Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 10:57
Static task
static1
Behavioral task
behavioral1
Sample
f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe
Resource
win10v2004-20230915-en
General
-
Target
f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe
-
Size
1014KB
-
MD5
e793f4d5680695ad632ef1414bbaefbe
-
SHA1
83dbfdf3a82c810eda811e7107a656ffff138eae
-
SHA256
f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f
-
SHA512
8c6bb9ce3c4dec52cd9d46ef51f63f2c5a5ce3d11649b01b967c05c98056c1ab05a05348dc988a8f64bd8731dc6ec0565e353421ecc96b6bc427b79e963858ed
-
SSDEEP
24576:xWrkfGnbsNujqFLYdDMaZYyMKI7GT0YMOBuZK0Hvsxky8ZHJwgYg:ukubsNujCYtKxSn1uZKKIOsg
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1752-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5064 x4331605.exe 4016 x6123848.exe 4396 g9408456.exe 708 i7556869.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4331605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6123848.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1676 set thread context of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 4396 set thread context of 1752 4396 g9408456.exe 100 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1752 AppLaunch.exe 1752 AppLaunch.exe 1752 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4912 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 94 PID 1676 wrote to memory of 4912 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 94 PID 1676 wrote to memory of 4912 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 94 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 1676 wrote to memory of 3564 1676 f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe 95 PID 3564 wrote to memory of 5064 3564 AppLaunch.exe 96 PID 3564 wrote to memory of 5064 3564 AppLaunch.exe 96 PID 3564 wrote to memory of 5064 3564 AppLaunch.exe 96 PID 5064 wrote to memory of 4016 5064 x4331605.exe 97 PID 5064 wrote to memory of 4016 5064 x4331605.exe 97 PID 5064 wrote to memory of 4016 5064 x4331605.exe 97 PID 4016 wrote to memory of 4396 4016 x6123848.exe 98 PID 4016 wrote to memory of 4396 4016 x6123848.exe 98 PID 4016 wrote to memory of 4396 4016 x6123848.exe 98 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4396 wrote to memory of 1752 4396 g9408456.exe 100 PID 4016 wrote to memory of 708 4016 x6123848.exe 101 PID 4016 wrote to memory of 708 4016 x6123848.exe 101 PID 4016 wrote to memory of 708 4016 x6123848.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe"C:\Users\Admin\AppData\Local\Temp\f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exe5⤵
- Executes dropped EXE
PID:708
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492KB
MD576c2de60bcabc7238be358e32978bd91
SHA1532c252a86644f961d62850ba7be99f89ef3a1ae
SHA256207bd2f85a0071eb0cec560c2ff10d0b7a185092036397b9f60aa012007c7134
SHA5122e88061a64c796398c77e5c5709366d546168d94587e6601c1a78f0cd9a71d3b3f451a394ace3184dcd26e89a90b4fcad8b10ee688e9672468e9b7b86375e8a5
-
Filesize
492KB
MD576c2de60bcabc7238be358e32978bd91
SHA1532c252a86644f961d62850ba7be99f89ef3a1ae
SHA256207bd2f85a0071eb0cec560c2ff10d0b7a185092036397b9f60aa012007c7134
SHA5122e88061a64c796398c77e5c5709366d546168d94587e6601c1a78f0cd9a71d3b3f451a394ace3184dcd26e89a90b4fcad8b10ee688e9672468e9b7b86375e8a5
-
Filesize
326KB
MD5499cebd63eed8be77f4c45c3c47fdc0b
SHA1c17c2ddc12a9fc32629ba00e5e54112e6d9c79dc
SHA2569354f0098fa532b5dc4607f34cd637217b3e406c5d2bc6671a46c822b036df53
SHA512e26d6de1bfd8e0952eadd57a49adf7b7fa2ddb467967e8bcdcd179ea09cccf83ca49c15d8dbd9442aa9fdb2d65792c7b89c4d79329ad39c2fbcebdbe9c9cd9b3
-
Filesize
326KB
MD5499cebd63eed8be77f4c45c3c47fdc0b
SHA1c17c2ddc12a9fc32629ba00e5e54112e6d9c79dc
SHA2569354f0098fa532b5dc4607f34cd637217b3e406c5d2bc6671a46c822b036df53
SHA512e26d6de1bfd8e0952eadd57a49adf7b7fa2ddb467967e8bcdcd179ea09cccf83ca49c15d8dbd9442aa9fdb2d65792c7b89c4d79329ad39c2fbcebdbe9c9cd9b3
-
Filesize
257KB
MD55edcce7cdb4a7c05202f9583536899fd
SHA1fa9e33ac62524397230f9d3785843e4fbbfc7bf6
SHA256de9efe7ce1e75a998f0503373e8fc9b7ffd4d06d62175e7f790cf6da1825dafa
SHA5128cc91653f53f319efb722bd892306229accec2aa6f5c8238d85f44999bf3ab4abfecfbf6dc2cc9b640b70ce1e02c183ebe2329a5d61ff7621352d6b0fdb0e096
-
Filesize
257KB
MD55edcce7cdb4a7c05202f9583536899fd
SHA1fa9e33ac62524397230f9d3785843e4fbbfc7bf6
SHA256de9efe7ce1e75a998f0503373e8fc9b7ffd4d06d62175e7f790cf6da1825dafa
SHA5128cc91653f53f319efb722bd892306229accec2aa6f5c8238d85f44999bf3ab4abfecfbf6dc2cc9b640b70ce1e02c183ebe2329a5d61ff7621352d6b0fdb0e096
-
Filesize
174KB
MD56a8be65b4cb171cf4fee6e1726d1a76e
SHA171bb6982bc9eb00e9edb549fe07998195b98f0cb
SHA256bfc6ca76c14a107407de979141630f2fa9a4ccabea53624383ba3dc1a7d543ad
SHA512eeb3e03c0a9a5ecda04f845058c3a9a608f49f5b570903691017192b91edb51be92ea88a5c6f55d64345b1f56f2583deccd3e931eb1352e2127a3f9282cb370a
-
Filesize
174KB
MD56a8be65b4cb171cf4fee6e1726d1a76e
SHA171bb6982bc9eb00e9edb549fe07998195b98f0cb
SHA256bfc6ca76c14a107407de979141630f2fa9a4ccabea53624383ba3dc1a7d543ad
SHA512eeb3e03c0a9a5ecda04f845058c3a9a608f49f5b570903691017192b91edb51be92ea88a5c6f55d64345b1f56f2583deccd3e931eb1352e2127a3f9282cb370a