Analysis
-
max time kernel
100s -
max time network
187s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/07/2023, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
y2304387.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
y2304387.exe
Resource
win10-20230703-en
General
-
Target
y2304387.exe
-
Size
402KB
-
MD5
f44f6a62eb3dc2e91d9b84dd2ee414e8
-
SHA1
37ecc776dfa73fd79d7ca23c4b9a76a79afa5886
-
SHA256
910cf85ab1ead9267c7d45a7e1ef1d2ff282ac429e426a9654d585fc5ffacfbe
-
SHA512
0282420ef84484b1715a2a81330e0f75cb996ef89db384e27fdfd64c055b1a834192b46423fe28b4939cc077d6ce82c8f1ce19a18e376c02cb96ac59cc395f19
-
SSDEEP
6144:Kny+bnr+5p0yN90QEZ30q+MET3AkTFGwjeprT4PDH9HdTbetaR7VrXq+xVfOLP:9Mr5y9070qbETnoaepH8H9HV617
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3404-129-0x00000000001D0000-0x00000000001DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5177269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5177269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5177269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5177269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5177269.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 3404 k5177269.exe 3212 l6914964.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5177269.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5177269.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y2304387.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2304387.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3404 k5177269.exe 3404 k5177269.exe 3212 l6914964.exe 3212 l6914964.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3404 k5177269.exe Token: SeDebugPrivilege 3212 l6914964.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3404 4436 y2304387.exe 70 PID 4436 wrote to memory of 3404 4436 y2304387.exe 70 PID 4436 wrote to memory of 3404 4436 y2304387.exe 70 PID 4436 wrote to memory of 3212 4436 y2304387.exe 72 PID 4436 wrote to memory of 3212 4436 y2304387.exe 72 PID 4436 wrote to memory of 3212 4436 y2304387.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\y2304387.exe"C:\Users\Admin\AppData\Local\Temp\y2304387.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k5177269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k5177269.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6914964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6914964.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
185KB
MD52290f56f8dd64187e33c3be402e430e0
SHA16fd61710d5fb8a281761de9ba78e062d899b49fa
SHA256f5d0994af44b1d75ed6d0d652528a691a9a95d28c949e1ef64686ad25b8601a6
SHA51231288524f6d82568d3a003a1a8d732474035645dbd40551a41c4dfc8c1396e38a51943945cc1ccc6a1ab9c7ca62fd7d3d2732ffae04eaac222bc1c99e14a1282
-
Filesize
185KB
MD52290f56f8dd64187e33c3be402e430e0
SHA16fd61710d5fb8a281761de9ba78e062d899b49fa
SHA256f5d0994af44b1d75ed6d0d652528a691a9a95d28c949e1ef64686ad25b8601a6
SHA51231288524f6d82568d3a003a1a8d732474035645dbd40551a41c4dfc8c1396e38a51943945cc1ccc6a1ab9c7ca62fd7d3d2732ffae04eaac222bc1c99e14a1282
-
Filesize
1.3MB
MD5610a13dbc8136e246df029939fac0577
SHA1d8faa8cdaa48aa9e86f73b7aa734371b14533344
SHA2562ad9871429f41f0c4d514c392db875ba187799b2537b1cecfd50e5f8c3e378e2
SHA5126db43a3295c60dd0f3218db0ecb9aec4f0825df4232f1539948a7405ea19c84e2c981f85b305ede0b6df7964fa3a39068937940061f79fdafb63b60997d5952a
-
Filesize
1.3MB
MD5610a13dbc8136e246df029939fac0577
SHA1d8faa8cdaa48aa9e86f73b7aa734371b14533344
SHA2562ad9871429f41f0c4d514c392db875ba187799b2537b1cecfd50e5f8c3e378e2
SHA5126db43a3295c60dd0f3218db0ecb9aec4f0825df4232f1539948a7405ea19c84e2c981f85b305ede0b6df7964fa3a39068937940061f79fdafb63b60997d5952a