Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
589663abea8108ec363031ffd.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
589663abea8108ec363031ffd.exe
Resource
win10v2004-20230703-en
General
-
Target
589663abea8108ec363031ffd.exe
-
Size
784KB
-
MD5
589663abea8108ec363031ffd154f7f8
-
SHA1
265348031aa42552591046bab16387cb14e22ce8
-
SHA256
8186a9fa53725a8f57b0375cd218229780e15553ae3229024ac0ec9e4d6ccee3
-
SHA512
6be9b5c36cfd26e5c9f8123892bf74347217a1fb1648cae43c894825b779b4f7b03835b8a542a462a79ba51eddce0c33270c0818890c5b6e8f655c8c907bcbff
-
SSDEEP
24576:NBcgHAvD82gdopERgBw7q4Hl/5g26hUUs:NB5gQ/opEqCbl/5gDs
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/1220-167-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x0006000000023241-174.dat healer behavioral2/files/0x0006000000023241-175.dat healer behavioral2/memory/4872-176-0x0000000000650000-0x000000000065A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2119938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2119938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2119938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3312575.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2119938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2119938.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2119938.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3312575.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3956 v7993225.exe 2728 v8615335.exe 1616 v4285211.exe 1220 a3312575.exe 4872 b2119938.exe 3936 c6528360.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3312575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2119938.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7993225.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8615335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8615335.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4285211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4285211.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 589663abea8108ec363031ffd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 589663abea8108ec363031ffd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7993225.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1220 a3312575.exe 1220 a3312575.exe 4872 b2119938.exe 4872 b2119938.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 a3312575.exe Token: SeDebugPrivilege 4872 b2119938.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3956 1604 589663abea8108ec363031ffd.exe 84 PID 1604 wrote to memory of 3956 1604 589663abea8108ec363031ffd.exe 84 PID 1604 wrote to memory of 3956 1604 589663abea8108ec363031ffd.exe 84 PID 3956 wrote to memory of 2728 3956 v7993225.exe 85 PID 3956 wrote to memory of 2728 3956 v7993225.exe 85 PID 3956 wrote to memory of 2728 3956 v7993225.exe 85 PID 2728 wrote to memory of 1616 2728 v8615335.exe 86 PID 2728 wrote to memory of 1616 2728 v8615335.exe 86 PID 2728 wrote to memory of 1616 2728 v8615335.exe 86 PID 1616 wrote to memory of 1220 1616 v4285211.exe 87 PID 1616 wrote to memory of 1220 1616 v4285211.exe 87 PID 1616 wrote to memory of 1220 1616 v4285211.exe 87 PID 1616 wrote to memory of 4872 1616 v4285211.exe 89 PID 1616 wrote to memory of 4872 1616 v4285211.exe 89 PID 2728 wrote to memory of 3936 2728 v8615335.exe 90 PID 2728 wrote to memory of 3936 2728 v8615335.exe 90 PID 2728 wrote to memory of 3936 2728 v8615335.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\589663abea8108ec363031ffd.exe"C:\Users\Admin\AppData\Local\Temp\589663abea8108ec363031ffd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7993225.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8615335.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4285211.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3312575.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2119938.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6528360.exe4⤵
- Executes dropped EXE
PID:3936
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
518KB
MD5bd1f3fa39b64311b23623de7277b9aba
SHA10a5b8683d09ac7314eaae0bc14d8eddcee018c77
SHA2560f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6
SHA5127eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6
-
Filesize
518KB
MD5bd1f3fa39b64311b23623de7277b9aba
SHA10a5b8683d09ac7314eaae0bc14d8eddcee018c77
SHA2560f5bdf737e2e3056c69a9cbd521ef4d830917742165e805244a1cdab10090fb6
SHA5127eaad32fb1adcd3691627b18555d64c40dd5550e8192cef622124f260cda8186d71e917c81a1100898f6c5a3e1577ca0f8a03c8e1e1ae3679ac4d97db2075de6
-
Filesize
393KB
MD538b2bead61a685ccd7b00c71ecb0b49d
SHA16046dfc1d75c780f3a21da015e3d3a73ffe3bd17
SHA256867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d
SHA5121aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582
-
Filesize
393KB
MD538b2bead61a685ccd7b00c71ecb0b49d
SHA16046dfc1d75c780f3a21da015e3d3a73ffe3bd17
SHA256867fd59b4bef3c1c4af58fabdc3ea685bca5e317f218979bf14872c92344dc3d
SHA5121aa8e83759103a879542589aeb6711cfff1cc2fa2cb8dd76ad287e9090e595c3e69d3ccdd71289dbdbdfb42cfcaa28fb7d745f00ae195c7cd8edd0366a324582
-
Filesize
255KB
MD5e74afc0f02d55119238fc4f2864ef82a
SHA1200f4bd21af4756ee041ed243406ea4e8abec90f
SHA256ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f
SHA512f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476
-
Filesize
255KB
MD5e74afc0f02d55119238fc4f2864ef82a
SHA1200f4bd21af4756ee041ed243406ea4e8abec90f
SHA256ecbf08ea3c9042481d1a3941127eaa733ec09b7f01b66c245858d3cde76c209f
SHA512f5dfb07b3b43a162f12b3e40201c0132252fe59805204b975c7814d5138375d1c90c5055b8ba7e6c66f763cabff4ca3ed001a86c52ed5b7f7c194c4b27258476
-
Filesize
195KB
MD554faec35e5aa37c6176541968dded2e8
SHA1b905a0fc971f9c280373bef9b9d3e478e0e91caa
SHA2567499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9
SHA51240b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d
-
Filesize
195KB
MD554faec35e5aa37c6176541968dded2e8
SHA1b905a0fc971f9c280373bef9b9d3e478e0e91caa
SHA2567499943f4c7c0286826036154271afad05c620d4e145d212530d580ba2bb9cf9
SHA51240b4149290faf0ac454505827b3a4221ea4391e55206406198daee42cf9f0710d9c83e51c050b1e4ce10e250d751282d4334f221e5d8a9306899563c6cbc233d
-
Filesize
94KB
MD5c4c3fd2ee829367c26b6480de480b9dd
SHA199a499b57b7e73d609ee58797beaf1409a9db8a7
SHA256aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312
SHA512a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff
-
Filesize
94KB
MD5c4c3fd2ee829367c26b6480de480b9dd
SHA199a499b57b7e73d609ee58797beaf1409a9db8a7
SHA256aeec8780bdade38ebb5c4c328d20c0efe9f9791682b9c14ff0d233b860f9b312
SHA512a279a22fe7e5758f49c1235900d095dcc13e3280c4350625586d66cfe9e6f9ac5ddf5e28625f4142e67b62a7a4ed2c977d296e410c8e870b8ccb2c2b391999ff
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91