Analysis
-
max time kernel
156s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 04:58
Static task
static1
Behavioral task
behavioral1
Sample
d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe
Resource
win10v2004-20230915-en
General
-
Target
d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe
-
Size
1.2MB
-
MD5
7912eeab9701c8f6ba478ead152a1b31
-
SHA1
3bb1220bf0d4e0c638e1698cbdbc1dd4b43c57b0
-
SHA256
d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c
-
SHA512
a016e61ba8ac488c25deacf3c780f66128551884760c8a09f530050f8983a36760caf6b429a85ccc6f2bd56a7a08dca04a2211ff6a2bfdf47138a9100f3d19be
-
SSDEEP
24576:o74crjwmjYWwkgiXwrNK2lZ4J9yhrORgrOyjdG:m4crU5Lkgig59rh/ndG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1532-33-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2936 x8306276.exe 4296 x3177906.exe 1544 x4796406.exe 4192 g6566002.exe 2712 h0288386.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8306276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3177906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4796406.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1072 set thread context of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 4192 set thread context of 1532 4192 g6566002.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 AppLaunch.exe 1532 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 1072 wrote to memory of 3752 1072 d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe 92 PID 3752 wrote to memory of 2936 3752 AppLaunch.exe 94 PID 3752 wrote to memory of 2936 3752 AppLaunch.exe 94 PID 3752 wrote to memory of 2936 3752 AppLaunch.exe 94 PID 2936 wrote to memory of 4296 2936 x8306276.exe 95 PID 2936 wrote to memory of 4296 2936 x8306276.exe 95 PID 2936 wrote to memory of 4296 2936 x8306276.exe 95 PID 4296 wrote to memory of 1544 4296 x3177906.exe 96 PID 4296 wrote to memory of 1544 4296 x3177906.exe 96 PID 4296 wrote to memory of 1544 4296 x3177906.exe 96 PID 1544 wrote to memory of 4192 1544 x4796406.exe 97 PID 1544 wrote to memory of 4192 1544 x4796406.exe 97 PID 1544 wrote to memory of 4192 1544 x4796406.exe 97 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 4192 wrote to memory of 1532 4192 g6566002.exe 99 PID 1544 wrote to memory of 2712 1544 x4796406.exe 100 PID 1544 wrote to memory of 2712 1544 x4796406.exe 100 PID 1544 wrote to memory of 2712 1544 x4796406.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe"C:\Users\Admin\AppData\Local\Temp\d342f782a322b1505dd3a05655c04da2dfa3a16333086c50777e98929f7af57c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8306276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8306276.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3177906.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3177906.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4796406.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4796406.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6566002.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6566002.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0288386.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0288386.exe6⤵
- Executes dropped EXE
PID:2712
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5378a308e36386d4d208e2141ee40e1ff
SHA176a273d0d3991f883fbeac651c18ecd0d8244b16
SHA256c2acd6a360c79b38370ee35c14bcaf86dc31d4aa620c4675a575b8bf3c45668b
SHA51240ac18cfdd59dfcf070dd73f32b765e69ebb84d5ec030665dcea9479fa767f4ea0b2fafc8848aeb2e833609f2c4e246fb757006eacd60eede9be81d03701c2b8
-
Filesize
744KB
MD5378a308e36386d4d208e2141ee40e1ff
SHA176a273d0d3991f883fbeac651c18ecd0d8244b16
SHA256c2acd6a360c79b38370ee35c14bcaf86dc31d4aa620c4675a575b8bf3c45668b
SHA51240ac18cfdd59dfcf070dd73f32b765e69ebb84d5ec030665dcea9479fa767f4ea0b2fafc8848aeb2e833609f2c4e246fb757006eacd60eede9be81d03701c2b8
-
Filesize
481KB
MD5be694eeef5bb67eb7aae3d5e4089466f
SHA1a55876b7aba382789150797f9bb4273614097043
SHA256486a11073c42b91efe7829c2b9451e6f923ee9b681ca51f9197fce766a4e1e75
SHA512dd582f79ff8a5737f0f8f4202337193a684475b41492c1e1feefaf4e788a906f4d94ddc741b16f25e36eaf998a34cc4a01017dfe8f864a5164c8f91506069a0d
-
Filesize
481KB
MD5be694eeef5bb67eb7aae3d5e4089466f
SHA1a55876b7aba382789150797f9bb4273614097043
SHA256486a11073c42b91efe7829c2b9451e6f923ee9b681ca51f9197fce766a4e1e75
SHA512dd582f79ff8a5737f0f8f4202337193a684475b41492c1e1feefaf4e788a906f4d94ddc741b16f25e36eaf998a34cc4a01017dfe8f864a5164c8f91506069a0d
-
Filesize
315KB
MD5e0d08dfba7eb56f3d3b59348f63273f4
SHA14e6308cc0411c626c6eaca2962ccf4dfc7a385a6
SHA2560619e6af15143fc32155edf57166739011b9342f8b950075bfeb19ad34ad0855
SHA512470839b086d1bf603cf3472e4c439d25b25844f58f2d511347bf3c45c559bd1cafb2aec70055bc973b7f49f4950c87b08edbd08a7c760e5e12d3cae866213d39
-
Filesize
315KB
MD5e0d08dfba7eb56f3d3b59348f63273f4
SHA14e6308cc0411c626c6eaca2962ccf4dfc7a385a6
SHA2560619e6af15143fc32155edf57166739011b9342f8b950075bfeb19ad34ad0855
SHA512470839b086d1bf603cf3472e4c439d25b25844f58f2d511347bf3c45c559bd1cafb2aec70055bc973b7f49f4950c87b08edbd08a7c760e5e12d3cae866213d39
-
Filesize
229KB
MD535ac06f35158af032949712601dbbf7f
SHA18cfd1716c9e3712ff0088473a52333f1cdf54bd9
SHA256b2717d1bf90db18a3e24c47899b1da4246c0ec64a3eed774edb8785dfd5a9d9d
SHA512efc1cc07e617e4b61f5f280fb7dc73e211c29ce9e81790f118f72ddd5c522d4f768b40127364104505ea5f153cc7ccd458341011ab3e3a075af992d0ffcbd6e1
-
Filesize
229KB
MD535ac06f35158af032949712601dbbf7f
SHA18cfd1716c9e3712ff0088473a52333f1cdf54bd9
SHA256b2717d1bf90db18a3e24c47899b1da4246c0ec64a3eed774edb8785dfd5a9d9d
SHA512efc1cc07e617e4b61f5f280fb7dc73e211c29ce9e81790f118f72ddd5c522d4f768b40127364104505ea5f153cc7ccd458341011ab3e3a075af992d0ffcbd6e1
-
Filesize
174KB
MD569fe6fcce8105599dcf1a3ed2a7a0e99
SHA1589f5880cc837544d0e4e5e467ec4bfc88f9a6c1
SHA256039f72d83cac5ccf2c24ec418f5dbdf288be03d2839507ecca75495ea342d2f3
SHA512ac4826f447c55cea81cc44e3c118d2f6a7155e069cf1a82243ed83775a53fbe93d22185e717f0d1bdf436da1e7b8391ba56cbc439bb527c475bc16d047497cc1
-
Filesize
174KB
MD569fe6fcce8105599dcf1a3ed2a7a0e99
SHA1589f5880cc837544d0e4e5e467ec4bfc88f9a6c1
SHA256039f72d83cac5ccf2c24ec418f5dbdf288be03d2839507ecca75495ea342d2f3
SHA512ac4826f447c55cea81cc44e3c118d2f6a7155e069cf1a82243ed83775a53fbe93d22185e717f0d1bdf436da1e7b8391ba56cbc439bb527c475bc16d047497cc1