Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
44e3ae1a3879de7cba4e80815.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
44e3ae1a3879de7cba4e80815.exe
Resource
win10v2004-20230703-en
General
-
Target
44e3ae1a3879de7cba4e80815.exe
-
Size
791KB
-
MD5
44e3ae1a3879de7cba4e80815baafbd9
-
SHA1
6d3ede14b895b5c702df44479e6a01410aeffdf9
-
SHA256
d2656006b64eeed2faee4e468239a7f19fa1979aa5661997b0a852b874973e03
-
SHA512
089b294984dbd5d778f532a717eea7c3e8478987d003c4f8da979a8f4ad5af6dcfd67a9f718ad9eb6e12dbe3d0643254eec5ed73e7294f1aa2847e68c5ff3ca7
-
SSDEEP
24576:tHSHove82gUHcMgm1OYOWjvHWYOwC73m2:VSIXnMgm1zr2ny2
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/2236-167-0x0000000000540000-0x000000000054A000-memory.dmp healer behavioral2/files/0x0006000000023270-174.dat healer behavioral2/files/0x0006000000023270-175.dat healer behavioral2/memory/2844-176-0x00000000001B0000-0x00000000001BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2458339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2458339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2458339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2458339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2458339.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5084156.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2458339.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 624 v7602489.exe 3760 v4941504.exe 4292 v0484294.exe 2236 a5084156.exe 2844 b2458339.exe 4648 c9807147.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5084156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2458339.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7602489.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4941504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4941504.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0484294.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0484294.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44e3ae1a3879de7cba4e80815.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44e3ae1a3879de7cba4e80815.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7602489.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2236 a5084156.exe 2236 a5084156.exe 2844 b2458339.exe 2844 b2458339.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2236 a5084156.exe Token: SeDebugPrivilege 2844 b2458339.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3168 wrote to memory of 624 3168 44e3ae1a3879de7cba4e80815.exe 86 PID 3168 wrote to memory of 624 3168 44e3ae1a3879de7cba4e80815.exe 86 PID 3168 wrote to memory of 624 3168 44e3ae1a3879de7cba4e80815.exe 86 PID 624 wrote to memory of 3760 624 v7602489.exe 87 PID 624 wrote to memory of 3760 624 v7602489.exe 87 PID 624 wrote to memory of 3760 624 v7602489.exe 87 PID 3760 wrote to memory of 4292 3760 v4941504.exe 88 PID 3760 wrote to memory of 4292 3760 v4941504.exe 88 PID 3760 wrote to memory of 4292 3760 v4941504.exe 88 PID 4292 wrote to memory of 2236 4292 v0484294.exe 89 PID 4292 wrote to memory of 2236 4292 v0484294.exe 89 PID 4292 wrote to memory of 2236 4292 v0484294.exe 89 PID 4292 wrote to memory of 2844 4292 v0484294.exe 93 PID 4292 wrote to memory of 2844 4292 v0484294.exe 93 PID 3760 wrote to memory of 4648 3760 v4941504.exe 94 PID 3760 wrote to memory of 4648 3760 v4941504.exe 94 PID 3760 wrote to memory of 4648 3760 v4941504.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44e3ae1a3879de7cba4e80815.exe"C:\Users\Admin\AppData\Local\Temp\44e3ae1a3879de7cba4e80815.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exe4⤵
- Executes dropped EXE
PID:4648
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
522KB
MD58293245db013260efa1c978693485de1
SHA1121b657d0d04bdc8bf2ddfe83071cab86b19265a
SHA25604a7627ac611e5116ea18e94df79745283da5b993336758ba3dae2743e0625fd
SHA5128f3be5c174598c130ac671f977a6146fb06034cb74e31544b0e20242247a2262cf4ef9c9165fcd65eddf24f9eb823f3e0637abab1fa2beb819a525773257187c
-
Filesize
522KB
MD58293245db013260efa1c978693485de1
SHA1121b657d0d04bdc8bf2ddfe83071cab86b19265a
SHA25604a7627ac611e5116ea18e94df79745283da5b993336758ba3dae2743e0625fd
SHA5128f3be5c174598c130ac671f977a6146fb06034cb74e31544b0e20242247a2262cf4ef9c9165fcd65eddf24f9eb823f3e0637abab1fa2beb819a525773257187c
-
Filesize
397KB
MD5382bdcdad0a91d0cd3d3852f6e8afa9c
SHA1f5fd356d163c6569dd23c3a682b0ba879f35d3c4
SHA2561d36903e401035c08ce36bd3d3f2d81fde1d68aca94dc952c498c5e27b445cc5
SHA512386c75ff73c6e787983da04de15e2b7d065755fbd1c48996174597116aabd6574de048eb35adcdba8471a870f61f27d2fda51228797e651740b79c2c963aa139
-
Filesize
397KB
MD5382bdcdad0a91d0cd3d3852f6e8afa9c
SHA1f5fd356d163c6569dd23c3a682b0ba879f35d3c4
SHA2561d36903e401035c08ce36bd3d3f2d81fde1d68aca94dc952c498c5e27b445cc5
SHA512386c75ff73c6e787983da04de15e2b7d065755fbd1c48996174597116aabd6574de048eb35adcdba8471a870f61f27d2fda51228797e651740b79c2c963aa139
-
Filesize
258KB
MD54ec303caecf1c3ff8b8b34c7fe132cd2
SHA196f21d316711cb54af778817a5a16f12f4f45c25
SHA2560a3779ee7861cfe5b8bd76fb480f41f15add0ad54dea18e3baf6f9770c8046c7
SHA512bb85f546b2e7224801d2f3f26a07774bc632fed155df60105b9ddd5e9e7610427b35b86697308c539a97d1f012872784a9e00b8b841d1e84edf881887e2715da
-
Filesize
258KB
MD54ec303caecf1c3ff8b8b34c7fe132cd2
SHA196f21d316711cb54af778817a5a16f12f4f45c25
SHA2560a3779ee7861cfe5b8bd76fb480f41f15add0ad54dea18e3baf6f9770c8046c7
SHA512bb85f546b2e7224801d2f3f26a07774bc632fed155df60105b9ddd5e9e7610427b35b86697308c539a97d1f012872784a9e00b8b841d1e84edf881887e2715da
-
Filesize
197KB
MD5f8d2ddbae9d24510a17eca54a9148789
SHA1118aa6ca56955a3bacd71b4d2bc606ec5b225fa0
SHA256411cc7577b429c5492cc7a91c339209ee174218f64a708041c5e0a11ee857cad
SHA512a0135819745d3784de2a8e5c886ade2d939380ad1d12f0f0fda1a91cbfdd89637d830e8e79ec51ad96cb688d8cac8c615ddfd11cee99ee26122183cc1032a836
-
Filesize
197KB
MD5f8d2ddbae9d24510a17eca54a9148789
SHA1118aa6ca56955a3bacd71b4d2bc606ec5b225fa0
SHA256411cc7577b429c5492cc7a91c339209ee174218f64a708041c5e0a11ee857cad
SHA512a0135819745d3784de2a8e5c886ade2d939380ad1d12f0f0fda1a91cbfdd89637d830e8e79ec51ad96cb688d8cac8c615ddfd11cee99ee26122183cc1032a836
-
Filesize
97KB
MD523ca9af2b637765843fbb1474a3519d0
SHA17cc5e1148a0edb4006ff33f5b79d7b2d440b071d
SHA25649a98f13ba1b20209648e30b31c9fb91f8df3e6022b48a7ce11d4c8f6f19b12c
SHA512f8b3e9caefbb0b686ce012f9bb25e561035ac4de3a363f84399567928c851b613593419b78c0772365856fa663d4acb09201f73af355a4e5e1e14f7a1761d7f5
-
Filesize
97KB
MD523ca9af2b637765843fbb1474a3519d0
SHA17cc5e1148a0edb4006ff33f5b79d7b2d440b071d
SHA25649a98f13ba1b20209648e30b31c9fb91f8df3e6022b48a7ce11d4c8f6f19b12c
SHA512f8b3e9caefbb0b686ce012f9bb25e561035ac4de3a363f84399567928c851b613593419b78c0772365856fa663d4acb09201f73af355a4e5e1e14f7a1761d7f5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91