Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe
Resource
win10v2004-20230915-en
General
-
Target
f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe
-
Size
1.2MB
-
MD5
c10d1ee33f424c73ab622259843092b0
-
SHA1
63c465be3c48852fb8e56abcb925c95ce590b8a6
-
SHA256
f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b
-
SHA512
fd91480c388e6124048f70c40697beae63093dd3791789455ccda4464a7e71cefb03db99bcd2fa9f48f491de6e67d2eb9452b1754e2450f3e44f6f2833173f02
-
SSDEEP
24576:l74crlsVawwIpNBpv5PwDKCtK6dU5z7iOliUWjyoxMt2olgloG:54crIpN7RKtK7TkLGREolgloG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1164-33-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2340 x6795783.exe 4012 x5609678.exe 3352 x7499313.exe 4264 g8531326.exe 3248 h1057155.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6795783.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5609678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7499313.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 732 set thread context of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 4264 set thread context of 1164 4264 g8531326.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1164 AppLaunch.exe 1164 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 732 wrote to memory of 1676 732 f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe 91 PID 1676 wrote to memory of 2340 1676 AppLaunch.exe 93 PID 1676 wrote to memory of 2340 1676 AppLaunch.exe 93 PID 1676 wrote to memory of 2340 1676 AppLaunch.exe 93 PID 2340 wrote to memory of 4012 2340 x6795783.exe 94 PID 2340 wrote to memory of 4012 2340 x6795783.exe 94 PID 2340 wrote to memory of 4012 2340 x6795783.exe 94 PID 4012 wrote to memory of 3352 4012 x5609678.exe 95 PID 4012 wrote to memory of 3352 4012 x5609678.exe 95 PID 4012 wrote to memory of 3352 4012 x5609678.exe 95 PID 3352 wrote to memory of 4264 3352 x7499313.exe 96 PID 3352 wrote to memory of 4264 3352 x7499313.exe 96 PID 3352 wrote to memory of 4264 3352 x7499313.exe 96 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 4264 wrote to memory of 1164 4264 g8531326.exe 98 PID 3352 wrote to memory of 3248 3352 x7499313.exe 99 PID 3352 wrote to memory of 3248 3352 x7499313.exe 99 PID 3352 wrote to memory of 3248 3352 x7499313.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe"C:\Users\Admin\AppData\Local\Temp\f65b1aaf1d79d150fdb771dbf6b74d1ed2a67f85b4e55f8e67978ee668c68f2b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6795783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6795783.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5609678.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7499313.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7499313.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8531326.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8531326.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1057155.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1057155.exe6⤵
- Executes dropped EXE
PID:3248
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD51dd7c4f6ec2cea6f28a61be0164486a6
SHA104cde20d9f02559af78a426ad51e79230c97bd36
SHA25652414d13b5fe27a67172158f66b1ff9ff28d53f6badf8fab53f07f06a720b60b
SHA512ba48aa7db81e7d6ad13e779415eb71105f37d9e96d1200bbb4990223401748f524e519440e797558db1ddde0a2a2ee55aa0e06ebe39170342225f7f12b9deaac
-
Filesize
744KB
MD51dd7c4f6ec2cea6f28a61be0164486a6
SHA104cde20d9f02559af78a426ad51e79230c97bd36
SHA25652414d13b5fe27a67172158f66b1ff9ff28d53f6badf8fab53f07f06a720b60b
SHA512ba48aa7db81e7d6ad13e779415eb71105f37d9e96d1200bbb4990223401748f524e519440e797558db1ddde0a2a2ee55aa0e06ebe39170342225f7f12b9deaac
-
Filesize
481KB
MD5fe62473584db28be98432979679c1002
SHA1f42beff00704ba4d57b50d6604c64c6e4b96f41a
SHA2562c76626bfee5490640da39fe0b538d65c6aa98981c3fafbedadb91417e8cad5e
SHA5124a9ba6ce7bbba71b1a195a2481ba4623147423af06d2ced214deba175928b7d0376583c280019145d6f27fda417bc0b887737705525a68b16512581b6beb1197
-
Filesize
481KB
MD5fe62473584db28be98432979679c1002
SHA1f42beff00704ba4d57b50d6604c64c6e4b96f41a
SHA2562c76626bfee5490640da39fe0b538d65c6aa98981c3fafbedadb91417e8cad5e
SHA5124a9ba6ce7bbba71b1a195a2481ba4623147423af06d2ced214deba175928b7d0376583c280019145d6f27fda417bc0b887737705525a68b16512581b6beb1197
-
Filesize
315KB
MD511c8c8f83775ed34b700256de4ba9dd7
SHA15e1008f52d83bba8b68d9319588654edfc177103
SHA256886347f0756ccd2530e4f7ef7efce4db39a58517ea8348315ea62d949369a52e
SHA51274e54d9f14ddf9b929e4b09d72c2a6f1cd04f1ca9d688b3f92b0d59400be1db3c4825f574086193ca376ab0cf929ce04eeb987fd708387187e933063291ec761
-
Filesize
315KB
MD511c8c8f83775ed34b700256de4ba9dd7
SHA15e1008f52d83bba8b68d9319588654edfc177103
SHA256886347f0756ccd2530e4f7ef7efce4db39a58517ea8348315ea62d949369a52e
SHA51274e54d9f14ddf9b929e4b09d72c2a6f1cd04f1ca9d688b3f92b0d59400be1db3c4825f574086193ca376ab0cf929ce04eeb987fd708387187e933063291ec761
-
Filesize
229KB
MD547dbee08b66e015eeeaf558a8945330f
SHA1e16449f252e3817ee5c313cf985111e5a48f6764
SHA256301e985ac95014a16d3d6d30c96e6caf56b4129ca9e32b2d30215c0e004877c4
SHA512a3d08a2aa77e559297f7a4f5c4582814659a2cbc103f9cc0e3f1947be8704e8767a1f3f6975654cd67a9d403e7c0a6ac4785f514c8ffea8acb3b1a5f03000084
-
Filesize
229KB
MD547dbee08b66e015eeeaf558a8945330f
SHA1e16449f252e3817ee5c313cf985111e5a48f6764
SHA256301e985ac95014a16d3d6d30c96e6caf56b4129ca9e32b2d30215c0e004877c4
SHA512a3d08a2aa77e559297f7a4f5c4582814659a2cbc103f9cc0e3f1947be8704e8767a1f3f6975654cd67a9d403e7c0a6ac4785f514c8ffea8acb3b1a5f03000084
-
Filesize
174KB
MD5e3d003fa911a70d59cd67a6018aa93f3
SHA14bed1faa114cedd63b83fb4519c3390e9d2e6b58
SHA256a87fa0754a8b1c56583db0cec1a481357fd7b3bce7f6fe5f5610deb119b9991a
SHA51239b8f274e0fd7ddd30f5b6240f85b5fb12115ec96e37f7f544a2dca76dc9ad0d60ea348894ef618d1a057fc796d76795ea59685b57f28897e5a30021d4e00c97
-
Filesize
174KB
MD5e3d003fa911a70d59cd67a6018aa93f3
SHA14bed1faa114cedd63b83fb4519c3390e9d2e6b58
SHA256a87fa0754a8b1c56583db0cec1a481357fd7b3bce7f6fe5f5610deb119b9991a
SHA51239b8f274e0fd7ddd30f5b6240f85b5fb12115ec96e37f7f544a2dca76dc9ad0d60ea348894ef618d1a057fc796d76795ea59685b57f28897e5a30021d4e00c97