Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 04:11
Static task
static1
Behavioral task
behavioral1
Sample
d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe
Resource
win10v2004-20230915-en
General
-
Target
d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe
-
Size
930KB
-
MD5
4697b533d9be35351f1742bb0fa26f94
-
SHA1
06fcdb6fd8172cbcbd27ebb340905d989630475b
-
SHA256
d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b
-
SHA512
93ed2e98d76da352f8c83a1142c11bbcf3ebcf79e38d140fbae14fc1c4a719d8b39bd9fa732de02f09a1273bc9782e9a710c7b40a3f1356acaf411cf8e05a459
-
SSDEEP
12288:gl//yfYb5BIQZVtvffdXWOW1kyOqJ6xM1FKGv4YVnGGwfZhi7p6gA2ni5BVObHWM:YiuBtZvfdGOUkM1fnwG6gAzV+HWi7
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2548-51-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2548-52-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2548-54-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2548-58-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2548-64-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2628 x8986038.exe 2284 x4227195.exe 1780 g8567274.exe 2984 i2819572.exe -
Loads dropped DLL 8 IoCs
pid Process 1760 AppLaunch.exe 2628 x8986038.exe 2628 x8986038.exe 2284 x4227195.exe 2284 x4227195.exe 1780 g8567274.exe 2284 x4227195.exe 2984 i2819572.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4227195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8986038.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2176 set thread context of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 1780 set thread context of 2548 1780 g8567274.exe 34 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2548 AppLaunch.exe 2548 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 AppLaunch.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 2176 wrote to memory of 1760 2176 d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe 29 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 1760 wrote to memory of 2628 1760 AppLaunch.exe 30 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2628 wrote to memory of 2284 2628 x8986038.exe 31 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 2284 wrote to memory of 1780 2284 x4227195.exe 32 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 1780 wrote to memory of 2548 1780 g8567274.exe 34 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35 PID 2284 wrote to memory of 2984 2284 x4227195.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe"C:\Users\Admin\AppData\Local\Temp\d11b917059b1e85e6e816885c654c6bd9a2a878d05a3ba821bf3bc45baef410b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8986038.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8986038.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4227195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4227195.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8567274.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8567274.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2819572.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2819572.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD5c63b754b021f22d2e31e9faeda754ee6
SHA1717142e6abf80c3a400b3304ab0b4a119c8aea09
SHA25637ae7b44b381ca9b619301be2f491829b5140020ee02f0075e9533386aa036f4
SHA5124581ee6a1800b863bfe8fb88854a5d7615267727945b98ab2aff8b70f568c87c242c9ecd1ca9c2c3004b76ace70cf8076f97776401625fcb3dac9356ae6c18ae
-
Filesize
472KB
MD5c63b754b021f22d2e31e9faeda754ee6
SHA1717142e6abf80c3a400b3304ab0b4a119c8aea09
SHA25637ae7b44b381ca9b619301be2f491829b5140020ee02f0075e9533386aa036f4
SHA5124581ee6a1800b863bfe8fb88854a5d7615267727945b98ab2aff8b70f568c87c242c9ecd1ca9c2c3004b76ace70cf8076f97776401625fcb3dac9356ae6c18ae
-
Filesize
306KB
MD5330953ffd7553b1712ba37236d24f750
SHA1e0db633aadbdf6b9f8ba4412ebe65e248252024e
SHA256196186b3852e4a011933f5e8a9a135e3ab5f771ee17faa9b71efde03927da920
SHA5128603f932653a9e47a68a5d8b6ca791c47830f38757565869da01c790038493cf5c61336883f1d300a1e9a247e9eff25c83ffbc3fc36bb14e51f56655c20e526d
-
Filesize
306KB
MD5330953ffd7553b1712ba37236d24f750
SHA1e0db633aadbdf6b9f8ba4412ebe65e248252024e
SHA256196186b3852e4a011933f5e8a9a135e3ab5f771ee17faa9b71efde03927da920
SHA5128603f932653a9e47a68a5d8b6ca791c47830f38757565869da01c790038493cf5c61336883f1d300a1e9a247e9eff25c83ffbc3fc36bb14e51f56655c20e526d
-
Filesize
213KB
MD5b182ca08df3f72499e2b777fdbafd2dc
SHA119751860ed7b8630ec0f0bb9e81957789e5e3dec
SHA256dc921ad418c5ddfe2c0234204d26d60b1e73f0a8af20a2557b6f4671bd40710f
SHA512e9163b36c8a7c0f3a6afa865109c240a1d9eeb39be6b0d0bd83d62aa76b4e230c659f7715c42e1f91bf307b8808724776230716117546342192ea390f2f138df
-
Filesize
213KB
MD5b182ca08df3f72499e2b777fdbafd2dc
SHA119751860ed7b8630ec0f0bb9e81957789e5e3dec
SHA256dc921ad418c5ddfe2c0234204d26d60b1e73f0a8af20a2557b6f4671bd40710f
SHA512e9163b36c8a7c0f3a6afa865109c240a1d9eeb39be6b0d0bd83d62aa76b4e230c659f7715c42e1f91bf307b8808724776230716117546342192ea390f2f138df
-
Filesize
174KB
MD5d4ade93f5eaeff5109ca2c4303b9f723
SHA1827ae8a647bd59c9c449cef78fdd0342fbd1edfe
SHA256a05be92e051850d8a89a36d39857249efd5b73c9030d5188f4707f901b1da3f6
SHA51273bbb687850ccde0220d69e30072f8e7a8ffb1c37a6fec4e714bdf5e94b25941722717eec3af8038ee4115ba0ce889ee791fcc728708c612b102a9a4d4e4fc38
-
Filesize
174KB
MD5d4ade93f5eaeff5109ca2c4303b9f723
SHA1827ae8a647bd59c9c449cef78fdd0342fbd1edfe
SHA256a05be92e051850d8a89a36d39857249efd5b73c9030d5188f4707f901b1da3f6
SHA51273bbb687850ccde0220d69e30072f8e7a8ffb1c37a6fec4e714bdf5e94b25941722717eec3af8038ee4115ba0ce889ee791fcc728708c612b102a9a4d4e4fc38
-
Filesize
472KB
MD5c63b754b021f22d2e31e9faeda754ee6
SHA1717142e6abf80c3a400b3304ab0b4a119c8aea09
SHA25637ae7b44b381ca9b619301be2f491829b5140020ee02f0075e9533386aa036f4
SHA5124581ee6a1800b863bfe8fb88854a5d7615267727945b98ab2aff8b70f568c87c242c9ecd1ca9c2c3004b76ace70cf8076f97776401625fcb3dac9356ae6c18ae
-
Filesize
472KB
MD5c63b754b021f22d2e31e9faeda754ee6
SHA1717142e6abf80c3a400b3304ab0b4a119c8aea09
SHA25637ae7b44b381ca9b619301be2f491829b5140020ee02f0075e9533386aa036f4
SHA5124581ee6a1800b863bfe8fb88854a5d7615267727945b98ab2aff8b70f568c87c242c9ecd1ca9c2c3004b76ace70cf8076f97776401625fcb3dac9356ae6c18ae
-
Filesize
306KB
MD5330953ffd7553b1712ba37236d24f750
SHA1e0db633aadbdf6b9f8ba4412ebe65e248252024e
SHA256196186b3852e4a011933f5e8a9a135e3ab5f771ee17faa9b71efde03927da920
SHA5128603f932653a9e47a68a5d8b6ca791c47830f38757565869da01c790038493cf5c61336883f1d300a1e9a247e9eff25c83ffbc3fc36bb14e51f56655c20e526d
-
Filesize
306KB
MD5330953ffd7553b1712ba37236d24f750
SHA1e0db633aadbdf6b9f8ba4412ebe65e248252024e
SHA256196186b3852e4a011933f5e8a9a135e3ab5f771ee17faa9b71efde03927da920
SHA5128603f932653a9e47a68a5d8b6ca791c47830f38757565869da01c790038493cf5c61336883f1d300a1e9a247e9eff25c83ffbc3fc36bb14e51f56655c20e526d
-
Filesize
213KB
MD5b182ca08df3f72499e2b777fdbafd2dc
SHA119751860ed7b8630ec0f0bb9e81957789e5e3dec
SHA256dc921ad418c5ddfe2c0234204d26d60b1e73f0a8af20a2557b6f4671bd40710f
SHA512e9163b36c8a7c0f3a6afa865109c240a1d9eeb39be6b0d0bd83d62aa76b4e230c659f7715c42e1f91bf307b8808724776230716117546342192ea390f2f138df
-
Filesize
213KB
MD5b182ca08df3f72499e2b777fdbafd2dc
SHA119751860ed7b8630ec0f0bb9e81957789e5e3dec
SHA256dc921ad418c5ddfe2c0234204d26d60b1e73f0a8af20a2557b6f4671bd40710f
SHA512e9163b36c8a7c0f3a6afa865109c240a1d9eeb39be6b0d0bd83d62aa76b4e230c659f7715c42e1f91bf307b8808724776230716117546342192ea390f2f138df
-
Filesize
174KB
MD5d4ade93f5eaeff5109ca2c4303b9f723
SHA1827ae8a647bd59c9c449cef78fdd0342fbd1edfe
SHA256a05be92e051850d8a89a36d39857249efd5b73c9030d5188f4707f901b1da3f6
SHA51273bbb687850ccde0220d69e30072f8e7a8ffb1c37a6fec4e714bdf5e94b25941722717eec3af8038ee4115ba0ce889ee791fcc728708c612b102a9a4d4e4fc38
-
Filesize
174KB
MD5d4ade93f5eaeff5109ca2c4303b9f723
SHA1827ae8a647bd59c9c449cef78fdd0342fbd1edfe
SHA256a05be92e051850d8a89a36d39857249efd5b73c9030d5188f4707f901b1da3f6
SHA51273bbb687850ccde0220d69e30072f8e7a8ffb1c37a6fec4e714bdf5e94b25941722717eec3af8038ee4115ba0ce889ee791fcc728708c612b102a9a4d4e4fc38