Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
96284c80dbf1170cf04f393f4217e632.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
96284c80dbf1170cf04f393f4217e632.exe
Resource
win10v2004-20230703-en
General
-
Target
96284c80dbf1170cf04f393f4217e632.exe
-
Size
538KB
-
MD5
96284c80dbf1170cf04f393f4217e632
-
SHA1
a7559f18fefaf3ad6c1c946ec14f506201bd416c
-
SHA256
af60086592adfaf5ec65c69085a2688792b0c92a1509e9f27aabdcb20969dbbb
-
SHA512
85a68418a86b4b4ca1355bc0377b83aa43b5152751af24458a9366697e78e70f71b45b145ceb547d0ec0a9dab31423c4b46b09a23f708850a7c6542a2dc27440
-
SSDEEP
12288:7k8Hoz47IJ9LjUEUD6U6aMkop1G0ulMO:rK47IJW6xnkSja
Malware Config
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2176-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8044106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8044106.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8044106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8044106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8044106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8044106.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2136 y0732374.exe 2176 k8044106.exe 2268 l5897176.exe -
Loads dropped DLL 8 IoCs
pid Process 3016 96284c80dbf1170cf04f393f4217e632.exe 2136 y0732374.exe 2136 y0732374.exe 2136 y0732374.exe 2176 k8044106.exe 2136 y0732374.exe 2136 y0732374.exe 2268 l5897176.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k8044106.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8044106.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 96284c80dbf1170cf04f393f4217e632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96284c80dbf1170cf04f393f4217e632.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0732374.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0732374.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 k8044106.exe 2176 k8044106.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2176 k8044106.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 3016 wrote to memory of 2136 3016 96284c80dbf1170cf04f393f4217e632.exe 30 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2176 2136 y0732374.exe 31 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33 PID 2136 wrote to memory of 2268 2136 y0732374.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\96284c80dbf1170cf04f393f4217e632.exe"C:\Users\Admin\AppData\Local\Temp\96284c80dbf1170cf04f393f4217e632.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0732374.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0732374.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8044106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8044106.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5897176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5897176.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5288cb628cd1725bcdb5a9c3ae9a1e34b
SHA173549821d885cff6894c862c284eccad5b03a8b5
SHA256fa6180a20c33dadf8cbe11e334bd463031814d0ff9170f1aa53dcddf27d8e1ca
SHA51209f987762201fee9dbee55ef03e471997a512497923b5f6eea57e75444e7d4802d89398939a43d26d950cb31ef9e82d71cc1e0d81c66c82075264d5b7904a0f9
-
Filesize
261KB
MD5288cb628cd1725bcdb5a9c3ae9a1e34b
SHA173549821d885cff6894c862c284eccad5b03a8b5
SHA256fa6180a20c33dadf8cbe11e334bd463031814d0ff9170f1aa53dcddf27d8e1ca
SHA51209f987762201fee9dbee55ef03e471997a512497923b5f6eea57e75444e7d4802d89398939a43d26d950cb31ef9e82d71cc1e0d81c66c82075264d5b7904a0f9
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652
-
Filesize
261KB
MD5288cb628cd1725bcdb5a9c3ae9a1e34b
SHA173549821d885cff6894c862c284eccad5b03a8b5
SHA256fa6180a20c33dadf8cbe11e334bd463031814d0ff9170f1aa53dcddf27d8e1ca
SHA51209f987762201fee9dbee55ef03e471997a512497923b5f6eea57e75444e7d4802d89398939a43d26d950cb31ef9e82d71cc1e0d81c66c82075264d5b7904a0f9
-
Filesize
261KB
MD5288cb628cd1725bcdb5a9c3ae9a1e34b
SHA173549821d885cff6894c862c284eccad5b03a8b5
SHA256fa6180a20c33dadf8cbe11e334bd463031814d0ff9170f1aa53dcddf27d8e1ca
SHA51209f987762201fee9dbee55ef03e471997a512497923b5f6eea57e75444e7d4802d89398939a43d26d950cb31ef9e82d71cc1e0d81c66c82075264d5b7904a0f9
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
104KB
MD5b5f9d398bc0ddf99aec33f58b7ade5b6
SHA1c017beb8287f62748ea941dbdc133ee6cd9bd881
SHA2564f0220bafbdda9972fa88e070d74d5794044f12141c008cf9c4fbea47f475c1e
SHA512ff076f0299e9cbbd1e44bdcec89b5b8d8d4e792fd51a07625fb4cb8d873c3577ba374a6f6fb9775dd47a288ee1c80c4f75877fe997421ca26910684963acfb31
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652
-
Filesize
266KB
MD5f490086a7b1a3b7469a1fa83bdffb058
SHA12c3384d834b92bfdca9d9eeb36693a58aac066d7
SHA256219a14961e6d20ad326aa64dab1b208611bb8a3358f045898ea2801ca01d47e7
SHA512a7fd4fc61b48ee9dab5d3100ef7cc6d0f596cdab939a0d9eb2fb5d1970fa501515c6e4a3e5cefbcce8f650bd2ded97868b137a47b769255c524007b037ed8652