHA1b3c09bb8662cf9ee0d10378d08f2b458451f14ef
SHA256810e22eb59855ab7688a8141fe85d0dc67cdb9da354c20a0997de4a2099d9038
SHA512ff3ba82dfb7d30da16e30cd628129df2a2eafb00d10941af0d4b9a898c1c10883e17d4a3364778d2d89a218d113cf55fdcb4595ddd6f3491210619b438b15598
-
Filesize
229KB
MD5c368a55f747ed40e0ca8f3d3a2692ff0
SHA17117a8bb4c6c7263161be31ad80e06a9e59871d3
SHA2560ccd0848ceb6c3997162583718c0b84a00d7b52b7c6bd734dd4798d2b1ffb67d
SHA5124cbfb06c564939deda70e852dc79f2c11894d12d993e6ea09929c065f901df5ca4229f9bb1438e4b644897eac5c26752dbd9398df2ac67773e0407f0e7fae9e0
-
Filesize
229KB
MD5c368a55f747ed40e0ca8f3d3a2692ff0
SHA17117a8bb4c6c7263161be31ad80e06a9e59871d3
SHA2560ccd0848ceb6c3997162583718c0b84a00d7b52b7c6bd734dd4798d2b1ffb67d
SHA5124cbfb06c564939deda70e852dc79f2c11894d12d993e6ea09929c065f901df5ca4229f9bb1438e4b644897eac5c26752dbd9398df2ac67773e0407f0e7fae9e0
-
Filesize
174KB
MD5a7b4608154b376ca5e93e5168a594e3d
SHA117f34c6108b5079ad757887d813830715e6c0b5b
SHA2564ec1249c4b58b569cba5866fd74f80de0a9647af8d1e30f2d4b54e0ab287d7f1
SHA512f73103d39ccb9c89c7ad4d780a348d7857205eb9bd6450695a22572653d625877e1a7a4f47323e45990ffcb8f21fdfb7d16553c0ed07fe86cecae8173e3d0f33
-
Filesize
174KB
MD5a7b4608154b376ca5e93e5168a594e3d
SHA117f34c6108b5079ad757887d813830715e6c0b5b
SHA2564ec1249c4b58b569cba5866fd74f80de0a9647af8d1e30f2d4b54e0ab287d7f1
SHA512f73103d39ccb9c89c7ad4d780a348d7857205eb9bd6450695a22572653d625877e1a7a4f47323e45990ffcb8f21fdfb7d16553c0ed07fe86cecae8173e3d0f33