Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 11:11
Static task
static1
Behavioral task
behavioral1
Sample
8e7aa14ae6de45aa7791a8a9f.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8e7aa14ae6de45aa7791a8a9f.exe
Resource
win10v2004-20230703-en
General
-
Target
8e7aa14ae6de45aa7791a8a9f.exe
-
Size
523KB
-
MD5
8e7aa14ae6de45aa7791a8a9fb084b03
-
SHA1
e8a539e2a76943d119e30fe34a603debb76695f4
-
SHA256
f8f268ebe8022cf4828db949730df87ae23860ff2a7e9a84eba1496488ff4f3d
-
SHA512
9c5ce26d5af283df7fe23f7d99272ef02ab5d5a22140cc453939f04a27886ee04f60eb0416d731b672e4e792651f39581188b80c611cf3526381c701bfe4a1d6
-
SSDEEP
12288:vwhd2zjfvGaRdnQgj7X9eHawcnvHtqjBfooM9xmqkW:vo2z7vG82gj7X9zwcn1f77kW
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2704-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7601719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7601719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7601719.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7601719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7601719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7601719.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1484 y4095027.exe 2704 k7601719.exe 1308 l7550787.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7601719.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7601719.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4095027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4095027.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e7aa14ae6de45aa7791a8a9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e7aa14ae6de45aa7791a8a9f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 k7601719.exe 2704 k7601719.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 k7601719.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1484 1092 8e7aa14ae6de45aa7791a8a9f.exe 84 PID 1092 wrote to memory of 1484 1092 8e7aa14ae6de45aa7791a8a9f.exe 84 PID 1092 wrote to memory of 1484 1092 8e7aa14ae6de45aa7791a8a9f.exe 84 PID 1484 wrote to memory of 2704 1484 y4095027.exe 85 PID 1484 wrote to memory of 2704 1484 y4095027.exe 85 PID 1484 wrote to memory of 2704 1484 y4095027.exe 85 PID 1484 wrote to memory of 1308 1484 y4095027.exe 88 PID 1484 wrote to memory of 1308 1484 y4095027.exe 88 PID 1484 wrote to memory of 1308 1484 y4095027.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e7aa14ae6de45aa7791a8a9f.exe"C:\Users\Admin\AppData\Local\Temp\8e7aa14ae6de45aa7791a8a9f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exe3⤵
- Executes dropped EXE
PID:1308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
257KB
MD5565ab185652f527c6b5dc36e92d6b339
SHA16a95d612d958ab87c64c9581a449f7fd1379c210
SHA2569bf9535ed85015a7a796bf0caaa3be82ccd09184573c9f99e8d3459bd40bd665
SHA51270c56a20bb8f2250ac6b6df8b762ad0f99ca26c806d9cd5eefb035d10f60f20740ede4fdee1e4eff8f6a2214709e18cfb106dc0353a5658700a43d68b5e02a88
-
Filesize
257KB
MD5565ab185652f527c6b5dc36e92d6b339
SHA16a95d612d958ab87c64c9581a449f7fd1379c210
SHA2569bf9535ed85015a7a796bf0caaa3be82ccd09184573c9f99e8d3459bd40bd665
SHA51270c56a20bb8f2250ac6b6df8b762ad0f99ca26c806d9cd5eefb035d10f60f20740ede4fdee1e4eff8f6a2214709e18cfb106dc0353a5658700a43d68b5e02a88
-
Filesize
94KB
MD5e2885d6438af4c491c77f3d345fa787c
SHA186ee7a5ffc8e66fba5c4e28f49e8e778ac97d5f7
SHA2562d3d6e82d3413262d1ff4f76c4d35188632035ee67371d92fee48fedaac0cb1a
SHA5123d603abbcbb57c0706af7583474ed783c158377c459980e5b05f27c8677b89001b6835863504d884273c6b186aaf14961e87eeb76390422cf22f8984074be568
-
Filesize
94KB
MD5e2885d6438af4c491c77f3d345fa787c
SHA186ee7a5ffc8e66fba5c4e28f49e8e778ac97d5f7
SHA2562d3d6e82d3413262d1ff4f76c4d35188632035ee67371d92fee48fedaac0cb1a
SHA5123d603abbcbb57c0706af7583474ed783c158377c459980e5b05f27c8677b89001b6835863504d884273c6b186aaf14961e87eeb76390422cf22f8984074be568
-
Filesize
255KB
MD58e42f5b985627102d46e04c9326e1152
SHA1d213257c6d43ee7e8aca49399aadde7428ae39f2
SHA256d22a43c0ee31f5da3ac1482a39d1a1342f805c2a2a151b6e004977d925e842f6
SHA512eb1a67452cc9e855ebc92c592cea9a6765844462d9df1d4bcfd9e3170fa0d54257748266140a9eac8cd9493567d1ae7cc64d65e336a74939ebdf18339bf3bb53
-
Filesize
255KB
MD58e42f5b985627102d46e04c9326e1152
SHA1d213257c6d43ee7e8aca49399aadde7428ae39f2
SHA256d22a43c0ee31f5da3ac1482a39d1a1342f805c2a2a151b6e004977d925e842f6
SHA512eb1a67452cc9e855ebc92c592cea9a6765844462d9df1d4bcfd9e3170fa0d54257748266140a9eac8cd9493567d1ae7cc64d65e336a74939ebdf18339bf3bb53