Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
8b6d9499a1c8734cd8ecf0652.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8b6d9499a1c8734cd8ecf0652.exe
Resource
win10v2004-20230703-en
General
-
Target
8b6d9499a1c8734cd8ecf0652.exe
-
Size
783KB
-
MD5
8b6d9499a1c8734cd8ecf06523bc94a7
-
SHA1
8eec3ed216856bcabd413e81f895cca07dcba614
-
SHA256
40466ed58c6e1c69bd8a5e5b9863f5de08058c15b40861fbc28f983ca43417b4
-
SHA512
6dc9cca915b59b46a8fa793efbc254632cab5f865ac81ba7b6cd122cab92c7856a03fecf3bbb6b2c2cd8b2e5517c1c4f6acc21ba517ca947f873bc21204d775a
-
SSDEEP
24576:iIucxvp82gAh6jHwRgj0vKZZ9jMiK6o/D:3uQ2ChMb3rKv
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/2660-167-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x0006000000023234-174.dat healer behavioral2/files/0x0006000000023234-175.dat healer behavioral2/memory/1404-176-0x0000000000C70000-0x0000000000C7A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5855193.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b6782949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6782949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6782949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6782949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6782949.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6782949.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4736 v4791442.exe 4064 v7172701.exe 4616 v7893018.exe 2660 a5855193.exe 1404 b6782949.exe 368 c8864241.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5855193.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b6782949.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7893018.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8b6d9499a1c8734cd8ecf0652.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b6d9499a1c8734cd8ecf0652.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4791442.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4791442.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7172701.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7172701.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7893018.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 a5855193.exe 2660 a5855193.exe 1404 b6782949.exe 1404 b6782949.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 a5855193.exe Token: SeDebugPrivilege 1404 b6782949.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4736 1376 8b6d9499a1c8734cd8ecf0652.exe 86 PID 1376 wrote to memory of 4736 1376 8b6d9499a1c8734cd8ecf0652.exe 86 PID 1376 wrote to memory of 4736 1376 8b6d9499a1c8734cd8ecf0652.exe 86 PID 4736 wrote to memory of 4064 4736 v4791442.exe 87 PID 4736 wrote to memory of 4064 4736 v4791442.exe 87 PID 4736 wrote to memory of 4064 4736 v4791442.exe 87 PID 4064 wrote to memory of 4616 4064 v7172701.exe 88 PID 4064 wrote to memory of 4616 4064 v7172701.exe 88 PID 4064 wrote to memory of 4616 4064 v7172701.exe 88 PID 4616 wrote to memory of 2660 4616 v7893018.exe 89 PID 4616 wrote to memory of 2660 4616 v7893018.exe 89 PID 4616 wrote to memory of 2660 4616 v7893018.exe 89 PID 4616 wrote to memory of 1404 4616 v7893018.exe 93 PID 4616 wrote to memory of 1404 4616 v7893018.exe 93 PID 4064 wrote to memory of 368 4064 v7172701.exe 94 PID 4064 wrote to memory of 368 4064 v7172701.exe 94 PID 4064 wrote to memory of 368 4064 v7172701.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe"C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe4⤵
- Executes dropped EXE
PID:368
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
517KB
MD5dc4ded2e57a0cc9a854dbeb51ee6e776
SHA1355089fffa26a93d79e3e91c8dfb343767794831
SHA256b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df
SHA5126c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236
-
Filesize
517KB
MD5dc4ded2e57a0cc9a854dbeb51ee6e776
SHA1355089fffa26a93d79e3e91c8dfb343767794831
SHA256b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df
SHA5126c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236
-
Filesize
393KB
MD589609691765692ad1ce164b4bcb032f3
SHA1ab806573d920d4cfdd6ecbdf47fbe140d036909e
SHA256a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be
SHA51262d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b
-
Filesize
393KB
MD589609691765692ad1ce164b4bcb032f3
SHA1ab806573d920d4cfdd6ecbdf47fbe140d036909e
SHA256a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be
SHA51262d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b
-
Filesize
255KB
MD5ec41c1bb2ec8ed7d3812f7b1710eee8e
SHA19ccabd158c1851ede1f9aa785156d213b5bda1f0
SHA2568d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb
SHA51225af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2
-
Filesize
255KB
MD5ec41c1bb2ec8ed7d3812f7b1710eee8e
SHA19ccabd158c1851ede1f9aa785156d213b5bda1f0
SHA2568d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb
SHA51225af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2
-
Filesize
195KB
MD53638347f545a94c85244dbd1907d32e4
SHA181c0f7b0d11e76be4e84474e249964f7097fa5e8
SHA256d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a
SHA5126770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407
-
Filesize
195KB
MD53638347f545a94c85244dbd1907d32e4
SHA181c0f7b0d11e76be4e84474e249964f7097fa5e8
SHA256d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a
SHA5126770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407
-
Filesize
93KB
MD528a2c57644dc67b06bca7b2781030729
SHA128536e8f9d28e5f2898d68ee483fbdf119d6704b
SHA256cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73
SHA5124d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97
-
Filesize
93KB
MD528a2c57644dc67b06bca7b2781030729
SHA128536e8f9d28e5f2898d68ee483fbdf119d6704b
SHA256cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73
SHA5124d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91