Analysis
-
max time kernel
130s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
9fdf81de3e3b6e2409a05ec10.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9fdf81de3e3b6e2409a05ec10.exe
Resource
win10v2004-20230703-en
General
-
Target
9fdf81de3e3b6e2409a05ec10.exe
-
Size
523KB
-
MD5
9fdf81de3e3b6e2409a05ec104de7767
-
SHA1
0e702d335041afdcbb45b49da120fd432cb4870c
-
SHA256
367f78aa041693b4080834fb6a2f72fe36afd5189073a143f319bbe6624ccaf6
-
SHA512
0f2179d8ff256ea70b5f808b65ef3f8f8327bbc90e973814c468b61cfd8a6e8b064b6ea6a5236942f42601d54bd16c168d65c66aec2cf519a248a9c1b9809d56
-
SSDEEP
12288:S9JU8JafvQaRdnQgMmcy90DJScJRQTWg8/b0Fz7GznqhA:SU8JwvQ82g/sJXJRhAQTqm
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1740-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8853654.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2204 y5987748.exe 1740 k8853654.exe 2944 l7149138.exe -
Loads dropped DLL 8 IoCs
pid Process 284 9fdf81de3e3b6e2409a05ec10.exe 2204 y5987748.exe 2204 y5987748.exe 2204 y5987748.exe 1740 k8853654.exe 2204 y5987748.exe 2204 y5987748.exe 2944 l7149138.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k8853654.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8853654.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9fdf81de3e3b6e2409a05ec10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9fdf81de3e3b6e2409a05ec10.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5987748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5987748.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 k8853654.exe 1740 k8853654.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 k8853654.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 284 wrote to memory of 2204 284 9fdf81de3e3b6e2409a05ec10.exe 29 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 1740 2204 y5987748.exe 30 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32 PID 2204 wrote to memory of 2944 2204 y5987748.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fdf81de3e3b6e2409a05ec10.exe"C:\Users\Admin\AppData\Local\Temp\9fdf81de3e3b6e2409a05ec10.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5987748.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8853654.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7149138.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD56166316497a862f78fe07812baa98ccf
SHA1522af18c6c559e4d3b5d86e30dcf1582179dc223
SHA2566638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2
SHA512819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657
-
Filesize
257KB
MD56166316497a862f78fe07812baa98ccf
SHA1522af18c6c559e4d3b5d86e30dcf1582179dc223
SHA2566638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2
SHA512819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3
-
Filesize
257KB
MD56166316497a862f78fe07812baa98ccf
SHA1522af18c6c559e4d3b5d86e30dcf1582179dc223
SHA2566638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2
SHA512819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657
-
Filesize
257KB
MD56166316497a862f78fe07812baa98ccf
SHA1522af18c6c559e4d3b5d86e30dcf1582179dc223
SHA2566638febdde23eb1603190f3f701c0c6b79d22d64d40261c59135f3a5291ecbd2
SHA512819926259a34b1329dc9af025c2df277a4d5558281362a1b7f9ce0592934fb28541c130c48482c4c04a7c962cb5694b055fa3c5543c82a8bb37292a96a5a5657
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
93KB
MD5b8f7bd36e143cd6a9bddcde73f0f1c45
SHA1617ab7d8194fdffa8a1c74e6851aadc28d9de158
SHA256085cf3ce7e917283ec9dc601c4a190ae1385095ab383d149103fe7a07be96fa6
SHA51241fd20a093a1b5df47c2179a6c00778706226815ba9c43130582957916a2498e344deac1f5c57f216ce256bf10428fbd1db88c0588db2bd957eb3cfac65621d4
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3
-
Filesize
255KB
MD58cfb4de744f5b345c7397bf24258b42c
SHA102f1627dddad8889e8d4d2877b4b7eef88950bd7
SHA2568523e22769be8d129de632ead17c8c4a9af9da7145765b58c1cb09916cf0b43d
SHA512ce83acb3071464ebdd60e37ca41c1c280d83742d2c6beb90d6e32ac771a8950acae645086800570362fe8e38e74548f996bc99619e773f5284feb4d9fe5c38e3