Analysis
-
max time kernel
157s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe
Resource
win10v2004-20230915-en
General
-
Target
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe
-
Size
930KB
-
MD5
8e45781a495c31858ee36eaa7756da0f
-
SHA1
7db5ec48ac923aea0781241dd8c8c6deedf8291a
-
SHA256
0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106
-
SHA512
68230ef47598fc6186a5083c72064f5c2a1fcf6c5005d5bd8142223f5c23fa9d5539a297da8f06ec3ab571a66e89415013266ed063dd3bb8dfad345dce9d658d
-
SSDEEP
24576:oiuBtZRIXaM6NUeI1p/VXksfsF1wR3XFo:fuBfRIKhUeIL/RkOsF1wR3C
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4896-26-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3648 x2165888.exe 776 x4042046.exe 5108 g4491373.exe 2164 i6164498.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4042046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2165888.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3044 set thread context of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 5108 set thread context of 4896 5108 g4491373.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4896 AppLaunch.exe 4896 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4896 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 3044 wrote to memory of 2704 3044 0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe 87 PID 2704 wrote to memory of 3648 2704 AppLaunch.exe 89 PID 2704 wrote to memory of 3648 2704 AppLaunch.exe 89 PID 2704 wrote to memory of 3648 2704 AppLaunch.exe 89 PID 3648 wrote to memory of 776 3648 x2165888.exe 93 PID 3648 wrote to memory of 776 3648 x2165888.exe 93 PID 3648 wrote to memory of 776 3648 x2165888.exe 93 PID 776 wrote to memory of 5108 776 x4042046.exe 94 PID 776 wrote to memory of 5108 776 x4042046.exe 94 PID 776 wrote to memory of 5108 776 x4042046.exe 94 PID 5108 wrote to memory of 5104 5108 g4491373.exe 96 PID 5108 wrote to memory of 5104 5108 g4491373.exe 96 PID 5108 wrote to memory of 5104 5108 g4491373.exe 96 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 5108 wrote to memory of 4896 5108 g4491373.exe 97 PID 776 wrote to memory of 2164 776 x4042046.exe 98 PID 776 wrote to memory of 2164 776 x4042046.exe 98 PID 776 wrote to memory of 2164 776 x4042046.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe"C:\Users\Admin\AppData\Local\Temp\0a973a7562ae29b1d139982a51f23b68670764fd92a29cb131ef0aa10f19d106.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2165888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2165888.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4042046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4042046.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4491373.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4491373.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6164498.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6164498.exe5⤵
- Executes dropped EXE
PID:2164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD516492699e2e2f82596baf425b2483f9c
SHA19144aa448a5e38468cde19ec9f6fb14c8a765734
SHA25644c39e0e75d124f07a51717310bcdf8617c2ffdfde587b0e20ad7f911f025cda
SHA512c1fb50d3bd06a60bcd4f0c7f5c3d41f0c21dcbfecb6d0599222fadfb47ad47e083876fa0efca027470c387d6f099c9e87c786ef605a0934a66c1f477f2204bc0
-
Filesize
472KB
MD516492699e2e2f82596baf425b2483f9c
SHA19144aa448a5e38468cde19ec9f6fb14c8a765734
SHA25644c39e0e75d124f07a51717310bcdf8617c2ffdfde587b0e20ad7f911f025cda
SHA512c1fb50d3bd06a60bcd4f0c7f5c3d41f0c21dcbfecb6d0599222fadfb47ad47e083876fa0efca027470c387d6f099c9e87c786ef605a0934a66c1f477f2204bc0
-
Filesize
306KB
MD537b202ab4cd74a5819cc5c669c49d3ec
SHA17d2d66d69cec52f0ef9b11e9de1c712970505f7c
SHA256beb1dadeec16ab3d79410a5d3691391b95357040770b24386dc30786fef52953
SHA5124c8091002ef561f4e07b5c35eead9a666439bd675acda68fde56c2e75141a3dbafc67f3f732096fb29bea967219417526b379d3d01b558438c0173baf02a523f
-
Filesize
306KB
MD537b202ab4cd74a5819cc5c669c49d3ec
SHA17d2d66d69cec52f0ef9b11e9de1c712970505f7c
SHA256beb1dadeec16ab3d79410a5d3691391b95357040770b24386dc30786fef52953
SHA5124c8091002ef561f4e07b5c35eead9a666439bd675acda68fde56c2e75141a3dbafc67f3f732096fb29bea967219417526b379d3d01b558438c0173baf02a523f
-
Filesize
213KB
MD5d463db7a8d451e70961a5b93a0629e0b
SHA18e5c32077faf87e750b3bbfbaa51869d2418be05
SHA256fade796f4ca83ce2bd9e22e7ca73a08618280aa65580ef726b46ecf175554f09
SHA51200915c145d58bb57f8c01ac362c9666e1415b919f919b1b8cb8f21a8c464ae5b7f6bc920cb842fa8af5be80ee56651bb0aba6438af094c64994135b1b7ab46ee
-
Filesize
213KB
MD5d463db7a8d451e70961a5b93a0629e0b
SHA18e5c32077faf87e750b3bbfbaa51869d2418be05
SHA256fade796f4ca83ce2bd9e22e7ca73a08618280aa65580ef726b46ecf175554f09
SHA51200915c145d58bb57f8c01ac362c9666e1415b919f919b1b8cb8f21a8c464ae5b7f6bc920cb842fa8af5be80ee56651bb0aba6438af094c64994135b1b7ab46ee
-
Filesize
174KB
MD56552ea4c6ae4aa85da043aec3cb5de02
SHA155aaa012196d5cdee4830a2b9246f47bf9c31eef
SHA25618626cc630807b5338e00f34c9db745cca986017361d238d247f46b541607cdb
SHA512fdaa5a22987a2b3155d0038733b84179f32bda40d223e46f79a99d3a4f2ab39fe0474fafe9fd516601247e88afedaca5842008be7e2c9c0a0bf558812a62231e
-
Filesize
174KB
MD56552ea4c6ae4aa85da043aec3cb5de02
SHA155aaa012196d5cdee4830a2b9246f47bf9c31eef
SHA25618626cc630807b5338e00f34c9db745cca986017361d238d247f46b541607cdb
SHA512fdaa5a22987a2b3155d0038733b84179f32bda40d223e46f79a99d3a4f2ab39fe0474fafe9fd516601247e88afedaca5842008be7e2c9c0a0bf558812a62231e