Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe
Resource
win10v2004-20230915-en
General
-
Target
dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe
-
Size
1.2MB
-
MD5
f215a407d62bede3ecfafc09413bb626
-
SHA1
a274120159dbea3514d321c0286b85c52afdc4d7
-
SHA256
dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8
-
SHA512
870e80132d2386972f74cac4dfc307594e8f8db5ae591164a04e98245bae64cdcf1267067f9406cfb3ec3892cb82ae9fac4bb204531abbc7d5d46e20a0e1da58
-
SSDEEP
24576:t/84HRkUaFT/oghGcA6v1VYIDcS6lSYtjWAiOlSJsKAZZ9t+cThWBtG:F84HubpA6v11IPoYtFiASJA91hWBtG
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4948-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1464 x0146992.exe 4620 x9141899.exe 4236 x3876609.exe 4584 g1881221.exe 2732 h3996221.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0146992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9141899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3876609.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1180 set thread context of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 4584 set thread context of 4948 4584 g1881221.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4948 AppLaunch.exe 4948 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4948 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3988 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 91 PID 1180 wrote to memory of 3988 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 91 PID 1180 wrote to memory of 3988 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 91 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 1180 wrote to memory of 4920 1180 dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe 92 PID 4920 wrote to memory of 1464 4920 AppLaunch.exe 93 PID 4920 wrote to memory of 1464 4920 AppLaunch.exe 93 PID 4920 wrote to memory of 1464 4920 AppLaunch.exe 93 PID 1464 wrote to memory of 4620 1464 x0146992.exe 94 PID 1464 wrote to memory of 4620 1464 x0146992.exe 94 PID 1464 wrote to memory of 4620 1464 x0146992.exe 94 PID 4620 wrote to memory of 4236 4620 x9141899.exe 96 PID 4620 wrote to memory of 4236 4620 x9141899.exe 96 PID 4620 wrote to memory of 4236 4620 x9141899.exe 96 PID 4236 wrote to memory of 4584 4236 x3876609.exe 98 PID 4236 wrote to memory of 4584 4236 x3876609.exe 98 PID 4236 wrote to memory of 4584 4236 x3876609.exe 98 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4584 wrote to memory of 4948 4584 g1881221.exe 100 PID 4236 wrote to memory of 2732 4236 x3876609.exe 101 PID 4236 wrote to memory of 2732 4236 x3876609.exe 101 PID 4236 wrote to memory of 2732 4236 x3876609.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe"C:\Users\Admin\AppData\Local\Temp\dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exe6⤵
- Executes dropped EXE
PID:2732
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD58a9c486034e3fe9bdd60ebfec340690d
SHA1ad1368129dd9bd7f01ee2ab0fa6ca5486c40b6cd
SHA25637191dd960f97dc301ebd6d44e38aa28c756d246c5a1a63650e472b8ca14fc48
SHA512a44379a8515899e7b32236279b73134a93699500064f30ee05deccd14284f82683ccae936cb4e2504fcb17340b0e9196f42e6ffed87afb8e9d6af905b67947e7
-
Filesize
745KB
MD58a9c486034e3fe9bdd60ebfec340690d
SHA1ad1368129dd9bd7f01ee2ab0fa6ca5486c40b6cd
SHA25637191dd960f97dc301ebd6d44e38aa28c756d246c5a1a63650e472b8ca14fc48
SHA512a44379a8515899e7b32236279b73134a93699500064f30ee05deccd14284f82683ccae936cb4e2504fcb17340b0e9196f42e6ffed87afb8e9d6af905b67947e7
-
Filesize
480KB
MD5fcfc8f71a242817e694d29429c123375
SHA18d7a781962986c7db6f35f8123b19c1d16663fbf
SHA256615c04a9d72d8c8bdc4665f5e0964be25fc8d8fe37ae5a27cff6109acaba7c4f
SHA5123ec70e3c1bdce7ef9c835aa88996d79ac9a4d21b2fc85ebf2c2f0218b609bc3249865ce00f2556a7c35468953aa0123abeabbd66179133615b08ab4708a037ca
-
Filesize
480KB
MD5fcfc8f71a242817e694d29429c123375
SHA18d7a781962986c7db6f35f8123b19c1d16663fbf
SHA256615c04a9d72d8c8bdc4665f5e0964be25fc8d8fe37ae5a27cff6109acaba7c4f
SHA5123ec70e3c1bdce7ef9c835aa88996d79ac9a4d21b2fc85ebf2c2f0218b609bc3249865ce00f2556a7c35468953aa0123abeabbd66179133615b08ab4708a037ca
-
Filesize
314KB
MD589ea3d05834101380750597dbf3b4515
SHA1418483968f60006e46bf76facec4637d2ecf7688
SHA256312db8f1cdd4c7a3757563d838a7dd230f196d9a34c2ec87cbb56b0738e0155b
SHA5120d7cb48bf1d5e5714b6ecd4ab481c27f6e917db436a98a6aa83291795f7562f02f261ec3a94468f68b3970ccdae8ee4601fd80492e62875a6ed566c8ea190709
-
Filesize
314KB
MD589ea3d05834101380750597dbf3b4515
SHA1418483968f60006e46bf76facec4637d2ecf7688
SHA256312db8f1cdd4c7a3757563d838a7dd230f196d9a34c2ec87cbb56b0738e0155b
SHA5120d7cb48bf1d5e5714b6ecd4ab481c27f6e917db436a98a6aa83291795f7562f02f261ec3a94468f68b3970ccdae8ee4601fd80492e62875a6ed566c8ea190709
-
Filesize
229KB
MD55fc2ceaca915afa951492d02bdf84645
SHA1af0b656b869fb1f77fe961155ae038c1ef889cd2
SHA256d0919e54965cfd3722b29786dee3dc62b26323064ffa2fc4b41e6c77a347c2f5
SHA512c836ef2aae3baf9c6fa1ea3c7a389bad2ba547a227b0f22e931d57080e53557a92be444320472aa2970b2fe0afd2e4a0750c1491ca18d4670584148aa9672df1
-
Filesize
229KB
MD55fc2ceaca915afa951492d02bdf84645
SHA1af0b656b869fb1f77fe961155ae038c1ef889cd2
SHA256d0919e54965cfd3722b29786dee3dc62b26323064ffa2fc4b41e6c77a347c2f5
SHA512c836ef2aae3baf9c6fa1ea3c7a389bad2ba547a227b0f22e931d57080e53557a92be444320472aa2970b2fe0afd2e4a0750c1491ca18d4670584148aa9672df1
-
Filesize
174KB
MD5d9e6250d5c586ad6f535c996d9f83b14
SHA1eb77e9cfb8f7b51953c9e838dbecd276add6885f
SHA256bb4e960ea9f7541f953b483cae09cceba14e603df04eb484351fcc286c7fb1e3
SHA512d2461b92cf1ed6e1dd22cb280963b2640ce6837e9caf252b9e5cebed3bd64614042093eda1fbae6b1d0e652c3bbfbc188e03bc98334f1f30ed8ded17cc65f3a9
-
Filesize
174KB
MD5d9e6250d5c586ad6f535c996d9f83b14
SHA1eb77e9cfb8f7b51953c9e838dbecd276add6885f
SHA256bb4e960ea9f7541f953b483cae09cceba14e603df04eb484351fcc286c7fb1e3
SHA512d2461b92cf1ed6e1dd22cb280963b2640ce6837e9caf252b9e5cebed3bd64614042093eda1fbae6b1d0e652c3bbfbc188e03bc98334f1f30ed8ded17cc65f3a9