Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
6ba00ad9a91f15dd444ad429ac2c2247
-
SHA1
23f67b9d77ed808f1a3b22a7a48a70bf931ee11f
-
SHA256
dda511575fe2d4e8cc7e7dfbf500a529cbd2a5acc24299b8217d603401322c2f
-
SHA512
2bc5fa1df9db17837c37d37773447c485676f0deb06600b6d9d5b82e7a6cb605d175a7121a1688ce875337bd76d0cc18b3e90398a050f451acad22844f7a5261
-
SSDEEP
49152:xuMNfHwZ5+uSS08H6gD5CoqkmaBshMG6yVn:Z+5+ulaQ5hcaBTG
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/2108-161-0x00000000001F0000-0x00000000001FA000-memory.dmp healer behavioral2/files/0x000600000002322a-168.dat healer behavioral2/files/0x000600000002322a-169.dat healer behavioral2/memory/1548-170-0x0000000000530000-0x000000000053A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3166025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1880968.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3166025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3166025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3166025.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3166025.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3166025.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1520 v2384274.exe 2764 v7256150.exe 2732 v4512196.exe 2108 a1880968.exe 1548 b3166025.exe 1852 c0607620.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1880968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3166025.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2384274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2384274.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7256150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7256150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4512196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4512196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 a1880968.exe 2108 a1880968.exe 1548 b3166025.exe 1548 b3166025.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 a1880968.exe Token: SeDebugPrivilege 1548 b3166025.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 492 wrote to memory of 1520 492 file.exe 86 PID 492 wrote to memory of 1520 492 file.exe 86 PID 492 wrote to memory of 1520 492 file.exe 86 PID 1520 wrote to memory of 2764 1520 v2384274.exe 87 PID 1520 wrote to memory of 2764 1520 v2384274.exe 87 PID 1520 wrote to memory of 2764 1520 v2384274.exe 87 PID 2764 wrote to memory of 2732 2764 v7256150.exe 88 PID 2764 wrote to memory of 2732 2764 v7256150.exe 88 PID 2764 wrote to memory of 2732 2764 v7256150.exe 88 PID 2732 wrote to memory of 2108 2732 v4512196.exe 89 PID 2732 wrote to memory of 2108 2732 v4512196.exe 89 PID 2732 wrote to memory of 2108 2732 v4512196.exe 89 PID 2732 wrote to memory of 1548 2732 v4512196.exe 95 PID 2732 wrote to memory of 1548 2732 v4512196.exe 95 PID 2764 wrote to memory of 1852 2764 v7256150.exe 96 PID 2764 wrote to memory of 1852 2764 v7256150.exe 96 PID 2764 wrote to memory of 1852 2764 v7256150.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exe4⤵
- Executes dropped EXE
PID:1852
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.4MB
MD5dea8d48570a6cf242e686705d5366155
SHA1d9673b14317a59c0b3c4d40f91479d96cc25ce45
SHA2564903f699f8739354bdabec16602287d76f25393efa935a4d39ae7da674358666
SHA51219485ba2d4cd138ae632ded1ed01aeb444fea5780398cb25fc754da8771ba77f49436d898b23d05cde2b1d58ca44539fc8daf14d4dc4727543c059dd74d65673
-
Filesize
1.4MB
MD5dea8d48570a6cf242e686705d5366155
SHA1d9673b14317a59c0b3c4d40f91479d96cc25ce45
SHA2564903f699f8739354bdabec16602287d76f25393efa935a4d39ae7da674358666
SHA51219485ba2d4cd138ae632ded1ed01aeb444fea5780398cb25fc754da8771ba77f49436d898b23d05cde2b1d58ca44539fc8daf14d4dc4727543c059dd74d65673
-
Filesize
1.2MB
MD5146b7099c5884a806e8f819a9aaa6b7d
SHA18e92bb549be422d30fde8bac34236aa57aed6773
SHA256824d07da890962147a3476a815337e841d60ed064b269a53ee19b6a1c3676862
SHA5126a3aeeb5d39506dd49f26566435c1af762529b37ab1550a493049fb0d16fbe3bf2a4ea182f222242e530aa725792711084691352aa1b376a06a1e938713b9303
-
Filesize
1.2MB
MD5146b7099c5884a806e8f819a9aaa6b7d
SHA18e92bb549be422d30fde8bac34236aa57aed6773
SHA256824d07da890962147a3476a815337e841d60ed064b269a53ee19b6a1c3676862
SHA5126a3aeeb5d39506dd49f26566435c1af762529b37ab1550a493049fb0d16fbe3bf2a4ea182f222242e530aa725792711084691352aa1b376a06a1e938713b9303
-
Filesize
692KB
MD59699573ffff38da7f8b9ef26ce81e27c
SHA1db43ae44cff6b444623b04228161746fa3edfd9d
SHA2566b4d70ab1a1f37e7f700f9610ce3e986f2ce0734925ad450770cb4f9d30baa21
SHA512a1596dc3e519908f47962fd88b61d39df4c396991494424f79ae3380e1134bed240085cc486d4da793473af89375375c236095ca0219edf24d5373814d347eea
-
Filesize
692KB
MD59699573ffff38da7f8b9ef26ce81e27c
SHA1db43ae44cff6b444623b04228161746fa3edfd9d
SHA2566b4d70ab1a1f37e7f700f9610ce3e986f2ce0734925ad450770cb4f9d30baa21
SHA512a1596dc3e519908f47962fd88b61d39df4c396991494424f79ae3380e1134bed240085cc486d4da793473af89375375c236095ca0219edf24d5373814d347eea
-
Filesize
620KB
MD5a11d85bdc8f6f8adec34b76ba50f0e92
SHA159aff71b384589fdbb9a61da4a1b8fd77733b434
SHA256fbcfdf2126226fcf0775f497d438afa877b06a87aea3aca0766a202ff592a767
SHA51218447d53187eecca5a198246e2173d80d9de60e5836588389603ef24c58fa11b33cd3459fc2833b783e79b113fc4c704c555b5a85697054ef300b1c403d3da2f
-
Filesize
620KB
MD5a11d85bdc8f6f8adec34b76ba50f0e92
SHA159aff71b384589fdbb9a61da4a1b8fd77733b434
SHA256fbcfdf2126226fcf0775f497d438afa877b06a87aea3aca0766a202ff592a767
SHA51218447d53187eecca5a198246e2173d80d9de60e5836588389603ef24c58fa11b33cd3459fc2833b783e79b113fc4c704c555b5a85697054ef300b1c403d3da2f
-
Filesize
530KB
MD5fbb4ddee8fb3844b5f9686bd91fbc6de
SHA13fed5342bfea1d77de1fa6a2053e1c895c51550b
SHA256707b6a7b7d679407ddf194e800bd9c6e211d239a196f384ac6228e30cd71079f
SHA512c2ef9274e53dea16f34f362ff49e4d7ceff252a14864a5ef8294298c0ac5620ba8c5fde0a46578487516d761e91b7b9592542d6f25cc49744d4a3b8ea568d71a
-
Filesize
530KB
MD5fbb4ddee8fb3844b5f9686bd91fbc6de
SHA13fed5342bfea1d77de1fa6a2053e1c895c51550b
SHA256707b6a7b7d679407ddf194e800bd9c6e211d239a196f384ac6228e30cd71079f
SHA512c2ef9274e53dea16f34f362ff49e4d7ceff252a14864a5ef8294298c0ac5620ba8c5fde0a46578487516d761e91b7b9592542d6f25cc49744d4a3b8ea568d71a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91