Analysis
-
max time kernel
129s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
d5f9c0858dfcb190fc6a26b1b5c36c82.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
d5f9c0858dfcb190fc6a26b1b5c36c82.exe
Resource
win10v2004-20230703-en
General
-
Target
d5f9c0858dfcb190fc6a26b1b5c36c82.exe
-
Size
529KB
-
MD5
d5f9c0858dfcb190fc6a26b1b5c36c82
-
SHA1
849b17af4883a072de31d9b9f163e7976bd15c91
-
SHA256
71bab99ff11e56a35ef3a95123b14f96822594d625ea6508e36c1a774a6878f4
-
SHA512
bbfe21836255414d953ef2d4972da64844d8126b1421f45f5301b5e479d14dba546234654f4f17032ee76fd956d44a7a1a58a08c07c2de6bc01c25fe9b1feb8f
-
SSDEEP
12288:Y+FGfvMaRdnQgM3faB6H0ZAFj1UpiyQj9PI2b:Y+FcvM82gM3i0UZkhwiyQ9R
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/656-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9537288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9537288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9537288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9537288.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k9537288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9537288.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2320 y9524744.exe 656 k9537288.exe 580 l5574002.exe -
Loads dropped DLL 8 IoCs
pid Process 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 2320 y9524744.exe 2320 y9524744.exe 2320 y9524744.exe 656 k9537288.exe 2320 y9524744.exe 2320 y9524744.exe 580 l5574002.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k9537288.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9537288.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9524744.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9524744.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5f9c0858dfcb190fc6a26b1b5c36c82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5f9c0858dfcb190fc6a26b1b5c36c82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 k9537288.exe 656 k9537288.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 k9537288.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2232 wrote to memory of 2320 2232 d5f9c0858dfcb190fc6a26b1b5c36c82.exe 29 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 656 2320 y9524744.exe 30 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32 PID 2320 wrote to memory of 580 2320 y9524744.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f9c0858dfcb190fc6a26b1b5c36c82.exe"C:\Users\Admin\AppData\Local\Temp\d5f9c0858dfcb190fc6a26b1b5c36c82.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9524744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9524744.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9537288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9537288.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5574002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5574002.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD505391c2b4897c92fcdd89480a1a61ff0
SHA1e02f29e4a91ff3506d12f163685a2c80b5b8e645
SHA25633497c0330d746bc6e38a74ea3b4f63fa33b58a5cb9cb94c947a6b5d25e6a5a1
SHA512ef342d360e3eb73f03aa6705f3180543c7ee695030bd7888dea1e4d214933257533b1baf4c7c0bf03866813089785ccf6f4c23f2f7cb8a75a3a6c08e38ac1414
-
Filesize
260KB
MD505391c2b4897c92fcdd89480a1a61ff0
SHA1e02f29e4a91ff3506d12f163685a2c80b5b8e645
SHA25633497c0330d746bc6e38a74ea3b4f63fa33b58a5cb9cb94c947a6b5d25e6a5a1
SHA512ef342d360e3eb73f03aa6705f3180543c7ee695030bd7888dea1e4d214933257533b1baf4c7c0bf03866813089785ccf6f4c23f2f7cb8a75a3a6c08e38ac1414
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab
-
Filesize
260KB
MD505391c2b4897c92fcdd89480a1a61ff0
SHA1e02f29e4a91ff3506d12f163685a2c80b5b8e645
SHA25633497c0330d746bc6e38a74ea3b4f63fa33b58a5cb9cb94c947a6b5d25e6a5a1
SHA512ef342d360e3eb73f03aa6705f3180543c7ee695030bd7888dea1e4d214933257533b1baf4c7c0bf03866813089785ccf6f4c23f2f7cb8a75a3a6c08e38ac1414
-
Filesize
260KB
MD505391c2b4897c92fcdd89480a1a61ff0
SHA1e02f29e4a91ff3506d12f163685a2c80b5b8e645
SHA25633497c0330d746bc6e38a74ea3b4f63fa33b58a5cb9cb94c947a6b5d25e6a5a1
SHA512ef342d360e3eb73f03aa6705f3180543c7ee695030bd7888dea1e4d214933257533b1baf4c7c0bf03866813089785ccf6f4c23f2f7cb8a75a3a6c08e38ac1414
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
96KB
MD56dd43c641739208db67ce75fd95c5a6b
SHA15e34a8eb6c07b9d0e5a7831038978a17b0f4299f
SHA256cad21fb19e08849de3be8a83b0d5bfdf57dff9470fcf780fbc83863eb93bcc0b
SHA512400969416513d87b0ac55d4e6636f56a83f512bef2b202d77e96745f6892eeb3963344441e6e0870a96c730d502480c749286c72c15335c254f1c4dc1f58cbf1
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab
-
Filesize
257KB
MD5244c09aa8ba50d70e49d727b0918f837
SHA1662e88794e0cff9d607a3a22b11f712b6d7d207c
SHA25643949b9c1b167eab895db869cac266f34dc661e9182e6d1ad37634706d099e73
SHA512167acc0b4d33b84d1661cbfae3c164c359b9863f894af2419829d0d9eb62929d3a5907e065ba45cabbe9db407a1e32ec99ac63e5e235491b3d8b159f15b90eab