Analysis
-
max time kernel
142s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe
Resource
win10v2004-20230915-en
General
-
Target
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe
-
Size
1.2MB
-
MD5
48696f23706f300c52b22b0f6bf64442
-
SHA1
c22fae747bbe2750aa0d189bde85889a9dc64c1c
-
SHA256
3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd
-
SHA512
debf7e0241a96a9e91c2c22852ebd46a96edf789bd9a1d950df3fee0f13db00b1463e860917b0b2fc35c34dcdd0d1058498d890ad3dbf9717f05c39533147b40
-
SSDEEP
24576:974cru7u4Ww72pJpu1tZN+uaJVobWLSZLnE0P40VwOCiUaxG:x4cruzf7kTmtPJAoKeZccG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3364-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1208 x3006093.exe 4200 x0267829.exe 1080 x8998236.exe 1056 g5914923.exe 3236 h1660691.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3006093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0267829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8998236.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4640 set thread context of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 1056 set thread context of 3364 1056 g5914923.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3364 AppLaunch.exe 3364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3364 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 4640 wrote to memory of 452 4640 3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe 91 PID 452 wrote to memory of 1208 452 AppLaunch.exe 92 PID 452 wrote to memory of 1208 452 AppLaunch.exe 92 PID 452 wrote to memory of 1208 452 AppLaunch.exe 92 PID 1208 wrote to memory of 4200 1208 x3006093.exe 93 PID 1208 wrote to memory of 4200 1208 x3006093.exe 93 PID 1208 wrote to memory of 4200 1208 x3006093.exe 93 PID 4200 wrote to memory of 1080 4200 x0267829.exe 94 PID 4200 wrote to memory of 1080 4200 x0267829.exe 94 PID 4200 wrote to memory of 1080 4200 x0267829.exe 94 PID 1080 wrote to memory of 1056 1080 x8998236.exe 95 PID 1080 wrote to memory of 1056 1080 x8998236.exe 95 PID 1080 wrote to memory of 1056 1080 x8998236.exe 95 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1056 wrote to memory of 3364 1056 g5914923.exe 97 PID 1080 wrote to memory of 3236 1080 x8998236.exe 98 PID 1080 wrote to memory of 3236 1080 x8998236.exe 98 PID 1080 wrote to memory of 3236 1080 x8998236.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe"C:\Users\Admin\AppData\Local\Temp\3ba1af93660639e5b231599060ff30a39fbea202f44272cd230bdc7a80715afd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3006093.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3006093.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0267829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0267829.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8998236.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8998236.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5914923.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5914923.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1660691.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1660691.exe6⤵
- Executes dropped EXE
PID:3236
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD5853c7f3c282bf4c0f7e031c1a3dfaa62
SHA1b8f0a1d8c29a49f7ad5a6cca606ba40e46567fca
SHA2564231b570c6acef4bba875727f37448924f4e62804447fec73e27263e04cd9dc4
SHA512585f0eca13b24c93184bbd1c703bbfd1e970569898fec8eefd87c772d6b24472541928b0f7573af092db40b7d7515ae4e541658aeee73177f50d5c028dd616b6
-
Filesize
745KB
MD5853c7f3c282bf4c0f7e031c1a3dfaa62
SHA1b8f0a1d8c29a49f7ad5a6cca606ba40e46567fca
SHA2564231b570c6acef4bba875727f37448924f4e62804447fec73e27263e04cd9dc4
SHA512585f0eca13b24c93184bbd1c703bbfd1e970569898fec8eefd87c772d6b24472541928b0f7573af092db40b7d7515ae4e541658aeee73177f50d5c028dd616b6
-
Filesize
480KB
MD5d996e2d758c1c58737964bd2ff1d4bc5
SHA1cec0de1354c5cf7d4bd3f7a4ecab61b5ad78e2ad
SHA256be1c2fd4d45b0626ede2e6c88169b371c3adca841c097ac98ac081ee05941342
SHA5125ae70a78e9bd12638c2e75fc3218f94ec7da30a979ec20570a36d8a042625233262726aa0db3f7918cb9d02a614486ab4aa1ea1c477be802ff9c46d87ac130be
-
Filesize
480KB
MD5d996e2d758c1c58737964bd2ff1d4bc5
SHA1cec0de1354c5cf7d4bd3f7a4ecab61b5ad78e2ad
SHA256be1c2fd4d45b0626ede2e6c88169b371c3adca841c097ac98ac081ee05941342
SHA5125ae70a78e9bd12638c2e75fc3218f94ec7da30a979ec20570a36d8a042625233262726aa0db3f7918cb9d02a614486ab4aa1ea1c477be802ff9c46d87ac130be
-
Filesize
315KB
MD5be5df1f31cc428dc5755c1cfed611f08
SHA1c3c6be95e340d8c3575afd5eafb4f20cae9d41bc
SHA256b38319bd34df44b083f2e61ed96c5d2bc59963994779d2af2ec3ec9bbe19c17c
SHA512d3ed7765d5c21047aa9a13f6366350a6e4a33efa3715fbdfbab2cb910bcff73903bfc5dac84d4d3d153939ded130b5535e762c9f806bba7caf8dda94abf31abe
-
Filesize
315KB
MD5be5df1f31cc428dc5755c1cfed611f08
SHA1c3c6be95e340d8c3575afd5eafb4f20cae9d41bc
SHA256b38319bd34df44b083f2e61ed96c5d2bc59963994779d2af2ec3ec9bbe19c17c
SHA512d3ed7765d5c21047aa9a13f6366350a6e4a33efa3715fbdfbab2cb910bcff73903bfc5dac84d4d3d153939ded130b5535e762c9f806bba7caf8dda94abf31abe
-
Filesize
229KB
MD51fad0a01522fee178daa3d6fac277453
SHA144fe54d9faa5108fe38c48d923908ed1089570ea
SHA256905bc494eb4fa3c4841e85122a242db40195f2540a9819d1e95d76742cfe8276
SHA512ddc17451351412bd2198b4474995c679a0358414e8814519c331c780756cde8bc564ae4bf38bb1eeb272fd656336f8191929762c26dd53acbfb8408a57e5bac9
-
Filesize
229KB
MD51fad0a01522fee178daa3d6fac277453
SHA144fe54d9faa5108fe38c48d923908ed1089570ea
SHA256905bc494eb4fa3c4841e85122a242db40195f2540a9819d1e95d76742cfe8276
SHA512ddc17451351412bd2198b4474995c679a0358414e8814519c331c780756cde8bc564ae4bf38bb1eeb272fd656336f8191929762c26dd53acbfb8408a57e5bac9
-
Filesize
174KB
MD5c38f3156fb58b89259270511bf785e43
SHA1c4e7e1a428ade890024e67cd273d8602bf39724d
SHA2565a12855fb27dc9911b4a70afc5b0c662359453625f56aa365aab2bf6db62274f
SHA512af896ead1dfc3d248c9c6f88fe4cf78cd611b7f04be6f6783d663d5945040e6f19e96f16535f4097799c06127aad6794d4a583d3bd96e360cdeea5ac5b41cb67
-
Filesize
174KB
MD5c38f3156fb58b89259270511bf785e43
SHA1c4e7e1a428ade890024e67cd273d8602bf39724d
SHA2565a12855fb27dc9911b4a70afc5b0c662359453625f56aa365aab2bf6db62274f
SHA512af896ead1dfc3d248c9c6f88fe4cf78cd611b7f04be6f6783d663d5945040e6f19e96f16535f4097799c06127aad6794d4a583d3bd96e360cdeea5ac5b41cb67