Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 21:24
Static task
static1
Behavioral task
behavioral1
Sample
2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe
Resource
win10v2004-20230915-en
General
-
Target
2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe
-
Size
1.2MB
-
MD5
1b8962bc9a8e8e0afa67fc70a6255c48
-
SHA1
6d43629096cc2b646dab105358385797f1f5a730
-
SHA256
2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599
-
SHA512
c4805b94042d3dddcecc064b3d9d1f810cb0df297afbb7ee26b33e83c64cd48342c984cc0793707baf3b972de5767cf872da7a9f285db2245fd41041316ec50d
-
SSDEEP
24576:0UvRwbo4a0xFJH67sBCJYLW7XpAy+q32kX9VEcboU3Y2tGnwli7:XvRSoM/JaQBC6W7XilqlZ3Y2tCws7
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/784-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4472 x0941529.exe 4800 x8166257.exe 4124 x0773981.exe 2288 g7084974.exe 948 h2305452.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0773981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0941529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8166257.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4228 set thread context of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 2288 set thread context of 784 2288 g7084974.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 784 AppLaunch.exe 784 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 784 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 4228 wrote to memory of 764 4228 2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe 93 PID 764 wrote to memory of 4472 764 AppLaunch.exe 94 PID 764 wrote to memory of 4472 764 AppLaunch.exe 94 PID 764 wrote to memory of 4472 764 AppLaunch.exe 94 PID 4472 wrote to memory of 4800 4472 x0941529.exe 95 PID 4472 wrote to memory of 4800 4472 x0941529.exe 95 PID 4472 wrote to memory of 4800 4472 x0941529.exe 95 PID 4800 wrote to memory of 4124 4800 x8166257.exe 96 PID 4800 wrote to memory of 4124 4800 x8166257.exe 96 PID 4800 wrote to memory of 4124 4800 x8166257.exe 96 PID 4124 wrote to memory of 2288 4124 x0773981.exe 97 PID 4124 wrote to memory of 2288 4124 x0773981.exe 97 PID 4124 wrote to memory of 2288 4124 x0773981.exe 97 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 2288 wrote to memory of 784 2288 g7084974.exe 99 PID 4124 wrote to memory of 948 4124 x0773981.exe 100 PID 4124 wrote to memory of 948 4124 x0773981.exe 100 PID 4124 wrote to memory of 948 4124 x0773981.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe"C:\Users\Admin\AppData\Local\Temp\2ad1213e958dae604444fc34a6386106abb8837e99e32c808bc226ad710af599.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0941529.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0941529.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8166257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8166257.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0773981.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0773981.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7084974.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7084974.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2305452.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2305452.exe6⤵
- Executes dropped EXE
PID:948
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD504aaf1a31365752cc33544514cb95a2c
SHA1a4f8a57fa75b000c277d128efd79e8e10a16a9a6
SHA25600affaf07c354f0272bd4f0ec157a5d552338a6bea3072a230ab16ce40bd0151
SHA5127217a4956855435f3e3527e9b4afb330bc99931256084d1a67a7e80d3d77848040a625d5287f96e8cd5966de9abc12b54716391e38d7a47ccebed4f8b66659e1
-
Filesize
757KB
MD504aaf1a31365752cc33544514cb95a2c
SHA1a4f8a57fa75b000c277d128efd79e8e10a16a9a6
SHA25600affaf07c354f0272bd4f0ec157a5d552338a6bea3072a230ab16ce40bd0151
SHA5127217a4956855435f3e3527e9b4afb330bc99931256084d1a67a7e80d3d77848040a625d5287f96e8cd5966de9abc12b54716391e38d7a47ccebed4f8b66659e1
-
Filesize
487KB
MD532cde146b0c7191e77d245a551d23d14
SHA1626a79d08bfef92a49732255c2741589c1ef2598
SHA256c1a7dc7e7516bafc5d6b789f8d82f101bad1b57bab81a887942d76f616b2b89e
SHA512f57dec6fe6aa791c5547f4027981c8855fe53031bfc7e2e0f5458d54d341e51ba089839c61ad7c56803b78825dfed98a7b906d79878837e321e9da77e775f04c
-
Filesize
487KB
MD532cde146b0c7191e77d245a551d23d14
SHA1626a79d08bfef92a49732255c2741589c1ef2598
SHA256c1a7dc7e7516bafc5d6b789f8d82f101bad1b57bab81a887942d76f616b2b89e
SHA512f57dec6fe6aa791c5547f4027981c8855fe53031bfc7e2e0f5458d54d341e51ba089839c61ad7c56803b78825dfed98a7b906d79878837e321e9da77e775f04c
-
Filesize
321KB
MD5eaa69206b62fae9c3824c36c1d2d528a
SHA1998f16e459b1bc97537183c88b841c23e21ad022
SHA2564608e2ce7cf4ac63cc4269d615c823e9b7b09b1ca2b2acfb92d0bb62ff853c71
SHA512ad70a89c127025453288ac75813bc922103f1b6d572d53c0004b9e24023151beef464e2cdd06a6c6cfe18a2aa64662511ab684e442863327d31df82af2a5269d
-
Filesize
321KB
MD5eaa69206b62fae9c3824c36c1d2d528a
SHA1998f16e459b1bc97537183c88b841c23e21ad022
SHA2564608e2ce7cf4ac63cc4269d615c823e9b7b09b1ca2b2acfb92d0bb62ff853c71
SHA512ad70a89c127025453288ac75813bc922103f1b6d572d53c0004b9e24023151beef464e2cdd06a6c6cfe18a2aa64662511ab684e442863327d31df82af2a5269d
-
Filesize
243KB
MD5938832372408a924cfe022f6a5dacfab
SHA1241dad860fcf7ff18e369d549883c539d8c0bb72
SHA256fba97566d7a756b884488f3e446cf1c568b321ffb4ac5455cfb5de32809a0623
SHA512a09e552099bd57d9d0999729d30d0546b9947b6367a441aff32e8fe28045384c1006c0228c6b017561cc72a167330c79fcc490ac975a457fc26f58c39d1a1ba5
-
Filesize
243KB
MD5938832372408a924cfe022f6a5dacfab
SHA1241dad860fcf7ff18e369d549883c539d8c0bb72
SHA256fba97566d7a756b884488f3e446cf1c568b321ffb4ac5455cfb5de32809a0623
SHA512a09e552099bd57d9d0999729d30d0546b9947b6367a441aff32e8fe28045384c1006c0228c6b017561cc72a167330c79fcc490ac975a457fc26f58c39d1a1ba5
-
Filesize
174KB
MD566a12e902073d6c6897a0b341dfd69af
SHA1cf36200960a19786f57d344131e30530b2784d48
SHA256b5e6c7cdd346de0ffb40befb1a89c993add6e392e2b880b271d613ccaf203658
SHA5123c9561565e5377b168e4e53f5c45dd9e6921e5fd83e098fd19c87f9cf64e9b3b6818736660332b225f46af604cdabddb2248f5f74420e927a8337868a0bbc855
-
Filesize
174KB
MD566a12e902073d6c6897a0b341dfd69af
SHA1cf36200960a19786f57d344131e30530b2784d48
SHA256b5e6c7cdd346de0ffb40befb1a89c993add6e392e2b880b271d613ccaf203658
SHA5123c9561565e5377b168e4e53f5c45dd9e6921e5fd83e098fd19c87f9cf64e9b3b6818736660332b225f46af604cdabddb2248f5f74420e927a8337868a0bbc855