Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe
Resource
win10v2004-20230703-en
General
-
Target
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe
-
Size
863KB
-
MD5
06277a03cdeaf29ddaf5419eb7b05b20
-
SHA1
96d63bf0038d66d8077141669a1518d99182f7a4
-
SHA256
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea06fe9d0da0c95e9abadd
-
SHA512
794cd215922cf660883cafcb834c4962aca747bdb3f7240118c2924c6185b682946e037e200a92b1cac307ae2dca34919c8ce367b77c0a24ced47a21b4ba50ff
-
SSDEEP
12288:iMr/y90ORo/UpVjIROE5bDbVA0A/9OcuITijA8yeQbcHO+lLG9L8qwcnmJaqi:lyZOoqkWb/61OcVmS45dGALK
Malware Config
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2296-77-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9734366.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k9734366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9734366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9734366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9734366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9734366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2168 y3907700.exe 2296 k9734366.exe 1328 l8065764.exe -
Loads dropped DLL 8 IoCs
pid Process 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 2168 y3907700.exe 2168 y3907700.exe 2168 y3907700.exe 2296 k9734366.exe 2168 y3907700.exe 2168 y3907700.exe 1328 l8065764.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k9734366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9734366.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3907700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3907700.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2296 k9734366.exe 2296 k9734366.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 k9734366.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 1072 wrote to memory of 2168 1072 1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe 29 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 2296 2168 y3907700.exe 30 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32 PID 2168 wrote to memory of 1328 2168 y3907700.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe"C:\Users\Admin\AppData\Local\Temp\1b0729839d14f565e8de6c35f683e4cf6c401cc652ea0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3907700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3907700.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9734366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9734366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8065764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8065764.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679KB
MD5e2f2a83987e8c3ec0be91997242a1245
SHA18fbe7c3c73521d2e43551408dea446b86b1f1320
SHA256c0bad50a06332530825d6222df1a1a81be1efb53e40b430d958d41058b2da47d
SHA5125f5819a08d3fefa1cf48ba1b1957e210bc3b9b2f54d179cf4643f2d2f892717215829817565ea0d729ec4adb218742283363ca3b496b2d08c4753358ef5b8908
-
Filesize
679KB
MD5e2f2a83987e8c3ec0be91997242a1245
SHA18fbe7c3c73521d2e43551408dea446b86b1f1320
SHA256c0bad50a06332530825d6222df1a1a81be1efb53e40b430d958d41058b2da47d
SHA5125f5819a08d3fefa1cf48ba1b1957e210bc3b9b2f54d179cf4643f2d2f892717215829817565ea0d729ec4adb218742283363ca3b496b2d08c4753358ef5b8908
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa
-
Filesize
679KB
MD5e2f2a83987e8c3ec0be91997242a1245
SHA18fbe7c3c73521d2e43551408dea446b86b1f1320
SHA256c0bad50a06332530825d6222df1a1a81be1efb53e40b430d958d41058b2da47d
SHA5125f5819a08d3fefa1cf48ba1b1957e210bc3b9b2f54d179cf4643f2d2f892717215829817565ea0d729ec4adb218742283363ca3b496b2d08c4753358ef5b8908
-
Filesize
679KB
MD5e2f2a83987e8c3ec0be91997242a1245
SHA18fbe7c3c73521d2e43551408dea446b86b1f1320
SHA256c0bad50a06332530825d6222df1a1a81be1efb53e40b430d958d41058b2da47d
SHA5125f5819a08d3fefa1cf48ba1b1957e210bc3b9b2f54d179cf4643f2d2f892717215829817565ea0d729ec4adb218742283363ca3b496b2d08c4753358ef5b8908
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
530KB
MD51f7f9b823f8da6464138b0a8aa7b7541
SHA1cc0101a0ab1d56618ee997b81ef69438256b62d7
SHA2569deffa10cbae5f528b9441383f82380d1d39ecf55dd7128cd633c45dd5707b7d
SHA512b409e220c5bbf887250a0de83f5e26c5013aa7a17b9ec107d0ea3e8861e052f0970d6e0c04df05d65f8c5856bb87209d9c6766dcf2f3beb65b881da7d2d91275
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa
-
Filesize
692KB
MD55f7e66a3a98eea835c4abbcc1f166450
SHA1717ff1c55cac3921a0ab7bfdcaa9d63906f11c00
SHA256a9c1cbaa22561785d5e12b8dd1cfe72372c1f4c22510a503b68c450428518275
SHA51210502dda88a78c477efb627d514728dd0ef8387380e8b336e7a4a586c8bbf2d24ffddb4518c96624d6a32d9a0a13370d153d08b32c0b1872842f8b8b6ca923aa