Overview
overview
10Static
static
330b55fc29e...75.exe
windows10-2004-x64
104f6b8faa68...86.exe
windows10-2004-x64
1068c37c8307...6a.exe
windows10-2004-x64
10699bfc597d...1d.exe
windows10-2004-x64
10844b5b7693...ab.exe
windows10-2004-x64
1086a6beb680...62.exe
windows10-2004-x64
109cf3d2bf3c...cb.exe
windows10-2004-x64
10ca9f078739...a4.exe
windows10-2004-x64
10d0ab8687e3...e2.exe
windows10-2004-x64
10fb468a211d...c3.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
4f6b8faa6814b26627c6c8eac0bc9c5237229efaec31a93ac5634db12970f986.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
699bfc597d56fb4ed7153a5a4fe2851361b9e27b9b8c3109277f0c5a54afbe1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
86a6beb6802f9ec2aa387143ba41461fb82783226223ba68b44e49b21c8d3d62.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
9cf3d2bf3c4df3cc22948e45de303aec0f5ffce78a74c453774be0f6f060f6cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
ca9f07873920ecd0518ecf148ae1351a8ecb3ce1fe033aa44b45de07f87202a4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe
Resource
win10v2004-20240426-en
General
-
Target
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe
-
Size
390KB
-
MD5
7f7259536faba88247841cf1adf8332b
-
SHA1
d5dead80e018787370e99753e2af59c8ed7fa887
-
SHA256
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3
-
SHA512
072a4a03f0d623445fe20d401adc93cdd27425d508e6f8922efa48d5b05f82b645fb8031a04795c31bb5e1d49e672418a3bcf6a392deefe550501593134b1cac
-
SSDEEP
12288:nMrUy90VMtGfE/7XH8MxeCVcEEKzVy6a3mB:DyTtGszXHLbmEEqVy6r
Malware Config
Extracted
amadey
3.86
http://5.42.92.67
-
install_dir
ebb444342c
-
install_file
legola.exe
-
strings_key
5680b049188ecacbfa57b1b29c2f35a7
-
url_paths
/norm/index.php
Extracted
redline
lande
77.91.124.84:19071
-
auth_value
9fa41701c47df37786234f3373f21208
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral10/files/0x000800000002343d-12.dat healer behavioral10/memory/4984-14-0x0000000000630000-0x000000000063A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8772823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8772823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8772823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8772823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8772823.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8772823.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x000700000002343b-31.dat family_redline behavioral10/memory/1736-33-0x0000000000240000-0x0000000000270000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation r2173793.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation legola.exe -
Executes dropped EXE 8 IoCs
pid Process 4004 z1535374.exe 4984 p8772823.exe 4388 r2173793.exe 8 legola.exe 1736 t1762830.exe 4904 legola.exe 1668 legola.exe 4784 legola.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8772823.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1535374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 p8772823.exe 4984 p8772823.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4984 p8772823.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4004 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 85 PID 4500 wrote to memory of 4004 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 85 PID 4500 wrote to memory of 4004 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 85 PID 4004 wrote to memory of 4984 4004 z1535374.exe 86 PID 4004 wrote to memory of 4984 4004 z1535374.exe 86 PID 4004 wrote to memory of 4388 4004 z1535374.exe 98 PID 4004 wrote to memory of 4388 4004 z1535374.exe 98 PID 4004 wrote to memory of 4388 4004 z1535374.exe 98 PID 4388 wrote to memory of 8 4388 r2173793.exe 99 PID 4388 wrote to memory of 8 4388 r2173793.exe 99 PID 4388 wrote to memory of 8 4388 r2173793.exe 99 PID 4500 wrote to memory of 1736 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 100 PID 4500 wrote to memory of 1736 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 100 PID 4500 wrote to memory of 1736 4500 fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe 100 PID 8 wrote to memory of 3040 8 legola.exe 101 PID 8 wrote to memory of 3040 8 legola.exe 101 PID 8 wrote to memory of 3040 8 legola.exe 101 PID 8 wrote to memory of 4060 8 legola.exe 103 PID 8 wrote to memory of 4060 8 legola.exe 103 PID 8 wrote to memory of 4060 8 legola.exe 103 PID 4060 wrote to memory of 3608 4060 cmd.exe 105 PID 4060 wrote to memory of 3608 4060 cmd.exe 105 PID 4060 wrote to memory of 3608 4060 cmd.exe 105 PID 4060 wrote to memory of 2208 4060 cmd.exe 106 PID 4060 wrote to memory of 2208 4060 cmd.exe 106 PID 4060 wrote to memory of 2208 4060 cmd.exe 106 PID 4060 wrote to memory of 4288 4060 cmd.exe 107 PID 4060 wrote to memory of 4288 4060 cmd.exe 107 PID 4060 wrote to memory of 4288 4060 cmd.exe 107 PID 4060 wrote to memory of 4344 4060 cmd.exe 108 PID 4060 wrote to memory of 4344 4060 cmd.exe 108 PID 4060 wrote to memory of 4344 4060 cmd.exe 108 PID 4060 wrote to memory of 4588 4060 cmd.exe 109 PID 4060 wrote to memory of 4588 4060 cmd.exe 109 PID 4060 wrote to memory of 4588 4060 cmd.exe 109 PID 4060 wrote to memory of 1604 4060 cmd.exe 110 PID 4060 wrote to memory of 1604 4060 cmd.exe 110 PID 4060 wrote to memory of 1604 4060 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe"C:\Users\Admin\AppData\Local\Temp\fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1535374.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1535374.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8772823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8772823.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2173793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2173793.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F5⤵
- Creates scheduled task(s)
PID:3040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"6⤵PID:2208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E6⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"6⤵PID:4588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E6⤵PID:1604
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1762830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1762830.exe2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4904
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:1668
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD575d519bc71b0df0a05230e5286d83eed
SHA1aa159aec36da401a6d5642ee0062dc66b589d7c9
SHA256c807bc1d72e78993834caa44014201fd6a452584796e1f235ddfa06d323f922b
SHA51240caf2d52f749db43ace3f1096621bc75addb5d72a55d9e7679232a232afe37e10c761784d170e6e5bfa7bc3266ffc467ef73fb9829da3d96a89a14d8b623e10
-
Filesize
234KB
MD51d3d74bce4cb86fe40dbdc82ec30e7b4
SHA12c9a7d4a707653cfb7b9a95bf16b945c6fae5b7e
SHA2567b36cf0c753c77b6a720fad0d6f89fb4bbef21ac4112d3be789cca1fa7ef90f7
SHA51213b007ba56e851b3754e8d218c0e13b1d40fa67ebcb40506a2fc7c54e2375f05064a49a68ad0592c3a0c02cafc3c9f9334119e8c323de71979d428540df25288
-
Filesize
12KB
MD5f05cae077054672e94dd380d619747bc
SHA17c7b8e4faff43907150a64b9a95780ba86e7e00a
SHA256f10f71cb8281e6bfd5bcfb5cf0fc2db40bab75ee542f842fa1934907b1d9c5f5
SHA5121441725f868c5d41b441854eb768671ac4f3c6acf0c8c77b13c9b69db707bbdd4f6dc45c8f87881029379d0d91ce89bd97261a1a3252ccd546d43566bd3e7256
-
Filesize
224KB
MD5f0ea5fc3ee2d81c71088845831d67224
SHA1d8ebaf6aeb50bbf7c71039fe97e8f2174890a15f
SHA25632085e88d7f4690ec7e037931fb7edc354a7ae65b13ea4f48fcd5698b4ac98a3
SHA51280c784633aebc411fc025379b2b15f5af7bad08ce8f6fb0e46879f58da9cea0a7520368fbbfcc227ecf35130a72eb41dba0941a75718c14e2eaf680a255008fd