Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 01:16
Static task
static1
Behavioral task
behavioral1
Sample
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe
Resource
win10v2004-20230915-en
General
-
Target
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe
-
Size
3.1MB
-
MD5
5b9ec3fae99bb92e75e9a1f015b3243e
-
SHA1
3c5e818c028c64749214c759ff770ddfb29520ae
-
SHA256
145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b
-
SHA512
a46bd9129c8bc108bc3af261e3318849c60fe38ea3713b9a1ebfdf7f62a82d9217a21a9f4864236961a6b3dc09e3c2678aa2b78eac5d618d1e356dc42091f5bc
-
SSDEEP
49152:L0G61NSHhsXL1pxR1d6a3vMUMduYJIWk1KvYY+rClyuqsTgj2mM/7:L0GoL1AAMwYJIWkQvYDrZVsE6
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3232-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1216 x1205865.exe 3680 x7739434.exe 1664 g7978098.exe 4676 i4297917.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1205865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7739434.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2740 set thread context of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 1664 set thread context of 3232 1664 g7978098.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3232 AppLaunch.exe 3232 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3232 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 2740 wrote to memory of 4396 2740 145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe 93 PID 4396 wrote to memory of 1216 4396 AppLaunch.exe 95 PID 4396 wrote to memory of 1216 4396 AppLaunch.exe 95 PID 4396 wrote to memory of 1216 4396 AppLaunch.exe 95 PID 1216 wrote to memory of 3680 1216 x1205865.exe 96 PID 1216 wrote to memory of 3680 1216 x1205865.exe 96 PID 1216 wrote to memory of 3680 1216 x1205865.exe 96 PID 3680 wrote to memory of 1664 3680 x7739434.exe 97 PID 3680 wrote to memory of 1664 3680 x7739434.exe 97 PID 3680 wrote to memory of 1664 3680 x7739434.exe 97 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 1664 wrote to memory of 3232 1664 g7978098.exe 99 PID 3680 wrote to memory of 4676 3680 x7739434.exe 100 PID 3680 wrote to memory of 4676 3680 x7739434.exe 100 PID 3680 wrote to memory of 4676 3680 x7739434.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe"C:\Users\Admin\AppData\Local\Temp\145089eac4eee464f440bc6df141bb1eb04a043aa92673f4e0b30632d63f7f0b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1205865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1205865.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7739434.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7739434.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7978098.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7978098.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4297917.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4297917.exe5⤵
- Executes dropped EXE
PID:4676
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5ec84d3a0ac276692af8d455b3a69185e
SHA1812e84e385245783e28c367c27802149f6d0da4d
SHA256cf010d3fe624bf1d7e3758d5c6789205f72e68e5a615d0fe6e413abf10bd0ac9
SHA51257c7c92a8beae2033924f939637378648142b5e0cbbd3905b3958cd899002c346a79b2c3cf6cc860c6a67017391b94b28a369a2636355f2e7515dacb852ca071
-
Filesize
731KB
MD5ec84d3a0ac276692af8d455b3a69185e
SHA1812e84e385245783e28c367c27802149f6d0da4d
SHA256cf010d3fe624bf1d7e3758d5c6789205f72e68e5a615d0fe6e413abf10bd0ac9
SHA51257c7c92a8beae2033924f939637378648142b5e0cbbd3905b3958cd899002c346a79b2c3cf6cc860c6a67017391b94b28a369a2636355f2e7515dacb852ca071
-
Filesize
565KB
MD5dd731d1f75eaa51f12b9400c5a1995d7
SHA1bfb9c68d91964d0417f859f5401b6ea76a14ce17
SHA2561ed8fe1ba149ce35f13f2c23a0deba29b29b40c72a0a2ed39aa4cba4a3e9edbe
SHA512b31addf38a3498f8c3ea2ee522221cad008dcec1e211492ab6bb4d544d31a45c5713babd87f9298717e7b5aa56c84c170ee4483f441e1d9d94160fdac8f62acf
-
Filesize
565KB
MD5dd731d1f75eaa51f12b9400c5a1995d7
SHA1bfb9c68d91964d0417f859f5401b6ea76a14ce17
SHA2561ed8fe1ba149ce35f13f2c23a0deba29b29b40c72a0a2ed39aa4cba4a3e9edbe
SHA512b31addf38a3498f8c3ea2ee522221cad008dcec1e211492ab6bb4d544d31a45c5713babd87f9298717e7b5aa56c84c170ee4483f441e1d9d94160fdac8f62acf
-
Filesize
1.6MB
MD52ea1833b63d5420a03f96ecb56c6f8d8
SHA190462279987b5288bb8de60491dc001f969e581b
SHA256cd693729981bd527e0af2d1a70f6605d54418a24d3f3068535862353a3ea2522
SHA5122adddb9303d1124f65f74cd9daf740566e345025c90bcf4afdd68db81e6ea29d8a12d5a3bd264669d0104b4341c3053eb6bc962cb7e98c76962f7122a2f0b042
-
Filesize
1.6MB
MD52ea1833b63d5420a03f96ecb56c6f8d8
SHA190462279987b5288bb8de60491dc001f969e581b
SHA256cd693729981bd527e0af2d1a70f6605d54418a24d3f3068535862353a3ea2522
SHA5122adddb9303d1124f65f74cd9daf740566e345025c90bcf4afdd68db81e6ea29d8a12d5a3bd264669d0104b4341c3053eb6bc962cb7e98c76962f7122a2f0b042
-
Filesize
174KB
MD51757158187d4347b298a36cb19e29ac3
SHA143ad875fa3936ed72d4f7d335081a683a3b6692e
SHA256d5bf1fb412f16d881ccb9dc8644dd5f1bdadac2ed774e2a88a3f6da6069198ed
SHA512a697d5d8a0ad5ab81d1f081e759d17a091840501055b96af499186ef2ccdd16844c2ea976178be61001f25dd60cb2876009a72ed155719197108375897b90d16
-
Filesize
174KB
MD51757158187d4347b298a36cb19e29ac3
SHA143ad875fa3936ed72d4f7d335081a683a3b6692e
SHA256d5bf1fb412f16d881ccb9dc8644dd5f1bdadac2ed774e2a88a3f6da6069198ed
SHA512a697d5d8a0ad5ab81d1f081e759d17a091840501055b96af499186ef2ccdd16844c2ea976178be61001f25dd60cb2876009a72ed155719197108375897b90d16