Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe
Resource
win10v2004-20230915-en
General
-
Target
bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe
-
Size
930KB
-
MD5
3460167c1d4aa82be63e7d58086d4dc3
-
SHA1
698a2c76dca22b0434f435fa686b8e16d3c09e07
-
SHA256
bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa
-
SHA512
79ab6533342e459d8d2c9602938541fdd9388dfa0fdd74c3d7ce2ac429a3a30da1b9cfc185312614e176ea8ec70540f729b92e651dce570baf0808f3f22441ac
-
SSDEEP
12288:d6//yfYb5BIQZVte2f8sD5ARNRDDyBPd0mWuh1eueMbQkXwSUqf7ZOqPMeIX9iDF:giuBtZsDM0fuuuw9qZFbANhTil+85
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4676-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2716 x4178977.exe 3772 x7139549.exe 932 g7790623.exe 4556 i9921014.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4178977.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7139549.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3140 set thread context of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 932 set thread context of 4676 932 g7790623.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4676 AppLaunch.exe 4676 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3140 wrote to memory of 3004 3140 bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe 91 PID 3004 wrote to memory of 2716 3004 AppLaunch.exe 92 PID 3004 wrote to memory of 2716 3004 AppLaunch.exe 92 PID 3004 wrote to memory of 2716 3004 AppLaunch.exe 92 PID 2716 wrote to memory of 3772 2716 x4178977.exe 93 PID 2716 wrote to memory of 3772 2716 x4178977.exe 93 PID 2716 wrote to memory of 3772 2716 x4178977.exe 93 PID 3772 wrote to memory of 932 3772 x7139549.exe 94 PID 3772 wrote to memory of 932 3772 x7139549.exe 94 PID 3772 wrote to memory of 932 3772 x7139549.exe 94 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 932 wrote to memory of 4676 932 g7790623.exe 96 PID 3772 wrote to memory of 4556 3772 x7139549.exe 97 PID 3772 wrote to memory of 4556 3772 x7139549.exe 97 PID 3772 wrote to memory of 4556 3772 x7139549.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe"C:\Users\Admin\AppData\Local\Temp\bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exe5⤵
- Executes dropped EXE
PID:4556
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD5e1d705a1796454f75a22a8bd66d476d9
SHA1285f4c74aee6d727071539e652608a8127ca1275
SHA2563570daade39c9da56787ee7151b4b0cabc1d1626f29d5c0f0011ad3f076ada0b
SHA512fa1e4c4ab17bde8d7b0a5de2ac9fca84a42a36784abffeaa4791d86c7fbaed7be14181165aead4759498ee81a8e970c716f8348a96effcb75ae210790961604b
-
Filesize
472KB
MD5e1d705a1796454f75a22a8bd66d476d9
SHA1285f4c74aee6d727071539e652608a8127ca1275
SHA2563570daade39c9da56787ee7151b4b0cabc1d1626f29d5c0f0011ad3f076ada0b
SHA512fa1e4c4ab17bde8d7b0a5de2ac9fca84a42a36784abffeaa4791d86c7fbaed7be14181165aead4759498ee81a8e970c716f8348a96effcb75ae210790961604b
-
Filesize
306KB
MD5b750d904b6ff2158540d535b8a0ed03f
SHA1648e95b90eb1208896f13fa26e72959a7c775065
SHA2563316f2bc38e015fb6d8944c29e09fddcb5f797705418498745bc78ed44d6cd9f
SHA512d0b9a2a48e304507e74bfc83174113e9f54b88d3c0bd54738af3e74801d24c811ed32a539d130f69c90ea6adfe3ad7ef9bbe8f0dc9843ac91e4cda2880b1c1f7
-
Filesize
306KB
MD5b750d904b6ff2158540d535b8a0ed03f
SHA1648e95b90eb1208896f13fa26e72959a7c775065
SHA2563316f2bc38e015fb6d8944c29e09fddcb5f797705418498745bc78ed44d6cd9f
SHA512d0b9a2a48e304507e74bfc83174113e9f54b88d3c0bd54738af3e74801d24c811ed32a539d130f69c90ea6adfe3ad7ef9bbe8f0dc9843ac91e4cda2880b1c1f7
-
Filesize
213KB
MD5702c7568161266ab21e42901c92a6d3c
SHA1287e205d3bff2942f7daf5c0ce8d0cb1c9fdafb6
SHA2560e20beced9cfe7c2390ad1df6a0ba123b8221e234b09bcc95d4115c943e48380
SHA51266d9f48482ecdb643dd6e2e7d78083046b58f390db77120142d2e9cb6b51b2f16c9f7b8b3e108cf3dee27cd691514e3f12e422971bb5b105a1b14bc56ad89715
-
Filesize
213KB
MD5702c7568161266ab21e42901c92a6d3c
SHA1287e205d3bff2942f7daf5c0ce8d0cb1c9fdafb6
SHA2560e20beced9cfe7c2390ad1df6a0ba123b8221e234b09bcc95d4115c943e48380
SHA51266d9f48482ecdb643dd6e2e7d78083046b58f390db77120142d2e9cb6b51b2f16c9f7b8b3e108cf3dee27cd691514e3f12e422971bb5b105a1b14bc56ad89715
-
Filesize
175KB
MD59cb2a7b776a7844ae8e0f31370e51a81
SHA14c9e92ee1308de714cccfb548d3ed58cf4eb81d2
SHA2565b20722fe46207296f73aed10bd1657a52bf939abb1c234c523bc8cb0a14a78a
SHA512d544a899957e7ee6fd1d8148fcfa89eab3f4a512b80826aa92c3ccd9cad5443fc352ea0dde54abbf1ea49238f3ad8cb0f74885bd2b426fd6f93bc01f670b0670
-
Filesize
175KB
MD59cb2a7b776a7844ae8e0f31370e51a81
SHA14c9e92ee1308de714cccfb548d3ed58cf4eb81d2
SHA2565b20722fe46207296f73aed10bd1657a52bf939abb1c234c523bc8cb0a14a78a
SHA512d544a899957e7ee6fd1d8148fcfa89eab3f4a512b80826aa92c3ccd9cad5443fc352ea0dde54abbf1ea49238f3ad8cb0f74885bd2b426fd6f93bc01f670b0670