Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe
Resource
win10v2004-20230915-en
General
-
Target
03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe
-
Size
3.1MB
-
MD5
4998e293623bf8a3b2dcc64243a4eb4b
-
SHA1
c679f2883e2ac3ebeef22197961af51e437780b1
-
SHA256
03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5
-
SHA512
3fd4f251b0402be28a8d1732d2b6f5046f6571a6780b65d821420ca4a72e677e9919f064d24880aa48135a3fe2b621e3ddb1328205cb883c0c4e633b09689a24
-
SSDEEP
49152:zZuDVNnhrahRC8cs6a3vd2vS+xmYhOq2kxE9HbWKATwThL3TV:zZnhkW+8Ysq2GC7jATch
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1860-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3132 x7389874.exe 3968 x7411477.exe 4088 g6476946.exe 2992 i6777187.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7389874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7411477.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 216 set thread context of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 4088 set thread context of 1860 4088 g6476946.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1860 AppLaunch.exe 1860 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1860 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 216 wrote to memory of 4464 216 03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe 93 PID 4464 wrote to memory of 3132 4464 AppLaunch.exe 94 PID 4464 wrote to memory of 3132 4464 AppLaunch.exe 94 PID 4464 wrote to memory of 3132 4464 AppLaunch.exe 94 PID 3132 wrote to memory of 3968 3132 x7389874.exe 95 PID 3132 wrote to memory of 3968 3132 x7389874.exe 95 PID 3132 wrote to memory of 3968 3132 x7389874.exe 95 PID 3968 wrote to memory of 4088 3968 x7411477.exe 96 PID 3968 wrote to memory of 4088 3968 x7411477.exe 96 PID 3968 wrote to memory of 4088 3968 x7411477.exe 96 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 4088 wrote to memory of 1860 4088 g6476946.exe 98 PID 3968 wrote to memory of 2992 3968 x7411477.exe 99 PID 3968 wrote to memory of 2992 3968 x7411477.exe 99 PID 3968 wrote to memory of 2992 3968 x7411477.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe"C:\Users\Admin\AppData\Local\Temp\03a604d08abe6e708f7100e0643409a803d134d03c6575fbfa68655027f166a5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7389874.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7389874.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7411477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7411477.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6476946.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6476946.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6777187.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6777187.exe5⤵
- Executes dropped EXE
PID:2992
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5c531db71041acb8fc309b8cd92e504bd
SHA1ae79c8005589957ac3836d031ea6817be7eb8f55
SHA2563e9a6f0963caafe01b10e571d980cf52459b92ebebe3d94375ab5ebfcc62e3f5
SHA51288c5ae348ad271318193a5a1f2194ddb661a0efcbdbade33485df303f57a4c52ef9ac3ea213c74eb18442280cb94311f53edb8957cb6d4fc4cc586cfa1c79ded
-
Filesize
731KB
MD5c531db71041acb8fc309b8cd92e504bd
SHA1ae79c8005589957ac3836d031ea6817be7eb8f55
SHA2563e9a6f0963caafe01b10e571d980cf52459b92ebebe3d94375ab5ebfcc62e3f5
SHA51288c5ae348ad271318193a5a1f2194ddb661a0efcbdbade33485df303f57a4c52ef9ac3ea213c74eb18442280cb94311f53edb8957cb6d4fc4cc586cfa1c79ded
-
Filesize
565KB
MD5796cb5caaaf9b97d9daf9c3d83eaeb4b
SHA1346a0d40997adf3b739fc88d6dea83b81d06bdcd
SHA256600e45d8df7b4e0572613e9b619f48e31d72c365cc11125e1ae56e3f7d2ac77d
SHA512c67bced4639ca2df68e6f916745b82dfdab53d97acd4d3fe5cba5b6b93f85f8065274a05cc4233ad8aa3b333ac154616859dd5cdc059098397a51a3d28e3f0e5
-
Filesize
565KB
MD5796cb5caaaf9b97d9daf9c3d83eaeb4b
SHA1346a0d40997adf3b739fc88d6dea83b81d06bdcd
SHA256600e45d8df7b4e0572613e9b619f48e31d72c365cc11125e1ae56e3f7d2ac77d
SHA512c67bced4639ca2df68e6f916745b82dfdab53d97acd4d3fe5cba5b6b93f85f8065274a05cc4233ad8aa3b333ac154616859dd5cdc059098397a51a3d28e3f0e5
-
Filesize
1.6MB
MD57a0dda550a799f81bef77fb2a62416d2
SHA16f275fc5dbc3245e4e9e21c6461d500139d96b8e
SHA2567649666eb86187d38542dc0013b0807cd4da7a2ec75c9ec5d052523c03ef6095
SHA51209f36d33c311eb02ff223ff2118986bff291f3c884c8ec032a97219a5783f336b6538c8cad3d928c2dea3c976bb99a8a444d598a161acf736aec437b14638d76
-
Filesize
1.6MB
MD57a0dda550a799f81bef77fb2a62416d2
SHA16f275fc5dbc3245e4e9e21c6461d500139d96b8e
SHA2567649666eb86187d38542dc0013b0807cd4da7a2ec75c9ec5d052523c03ef6095
SHA51209f36d33c311eb02ff223ff2118986bff291f3c884c8ec032a97219a5783f336b6538c8cad3d928c2dea3c976bb99a8a444d598a161acf736aec437b14638d76
-
Filesize
174KB
MD5d74a80ec879560b63cba340cd480527a
SHA115eefe727c6350a5ba04836e537f9413cbe58f05
SHA256c6e7a8ef8170a3afa80279700d8758f7da4e78536ddc099c391a04aff51662bc
SHA512e56f733f1f69f367bfff161dd33cd54d841b19d6a73687428e86c24a5a4ca6e3030aeba627251b7bd24e722e6ded5d2dcb4b80fdbcc83afb61c6022fdda1a983
-
Filesize
174KB
MD5d74a80ec879560b63cba340cd480527a
SHA115eefe727c6350a5ba04836e537f9413cbe58f05
SHA256c6e7a8ef8170a3afa80279700d8758f7da4e78536ddc099c391a04aff51662bc
SHA512e56f733f1f69f367bfff161dd33cd54d841b19d6a73687428e86c24a5a4ca6e3030aeba627251b7bd24e722e6ded5d2dcb4b80fdbcc83afb61c6022fdda1a983