Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10-07-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
dea98214ec29b7cd5cb24e695.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
dea98214ec29b7cd5cb24e695.exe
Resource
win10v2004-20230703-en
General
-
Target
dea98214ec29b7cd5cb24e695.exe
-
Size
529KB
-
MD5
dea98214ec29b7cd5cb24e6957d3122b
-
SHA1
5e6e7063d689fc58282309aed47a037054a079de
-
SHA256
55b8a711e22c32e0890552fcd9384eb4c830629379064880ff92127969cb449e
-
SHA512
d0575b08b156145a7bcf8f348e569ddbcc7f7da7ce5cddffef5f6cde3c1c2c1cf9a80b4e1d45a401bcbcbeda6c7a3be6dcc3ab3cf47bca77dbe54540853afe13
-
SSDEEP
12288:CbEbfvWaRdnQgaFjvXoIITSjxMd7cfxXgMG7cVC:CbEjvW82giofTCxXl3VC
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2396-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5331941.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2244 y1589335.exe 2396 k5331941.exe 2276 l8599376.exe -
Loads dropped DLL 8 IoCs
pid Process 2088 dea98214ec29b7cd5cb24e695.exe 2244 y1589335.exe 2244 y1589335.exe 2244 y1589335.exe 2396 k5331941.exe 2244 y1589335.exe 2244 y1589335.exe 2276 l8599376.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k5331941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5331941.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dea98214ec29b7cd5cb24e695.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1589335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1589335.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dea98214ec29b7cd5cb24e695.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 k5331941.exe 2396 k5331941.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 k5331941.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2088 wrote to memory of 2244 2088 dea98214ec29b7cd5cb24e695.exe 30 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2396 2244 y1589335.exe 31 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33 PID 2244 wrote to memory of 2276 2244 y1589335.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dea98214ec29b7cd5cb24e695.exe"C:\Users\Admin\AppData\Local\Temp\dea98214ec29b7cd5cb24e695.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1589335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1589335.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5331941.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5331941.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8599376.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8599376.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD52b13587756737f10d5e419e3d4889cc9
SHA1df5df9b05e15e7c7e09b529a09d5984c551e4e2b
SHA256385ee41e62c3aa616a88d2062995bc2fbf0a997e3033f735519b84e6a8835606
SHA512ff7661300f1fbc9f574e533f2646c4e2fbad520d27b69979e459cf2f9d77227e3fdc0b781eeb40332f7c85aab07f3c9cbb6146104924758e739db2d0c88c8019
-
Filesize
260KB
MD52b13587756737f10d5e419e3d4889cc9
SHA1df5df9b05e15e7c7e09b529a09d5984c551e4e2b
SHA256385ee41e62c3aa616a88d2062995bc2fbf0a997e3033f735519b84e6a8835606
SHA512ff7661300f1fbc9f574e533f2646c4e2fbad520d27b69979e459cf2f9d77227e3fdc0b781eeb40332f7c85aab07f3c9cbb6146104924758e739db2d0c88c8019
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021
-
Filesize
260KB
MD52b13587756737f10d5e419e3d4889cc9
SHA1df5df9b05e15e7c7e09b529a09d5984c551e4e2b
SHA256385ee41e62c3aa616a88d2062995bc2fbf0a997e3033f735519b84e6a8835606
SHA512ff7661300f1fbc9f574e533f2646c4e2fbad520d27b69979e459cf2f9d77227e3fdc0b781eeb40332f7c85aab07f3c9cbb6146104924758e739db2d0c88c8019
-
Filesize
260KB
MD52b13587756737f10d5e419e3d4889cc9
SHA1df5df9b05e15e7c7e09b529a09d5984c551e4e2b
SHA256385ee41e62c3aa616a88d2062995bc2fbf0a997e3033f735519b84e6a8835606
SHA512ff7661300f1fbc9f574e533f2646c4e2fbad520d27b69979e459cf2f9d77227e3fdc0b781eeb40332f7c85aab07f3c9cbb6146104924758e739db2d0c88c8019
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
96KB
MD572fd1a70f413ab854a0b5b1f578063be
SHA1fad47a6bcd43c825a1c409bef3a8cbd89fadbce1
SHA2565232710408f216cd7fbd8387e1a869e5c3001cb90c79999e2a8e046f80b8d858
SHA512dd857736eef06f91e51b085f7bf019664bd965eb62c3d965ced7f402c201008842726cad6be47c347cefb81d2e02d522b98d9d35fb5e0e6cb06220cf222f4b18
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021
-
Filesize
257KB
MD5b4e6f70ad8309362241b102d479e0c93
SHA1dd5c11a702ca14370207f3bb8b78b5a7b34d7088
SHA2560ccbb86504598e23eeaa986ccb059cd73dc8611035f673efe256522b4b9747d2
SHA51290755d8643fdb1622ef95857367f42080f38a7440dbe95dd760a48cd91a79f4c71317d220088bef1939ac9b074d01941e4580c94defd84f9194b6a8a43f9b021