Analysis
-
max time kernel
206s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 03:42
Static task
static1
Behavioral task
behavioral1
Sample
aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe
Resource
win10v2004-20230915-en
General
-
Target
aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe
-
Size
929KB
-
MD5
967bae478b6f71fa77af48c2cd440fd1
-
SHA1
dcc8f4f9bbe28d4dc092f4d75f1e290aec782305
-
SHA256
aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880
-
SHA512
f7d82075423c173c11574d862eac5ff15d0e9cb2974ce3c32290244e4b057205f07f736daa84a8bfd4ddc9540963c2e42b98696d6bdd62b604b03243bc96a0b1
-
SSDEEP
12288:qJ//yfYb5BIQZVtyHnvGZIPLBY2LlG+eaqGb7hV9lnG8fs3K9Q2UOiPT6Kt/F9:uiuBtZcGZIPLphG+eH2b9c8E3Qi7D
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1148-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5036 x3953730.exe 3964 x6730037.exe 2484 g8264898.exe 4092 i4044919.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3953730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6730037.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4192 set thread context of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 2484 set thread context of 1148 2484 g8264898.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 AppLaunch.exe 1148 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 4192 wrote to memory of 2724 4192 aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe 88 PID 2724 wrote to memory of 5036 2724 AppLaunch.exe 89 PID 2724 wrote to memory of 5036 2724 AppLaunch.exe 89 PID 2724 wrote to memory of 5036 2724 AppLaunch.exe 89 PID 5036 wrote to memory of 3964 5036 x3953730.exe 92 PID 5036 wrote to memory of 3964 5036 x3953730.exe 92 PID 5036 wrote to memory of 3964 5036 x3953730.exe 92 PID 3964 wrote to memory of 2484 3964 x6730037.exe 93 PID 3964 wrote to memory of 2484 3964 x6730037.exe 93 PID 3964 wrote to memory of 2484 3964 x6730037.exe 93 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 2484 wrote to memory of 1148 2484 g8264898.exe 95 PID 3964 wrote to memory of 4092 3964 x6730037.exe 97 PID 3964 wrote to memory of 4092 3964 x6730037.exe 97 PID 3964 wrote to memory of 4092 3964 x6730037.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe"C:\Users\Admin\AppData\Local\Temp\aabd5ae087211d2a787688d403cd2cb88455d4dd374daefed2d9de2631885880.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3953730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3953730.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6730037.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6730037.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8264898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8264898.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4044919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4044919.exe5⤵
- Executes dropped EXE
PID:4092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD53f6a3c3611d53ceb7203a87e469ce9e8
SHA15120d55006567309dbe6ac37ab7044524fb84546
SHA25682e2f011bd54da5cb8062152e77d936687b1ee99d747e63eb804818cbeb37787
SHA512571e70edb09efe43f7ac5cfd0a7b42147f14da0be21fb512792e2fa89a74a7710dcfaaafb809ce97bbbca98e167c60b22297924eaf32d274781f3fdfe798c431
-
Filesize
472KB
MD53f6a3c3611d53ceb7203a87e469ce9e8
SHA15120d55006567309dbe6ac37ab7044524fb84546
SHA25682e2f011bd54da5cb8062152e77d936687b1ee99d747e63eb804818cbeb37787
SHA512571e70edb09efe43f7ac5cfd0a7b42147f14da0be21fb512792e2fa89a74a7710dcfaaafb809ce97bbbca98e167c60b22297924eaf32d274781f3fdfe798c431
-
Filesize
306KB
MD5b3b1c741d1a4309c826bcc71f5c819b4
SHA1ab27c794603374fc0b327e1e942fbfea4f9ee537
SHA256d27815def1746142a6c62cbfad679bae0743c2de9544ae0bae89d47c9bf0fc1b
SHA512cd1f59ad3d4b861b477b287bc97e0607d720144088bd5c8c31f5bee39dc1d2649a3a86e6e0728a59991dd0663a1f39faff5222caaca7fe9416870dbe341049d4
-
Filesize
306KB
MD5b3b1c741d1a4309c826bcc71f5c819b4
SHA1ab27c794603374fc0b327e1e942fbfea4f9ee537
SHA256d27815def1746142a6c62cbfad679bae0743c2de9544ae0bae89d47c9bf0fc1b
SHA512cd1f59ad3d4b861b477b287bc97e0607d720144088bd5c8c31f5bee39dc1d2649a3a86e6e0728a59991dd0663a1f39faff5222caaca7fe9416870dbe341049d4
-
Filesize
213KB
MD5fc44bbf4777b03126ab93c2a9d5d4011
SHA13d3783a05f8f6c6792ab1e6a398f39679c127bd2
SHA2561fa5780d9cac113ad08a95b702d9ac3518e73822186819e2de6395b04826692c
SHA5125ae53a3fe60d342d0722bb5cbe14dcbb7e6bb1e449932498cea4fd00667513d568ff55af4bb1f204bf26bf5f72e73318424f1e984460729af4c08c55628b2a27
-
Filesize
213KB
MD5fc44bbf4777b03126ab93c2a9d5d4011
SHA13d3783a05f8f6c6792ab1e6a398f39679c127bd2
SHA2561fa5780d9cac113ad08a95b702d9ac3518e73822186819e2de6395b04826692c
SHA5125ae53a3fe60d342d0722bb5cbe14dcbb7e6bb1e449932498cea4fd00667513d568ff55af4bb1f204bf26bf5f72e73318424f1e984460729af4c08c55628b2a27
-
Filesize
174KB
MD5655012b9205cc9f9de6cb2dec1e9d6ea
SHA1a71243b189da821d2f799dfb3716209210f35dea
SHA2560696e16145fba260db5032cbb53528e62dfa9d666f9719fcc27f92b149f6c062
SHA51284f04982f08bdf9ee28da64acba14986aa07fef1c53a5f1d1ee30cf3cf98c51ceb9a3d50884082f38cc5317c202736b7d97022e4dd8488afa79b96e6f0e2dc5e
-
Filesize
174KB
MD5655012b9205cc9f9de6cb2dec1e9d6ea
SHA1a71243b189da821d2f799dfb3716209210f35dea
SHA2560696e16145fba260db5032cbb53528e62dfa9d666f9719fcc27f92b149f6c062
SHA51284f04982f08bdf9ee28da64acba14986aa07fef1c53a5f1d1ee30cf3cf98c51ceb9a3d50884082f38cc5317c202736b7d97022e4dd8488afa79b96e6f0e2dc5e