Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe
Resource
win10v2004-20230915-en
General
-
Target
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe
-
Size
930KB
-
MD5
3adaf24d1989bdf0316068a9d979b0f8
-
SHA1
ec573867a14b2d3cdcf22c9482ef33d88804a4ab
-
SHA256
2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc
-
SHA512
ce37e4994dc278d662add87a1b133d6bbfccfb43b569a01062f6a0f958095152f3a77adabb2bef3370446c57940a95b6df458232fce6738e70ac3b3c97f5acfb
-
SSDEEP
12288:dx//yfYb5BIQZVtMdSGfwAIFyNsO/f2hY2YSKRZVEnzJsWNww3yMpj0uIgRPAB+3:TiuBtZVCUUXxSMwJNmOyMpj0uJRI+7
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/5044-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2784 x6817165.exe 1852 x4337223.exe 3100 g7231068.exe 4612 i1006566.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6817165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4337223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3132 set thread context of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3100 set thread context of 5044 3100 g7231068.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5044 AppLaunch.exe 5044 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5044 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 3132 wrote to memory of 4740 3132 2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe 89 PID 4740 wrote to memory of 2784 4740 AppLaunch.exe 91 PID 4740 wrote to memory of 2784 4740 AppLaunch.exe 91 PID 4740 wrote to memory of 2784 4740 AppLaunch.exe 91 PID 2784 wrote to memory of 1852 2784 x6817165.exe 92 PID 2784 wrote to memory of 1852 2784 x6817165.exe 92 PID 2784 wrote to memory of 1852 2784 x6817165.exe 92 PID 1852 wrote to memory of 3100 1852 x4337223.exe 93 PID 1852 wrote to memory of 3100 1852 x4337223.exe 93 PID 1852 wrote to memory of 3100 1852 x4337223.exe 93 PID 3100 wrote to memory of 5048 3100 g7231068.exe 95 PID 3100 wrote to memory of 5048 3100 g7231068.exe 95 PID 3100 wrote to memory of 5048 3100 g7231068.exe 95 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 3100 wrote to memory of 5044 3100 g7231068.exe 96 PID 1852 wrote to memory of 4612 1852 x4337223.exe 97 PID 1852 wrote to memory of 4612 1852 x4337223.exe 97 PID 1852 wrote to memory of 4612 1852 x4337223.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe"C:\Users\Admin\AppData\Local\Temp\2a892da211ca6c64e82deeee6ade8cecace7b89c8e534e05d47a2a8334b7c7cc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6817165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6817165.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4337223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4337223.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7231068.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7231068.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1006566.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1006566.exe5⤵
- Executes dropped EXE
PID:4612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD59736c4d54f1d6b94fc80651d61a2779f
SHA16795dcffaf0cec5ec738c4f07346ef215ed51122
SHA2565bbfcf4a968a7e89c82f3a0524db79ac28e8a80da75abdcda5c38df26126fcdf
SHA5120eb47652035183d8867f8893dd22d07612917aa44528d9a20c7458ae02a81b7b1139216e6eb30c10f55cb71b26ff3ae03799bec8e5500512fa113912ecee18a4
-
Filesize
472KB
MD59736c4d54f1d6b94fc80651d61a2779f
SHA16795dcffaf0cec5ec738c4f07346ef215ed51122
SHA2565bbfcf4a968a7e89c82f3a0524db79ac28e8a80da75abdcda5c38df26126fcdf
SHA5120eb47652035183d8867f8893dd22d07612917aa44528d9a20c7458ae02a81b7b1139216e6eb30c10f55cb71b26ff3ae03799bec8e5500512fa113912ecee18a4
-
Filesize
306KB
MD546324a1afca91fb1d12b99c0864b5a6f
SHA1b28482b4f63a94b068f158125e654c8cc4f09da2
SHA256429d2f1a956dc43eb2950680477be5d9e64d534c7a166f1209242ec6d631ab8e
SHA51244fae54a59d2f78ac70221eadefe5ee1d0bb427a30b4fc198dc31f2c7f5e778baf0334dc9a4cb9fdd12589f2e601f051e8253455a79d17d8c917e4983ff97bb1
-
Filesize
306KB
MD546324a1afca91fb1d12b99c0864b5a6f
SHA1b28482b4f63a94b068f158125e654c8cc4f09da2
SHA256429d2f1a956dc43eb2950680477be5d9e64d534c7a166f1209242ec6d631ab8e
SHA51244fae54a59d2f78ac70221eadefe5ee1d0bb427a30b4fc198dc31f2c7f5e778baf0334dc9a4cb9fdd12589f2e601f051e8253455a79d17d8c917e4983ff97bb1
-
Filesize
213KB
MD5d1665d820d26bc7ec28d59bd8f76d3ad
SHA1df7a7462d4d720d7e3ec99f75df60779f581cbc0
SHA256db8975711e14780aedbe99e165182c1a75b4280fbc789c6c4eb0fd49507c8bb1
SHA512aea70c0e64dbefb0ba854b3bc2832123e7d63a9f3d303d1161d9c3875657379afb4f795c961a365e9e6b64bc45aab10fd11c88b27fcd7b8556e1760cc94bdbfc
-
Filesize
213KB
MD5d1665d820d26bc7ec28d59bd8f76d3ad
SHA1df7a7462d4d720d7e3ec99f75df60779f581cbc0
SHA256db8975711e14780aedbe99e165182c1a75b4280fbc789c6c4eb0fd49507c8bb1
SHA512aea70c0e64dbefb0ba854b3bc2832123e7d63a9f3d303d1161d9c3875657379afb4f795c961a365e9e6b64bc45aab10fd11c88b27fcd7b8556e1760cc94bdbfc
-
Filesize
174KB
MD57e09f77b587b7f7b80ad1d5da62cd6d5
SHA1791cda8bd90d131860d525ec6bf38d55a4054684
SHA256c2d8a63ef0b8bee96ff007c685827ce4d2fb55a06adaf04d98cefce4442d35d2
SHA512fe883680a953619d52c29b86e653f652f855af320e1cc7e8f6445011be7ca84a3f2435aa4d8e6b4ef52671d36db9efac22c51bfaaff489603636b46bce93a488
-
Filesize
174KB
MD57e09f77b587b7f7b80ad1d5da62cd6d5
SHA1791cda8bd90d131860d525ec6bf38d55a4054684
SHA256c2d8a63ef0b8bee96ff007c685827ce4d2fb55a06adaf04d98cefce4442d35d2
SHA512fe883680a953619d52c29b86e653f652f855af320e1cc7e8f6445011be7ca84a3f2435aa4d8e6b4ef52671d36db9efac22c51bfaaff489603636b46bce93a488