Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
2e88144163915f2e62a5ad9b0.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2e88144163915f2e62a5ad9b0.exe
Resource
win10v2004-20230703-en
General
-
Target
2e88144163915f2e62a5ad9b0.exe
-
Size
791KB
-
MD5
2e88144163915f2e62a5ad9b05d1e0e5
-
SHA1
1f23787d31bbd8b2cc5a5fbeeadea1688e09502c
-
SHA256
9fb2817fe1508ac672701e6733dbbd930f6c87e641ea8686ed874ba25a86a451
-
SHA512
cbbb1df2e1afc8b3c25b2fd8ca49e6dffc56fe2059214c9db7001c85bf0bd8fcc05385d92213535e8134e6c39044be490320aef624f43c13b72bf576ee0f8623
-
SSDEEP
12288:D/48fvjaRdnQgtS/nQ/e4TFHE4Zi0OPadQbVCJZoeyVgQlgDc4SzfvR2FN1G:D/4Wvj82gtgz4hk4Z/ObWu0A/x2M
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/2840-167-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x00070000000231f0-174.dat healer behavioral2/files/0x00070000000231f0-175.dat healer behavioral2/memory/1232-176-0x0000000000F30000-0x0000000000F3A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b4258095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4258095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4258095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4258095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4258095.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4258095.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7156130.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3816 v8164498.exe 3184 v5783051.exe 4608 v6682303.exe 2840 a7156130.exe 1232 b4258095.exe 3160 c8402628.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7156130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4258095.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8164498.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5783051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5783051.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6682303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6682303.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2e88144163915f2e62a5ad9b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e88144163915f2e62a5ad9b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8164498.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 a7156130.exe 2840 a7156130.exe 1232 b4258095.exe 1232 b4258095.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2840 a7156130.exe Token: SeDebugPrivilege 1232 b4258095.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2428 wrote to memory of 3816 2428 2e88144163915f2e62a5ad9b0.exe 86 PID 2428 wrote to memory of 3816 2428 2e88144163915f2e62a5ad9b0.exe 86 PID 2428 wrote to memory of 3816 2428 2e88144163915f2e62a5ad9b0.exe 86 PID 3816 wrote to memory of 3184 3816 v8164498.exe 87 PID 3816 wrote to memory of 3184 3816 v8164498.exe 87 PID 3816 wrote to memory of 3184 3816 v8164498.exe 87 PID 3184 wrote to memory of 4608 3184 v5783051.exe 88 PID 3184 wrote to memory of 4608 3184 v5783051.exe 88 PID 3184 wrote to memory of 4608 3184 v5783051.exe 88 PID 4608 wrote to memory of 2840 4608 v6682303.exe 89 PID 4608 wrote to memory of 2840 4608 v6682303.exe 89 PID 4608 wrote to memory of 2840 4608 v6682303.exe 89 PID 4608 wrote to memory of 1232 4608 v6682303.exe 91 PID 4608 wrote to memory of 1232 4608 v6682303.exe 91 PID 3184 wrote to memory of 3160 3184 v5783051.exe 92 PID 3184 wrote to memory of 3160 3184 v5783051.exe 92 PID 3184 wrote to memory of 3160 3184 v5783051.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e88144163915f2e62a5ad9b0.exe"C:\Users\Admin\AppData\Local\Temp\2e88144163915f2e62a5ad9b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8164498.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5783051.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6682303.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7156130.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4258095.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8402628.exe4⤵
- Executes dropped EXE
PID:3160
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
522KB
MD54ad904e4249ba957b76394c687136e0b
SHA1b8d632b1f8656aef1ce6cf389384dd7760e6b6fc
SHA25695d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293
SHA512fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782
-
Filesize
522KB
MD54ad904e4249ba957b76394c687136e0b
SHA1b8d632b1f8656aef1ce6cf389384dd7760e6b6fc
SHA25695d3db4d4c2e102e813455406b2c3a5cd277f3ab02744462832556e6c1406293
SHA512fb2eaf6176ea5565cff570c3c04b28be4f21ab702c034b1f6da10642099fa23928d32d0b499f05baf06fbecc69d7ccd4eec2d013cf15db070ab38cddc984d782
-
Filesize
397KB
MD5b0b989799a1f4df95d976d795c524db2
SHA12672db6069f871aee3fd49e3ee331f13bcd21523
SHA256283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782
SHA512bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6
-
Filesize
397KB
MD5b0b989799a1f4df95d976d795c524db2
SHA12672db6069f871aee3fd49e3ee331f13bcd21523
SHA256283a898e75ad263b7e04a23df01d3ebefea7c1ac6942bd46eace75749e33c782
SHA512bdb795d7941b8ef866d5de69cf5f0f8d642f01b992b42dcedc3b78132d46259f1cc0e4cc619d0407de2bc854211b1251aa7b1078b7cb462808d1222a7145ada6
-
Filesize
258KB
MD50d85ff34516aee59f4ae23476d117c0f
SHA1c129060ffddcc2d262ffe3d7c02c22febb834e6c
SHA256b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7
SHA512e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc
-
Filesize
258KB
MD50d85ff34516aee59f4ae23476d117c0f
SHA1c129060ffddcc2d262ffe3d7c02c22febb834e6c
SHA256b68055c15315dacca7e51ddbbdcebc908176f0d18185bedd0664f7b0b52f2fd7
SHA512e918fcd0ea9519b9f2e3cbb5918797498a058269820ce35a7658d311ec5d74e77d18d344c808a5f2c4a21d37787f405ba81925db08fc5f41b1459b4cf9258ebc
-
Filesize
197KB
MD554261d3bb4f2a1103070e39c05413718
SHA13eb395c8a83f062a179fcaac437a8aaffe98c8a0
SHA256de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07
SHA512bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9
-
Filesize
197KB
MD554261d3bb4f2a1103070e39c05413718
SHA13eb395c8a83f062a179fcaac437a8aaffe98c8a0
SHA256de0224b705cd8ddf33bcc9386db8ea890279a7267079bde17eac734f5c74ee07
SHA512bbb14bc348a04981c9111ff37210034c880d9ce32f4cb66bc97099df22ef7e2cc0d65a5ba71f2e572f32a33aa1c08105b2aca900bc96a79e3efe450ded05afc9
-
Filesize
96KB
MD5c4eb36fa9a3985f3365c1d72c2203597
SHA1cd310bbe01530ac5cbdb9846226b34682cf90211
SHA2564829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f
SHA5124728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461
-
Filesize
96KB
MD5c4eb36fa9a3985f3365c1d72c2203597
SHA1cd310bbe01530ac5cbdb9846226b34682cf90211
SHA2564829458dd7e6e0c57b92d76e0b8f1e63cbf9e1766831baf81f44e3e6ace7f26f
SHA5124728ff3a7d4fa9580208e908523d51ee6cbf346d87f6830cba3b9691c151d09feb76bc01a173e6b4b405c55fb7ba6ce8d737162df7e7e45983b9450b6062b461
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91