Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe
Resource
win10v2004-20230915-en
General
-
Target
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe
-
Size
3.1MB
-
MD5
a2025e7e3aafc5626ff6f6006e55ff1a
-
SHA1
46a2e3ba3c5ac7cf8b487bff576ce89f999d731c
-
SHA256
d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62
-
SHA512
58f31b27711bf02d6b8f22a8322c18944194bd3cb3a9a9d584e5c6318a20648fb6e77bbe374f9993f53acfebec21531a6363652288682a797d734dfa3cf94de6
-
SSDEEP
49152:DNiDVNnhrihRC8cs6a3vTWpJZSgvZUq2bS720DnT3u0iG6oOlGn4X/:DNDhksWpJAgCB+720Xu0X6op4X
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4296-26-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1216 x7151392.exe 4408 x4344012.exe 3784 g8058190.exe 2884 i3269275.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7151392.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4344012.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 592 set thread context of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 3784 set thread context of 4296 3784 g8058190.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4296 AppLaunch.exe 4296 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4296 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 592 wrote to memory of 4108 592 d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe 94 PID 4108 wrote to memory of 1216 4108 AppLaunch.exe 95 PID 4108 wrote to memory of 1216 4108 AppLaunch.exe 95 PID 4108 wrote to memory of 1216 4108 AppLaunch.exe 95 PID 1216 wrote to memory of 4408 1216 x7151392.exe 97 PID 1216 wrote to memory of 4408 1216 x7151392.exe 97 PID 1216 wrote to memory of 4408 1216 x7151392.exe 97 PID 4408 wrote to memory of 3784 4408 x4344012.exe 98 PID 4408 wrote to memory of 3784 4408 x4344012.exe 98 PID 4408 wrote to memory of 3784 4408 x4344012.exe 98 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 3784 wrote to memory of 4296 3784 g8058190.exe 100 PID 4408 wrote to memory of 2884 4408 x4344012.exe 101 PID 4408 wrote to memory of 2884 4408 x4344012.exe 101 PID 4408 wrote to memory of 2884 4408 x4344012.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe"C:\Users\Admin\AppData\Local\Temp\d9912f8e4fe99e13c9d579d3db102dc3a0a1a2cf0b3b34dbcb47baee488b6a62.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7151392.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7151392.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4344012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4344012.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8058190.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8058190.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3269275.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3269275.exe5⤵
- Executes dropped EXE
PID:2884
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD513a6d6e194671a1f584939bc31e7a876
SHA1fa83438a19e348fe24685e9c336e557b9dbcf55a
SHA256013c287f088dedc0d4b9dc1b000af9785bbccdf9d90a5a2db479c847ef1e3eab
SHA51228be923eeedd11d7286448b55235a1a510278d690c8cf49df1d691bf6148bcf858d1aa0b2c1b68e0ccad7cb5a096ff17a46aa091fd150df8d4a1b34142a6b9ba
-
Filesize
731KB
MD513a6d6e194671a1f584939bc31e7a876
SHA1fa83438a19e348fe24685e9c336e557b9dbcf55a
SHA256013c287f088dedc0d4b9dc1b000af9785bbccdf9d90a5a2db479c847ef1e3eab
SHA51228be923eeedd11d7286448b55235a1a510278d690c8cf49df1d691bf6148bcf858d1aa0b2c1b68e0ccad7cb5a096ff17a46aa091fd150df8d4a1b34142a6b9ba
-
Filesize
565KB
MD593c373cfdcbdde6ad3f53d6b14978438
SHA14c8c78fb38c7f4dcec49bb88665cd1e4b63953c4
SHA2564e3ba544182b8177e1ece4c62bb17b75aa823ed4dc911e9b3dbccfc9e8c62296
SHA51299fdc338aec8f8cafb341da2278cf746d402511cfd152f026b0031851aeed6693743f0d293f6d01d402a113406821aa25bbd2b4c782caa95b9846d4d57bc9ad2
-
Filesize
565KB
MD593c373cfdcbdde6ad3f53d6b14978438
SHA14c8c78fb38c7f4dcec49bb88665cd1e4b63953c4
SHA2564e3ba544182b8177e1ece4c62bb17b75aa823ed4dc911e9b3dbccfc9e8c62296
SHA51299fdc338aec8f8cafb341da2278cf746d402511cfd152f026b0031851aeed6693743f0d293f6d01d402a113406821aa25bbd2b4c782caa95b9846d4d57bc9ad2
-
Filesize
1.6MB
MD55d97fda027ffe88eed21b12d146be0db
SHA1763d0dba37462dcb98e65fbce33df4e98f623c0e
SHA25652df3ad4b0bf91d266394f1941d639c3d1813f11ef110aa4d31450adb2890aa8
SHA512effb3c71145eb1680cea64e7aa350dff596e0a0e446a1ef45fd8a2719d3a65f00dcd065eb421d73e4d231ed34921c6fc109a55684e2518ac4eab7f6d9698135e
-
Filesize
1.6MB
MD55d97fda027ffe88eed21b12d146be0db
SHA1763d0dba37462dcb98e65fbce33df4e98f623c0e
SHA25652df3ad4b0bf91d266394f1941d639c3d1813f11ef110aa4d31450adb2890aa8
SHA512effb3c71145eb1680cea64e7aa350dff596e0a0e446a1ef45fd8a2719d3a65f00dcd065eb421d73e4d231ed34921c6fc109a55684e2518ac4eab7f6d9698135e
-
Filesize
174KB
MD56ee4d4697a97b31a47bc50a1b73cac05
SHA11ce5cc480ac3281a4ea25ba9cdf2be4639baaddf
SHA2566e07451dc3ee70f7a79e31544f590c2191e95ea06654acfdb1efc5fbb8cdbe1b
SHA512a405ac1982023c2872266cf04110f904fc9becdaeb2477fd3e4fd31d739a91b549397df63b26ea4158068f844a61bbf18c853bd555a351fd437dbf3940cdcea7
-
Filesize
174KB
MD56ee4d4697a97b31a47bc50a1b73cac05
SHA11ce5cc480ac3281a4ea25ba9cdf2be4639baaddf
SHA2566e07451dc3ee70f7a79e31544f590c2191e95ea06654acfdb1efc5fbb8cdbe1b
SHA512a405ac1982023c2872266cf04110f904fc9becdaeb2477fd3e4fd31d739a91b549397df63b26ea4158068f844a61bbf18c853bd555a351fd437dbf3940cdcea7