Overview
overview
10Static
static
330b55fc29e...75.exe
windows10-2004-x64
104f6b8faa68...86.exe
windows10-2004-x64
1068c37c8307...6a.exe
windows10-2004-x64
10699bfc597d...1d.exe
windows10-2004-x64
10844b5b7693...ab.exe
windows10-2004-x64
1086a6beb680...62.exe
windows10-2004-x64
109cf3d2bf3c...cb.exe
windows10-2004-x64
10ca9f078739...a4.exe
windows10-2004-x64
10d0ab8687e3...e2.exe
windows10-2004-x64
10fb468a211d...c3.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
30b55fc29eb4d6ba84b1f82bbfa69faa222f2bc6d243a759a624fbb454475275.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
4f6b8faa6814b26627c6c8eac0bc9c5237229efaec31a93ac5634db12970f986.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
68c37c83076969c58d0363958646c7804b3b22fd50f04aa720bc28b07793816a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
699bfc597d56fb4ed7153a5a4fe2851361b9e27b9b8c3109277f0c5a54afbe1d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
844b5b76938e178a82f8c18d5600f389ee4da147c66b379dbc5cb8587d11e5ab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
86a6beb6802f9ec2aa387143ba41461fb82783226223ba68b44e49b21c8d3d62.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
9cf3d2bf3c4df3cc22948e45de303aec0f5ffce78a74c453774be0f6f060f6cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
ca9f07873920ecd0518ecf148ae1351a8ecb3ce1fe033aa44b45de07f87202a4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
fb468a211d9a74c5355215200cc2031ec364c8d8a99456c4a189cfea35cb72c3.exe
Resource
win10v2004-20240426-en
General
-
Target
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe
-
Size
390KB
-
MD5
7f2c00bbadc73ad53e903c94a20db4e5
-
SHA1
9270d43f9bebdd6380fac9c6d6340fee4b28aaa6
-
SHA256
d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2
-
SHA512
71d813c1dc82e4fbd9a62e8eb425b3094daa39cf4787a7df7223c2b4e767706a362144682753bf5e00ea3d9aa50ecd1c3e079ae7f9baf7d90477e557b3c098e3
-
SSDEEP
6144:K/y+bnr+ep0yN90QEOcfek0pdG7xF25AE3ABmsEQX0mHhWjdbrfm5:FMrOy909eYxFKAEwBDjBWjJrfm5
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral9/files/0x000700000002342c-25.dat healer behavioral9/memory/4312-27-0x0000000000E10000-0x0000000000E1A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4419793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4419793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4419793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4419793.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h4419793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4419793.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral9/files/0x0007000000023429-30.dat family_redline behavioral9/memory/396-32-0x0000000000D00000-0x0000000000D30000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation danke.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation g0416455.exe -
Executes dropped EXE 8 IoCs
pid Process 2900 x8304226.exe 4532 g0416455.exe 3016 danke.exe 4312 h4419793.exe 396 j6147775.exe 4512 danke.exe 4920 danke.exe 1668 danke.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h4419793.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8304226.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1992 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4312 h4419793.exe 4312 h4419793.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4312 h4419793.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3800 wrote to memory of 2900 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 83 PID 3800 wrote to memory of 2900 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 83 PID 3800 wrote to memory of 2900 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 83 PID 2900 wrote to memory of 4532 2900 x8304226.exe 84 PID 2900 wrote to memory of 4532 2900 x8304226.exe 84 PID 2900 wrote to memory of 4532 2900 x8304226.exe 84 PID 4532 wrote to memory of 3016 4532 g0416455.exe 86 PID 4532 wrote to memory of 3016 4532 g0416455.exe 86 PID 4532 wrote to memory of 3016 4532 g0416455.exe 86 PID 2900 wrote to memory of 4312 2900 x8304226.exe 87 PID 2900 wrote to memory of 4312 2900 x8304226.exe 87 PID 3016 wrote to memory of 2944 3016 danke.exe 88 PID 3016 wrote to memory of 2944 3016 danke.exe 88 PID 3016 wrote to memory of 2944 3016 danke.exe 88 PID 3016 wrote to memory of 4500 3016 danke.exe 90 PID 3016 wrote to memory of 4500 3016 danke.exe 90 PID 3016 wrote to memory of 4500 3016 danke.exe 90 PID 4500 wrote to memory of 3032 4500 cmd.exe 92 PID 4500 wrote to memory of 3032 4500 cmd.exe 92 PID 4500 wrote to memory of 3032 4500 cmd.exe 92 PID 4500 wrote to memory of 3640 4500 cmd.exe 93 PID 4500 wrote to memory of 3640 4500 cmd.exe 93 PID 4500 wrote to memory of 3640 4500 cmd.exe 93 PID 4500 wrote to memory of 728 4500 cmd.exe 94 PID 4500 wrote to memory of 728 4500 cmd.exe 94 PID 4500 wrote to memory of 728 4500 cmd.exe 94 PID 4500 wrote to memory of 3500 4500 cmd.exe 95 PID 4500 wrote to memory of 3500 4500 cmd.exe 95 PID 4500 wrote to memory of 3500 4500 cmd.exe 95 PID 4500 wrote to memory of 4728 4500 cmd.exe 96 PID 4500 wrote to memory of 4728 4500 cmd.exe 96 PID 4500 wrote to memory of 4728 4500 cmd.exe 96 PID 4500 wrote to memory of 4268 4500 cmd.exe 97 PID 4500 wrote to memory of 4268 4500 cmd.exe 97 PID 4500 wrote to memory of 4268 4500 cmd.exe 97 PID 3800 wrote to memory of 396 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 106 PID 3800 wrote to memory of 396 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 106 PID 3800 wrote to memory of 396 3800 d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe"C:\Users\Admin\AppData\Local\Temp\d0ab8687e34a8f0343980bddd26689960bc998ce3537a995751d70b47f6b24e2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8304226.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8304226.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0416455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0416455.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:4728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:4268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4419793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4419793.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j6147775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j6147775.exe2⤵
- Executes dropped EXE
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4512
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4920
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5b7f729379a37c0f7f5dfb7a17f1bcb1c
SHA1c3df08c950d0d9d8fffa8d2f25216f8b74fc9f36
SHA256e7fe2de161d98a92f13385743abb9a5a37e7d27ae238adbefa07fc859035b2af
SHA512753bf2a61bffad0d69999996f08353942b9814abf9a8d676649c925f4a49b2b0bfd71df45098837ed2c19468b7f1b7c142137b9d4887faaca3d913b5d35dc056
-
Filesize
234KB
MD587aedfc560c9bd0c8573f0c5459e0c03
SHA194ecaa60536bf743c72ad3d463e24414a82b0b07
SHA256d8a30b3f0111c04c370ebe3791b3edce9716e90df42e4056c327377a4410fb09
SHA5127a4842a87e18f6589d1052e7435322ec6b31af5f82d97d1ffbf18a440d266d540eec6014634907afd4c455afbdc615e3b0835406681657fe8c0ba81331956d2e
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91