Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe
Resource
win10v2004-20230703-en
General
-
Target
246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe
-
Size
863KB
-
MD5
0678f5c2a094c232ffe72f8b73479c9f
-
SHA1
a66cccedeb851457c42cab94f75e8c6f39b9a265
-
SHA256
246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779
-
SHA512
2425ab87428cae154227e48c58a31c0aeb158613e618c6881bdf162eeacc115a0532ecf223efa05fa3e85789884301417e5e58646b0fb13eb666716bd0743b0d
-
SSDEEP
24576:pyy3llUm7qL2A6H1Vv7WA1WAlLsEZCa15VAVsULMzVtS9c4V:cWmit1F7TYadAVsb5t8c
Malware Config
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4908-147-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9196596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9196596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9196596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9196596.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9196596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9196596.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3844 y4866318.exe 4908 k9196596.exe 4400 l9814095.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9196596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9196596.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4866318.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4866318.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4908 k9196596.exe 4908 k9196596.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4908 k9196596.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3844 4392 246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe 84 PID 4392 wrote to memory of 3844 4392 246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe 84 PID 4392 wrote to memory of 3844 4392 246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe 84 PID 3844 wrote to memory of 4908 3844 y4866318.exe 85 PID 3844 wrote to memory of 4908 3844 y4866318.exe 85 PID 3844 wrote to memory of 4908 3844 y4866318.exe 85 PID 3844 wrote to memory of 4400 3844 y4866318.exe 91 PID 3844 wrote to memory of 4400 3844 y4866318.exe 91 PID 3844 wrote to memory of 4400 3844 y4866318.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe"C:\Users\Admin\AppData\Local\Temp\246889c39918be278c460d90c72ae6dbfbf94d1b4e88261ad7a75a3aedcbc779.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4866318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4866318.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9196596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9196596.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9814095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9814095.exe3⤵
- Executes dropped EXE
PID:4400
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
679KB
MD5b81604e7450b346b6c4cb07c09234852
SHA1ed573c71d320e7966cb71acdaa353f012acbef10
SHA256bb709732eea59a11ac82485c11aa9ea396d846ebe95afdfa7e30de4cb0a87f7b
SHA5128dc6064a0c4a4cea19d1a863cb7c8dda717cb5d1aea952c82c29a10413a92cf1168f85ae2ca09f13512e027a04c9e59f106b3e06a5b18b961d374e3762e65513
-
Filesize
679KB
MD5b81604e7450b346b6c4cb07c09234852
SHA1ed573c71d320e7966cb71acdaa353f012acbef10
SHA256bb709732eea59a11ac82485c11aa9ea396d846ebe95afdfa7e30de4cb0a87f7b
SHA5128dc6064a0c4a4cea19d1a863cb7c8dda717cb5d1aea952c82c29a10413a92cf1168f85ae2ca09f13512e027a04c9e59f106b3e06a5b18b961d374e3762e65513
-
Filesize
530KB
MD5e1f68dacd155249977924008b766e88c
SHA1b9c2b1fd4d93bc08d0ff99566465533316e35c9c
SHA256f001757b62df8ffb9269af141c82b58d19c5aa0ecc6eb051b2079ba1a6aaf77d
SHA512e005d49dc52fe7a6be6e0a7551ba381b2249e83bc5b00df5373bdda01902e32788ebedc6a8f5d118e2ef94b32e09e0a7eb7cb1e3100066f156cde2489181b358
-
Filesize
530KB
MD5e1f68dacd155249977924008b766e88c
SHA1b9c2b1fd4d93bc08d0ff99566465533316e35c9c
SHA256f001757b62df8ffb9269af141c82b58d19c5aa0ecc6eb051b2079ba1a6aaf77d
SHA512e005d49dc52fe7a6be6e0a7551ba381b2249e83bc5b00df5373bdda01902e32788ebedc6a8f5d118e2ef94b32e09e0a7eb7cb1e3100066f156cde2489181b358
-
Filesize
691KB
MD5f196514579610eba13f6aaab78a44e0e
SHA18c2baba6c881f634de687e2d6a115586d4335ac4
SHA2569919a5da80911c329d563983e62044c02f6dd8a3707e1a98bf6ebbd46067b709
SHA512f20dab79f8fbce1ff242b3071308176160abdb819eacb3ff6c4c798f83f6d874639e4d2d9db1ad03c710718a6fae1355f2cc867e019e89c203e2347737a7c6fc
-
Filesize
691KB
MD5f196514579610eba13f6aaab78a44e0e
SHA18c2baba6c881f634de687e2d6a115586d4335ac4
SHA2569919a5da80911c329d563983e62044c02f6dd8a3707e1a98bf6ebbd46067b709
SHA512f20dab79f8fbce1ff242b3071308176160abdb819eacb3ff6c4c798f83f6d874639e4d2d9db1ad03c710718a6fae1355f2cc867e019e89c203e2347737a7c6fc