Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe
Resource
win10v2004-20230703-en
General
-
Target
e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe
-
Size
1.0MB
-
MD5
006418731cd3fc37f61d1df3a631b248
-
SHA1
c2d259d9e8d2a88a19113398228c774a8b8a649d
-
SHA256
e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0
-
SHA512
1ec007293e4a3831c00f184d2129eb32080051ef1653e16f2c6c4198a2649dd955673cd16ee2b250044b24a6e5387d119c965f88172613d04c7888ba0c734076
-
SSDEEP
24576:0yt9efA4kFh4aZSBoDEfDLxTEyVZHL6peS:DOfAPXZSBNl7VZGp
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3916-154-0x0000000000400000-0x000000000041B000-memory.dmp healer behavioral1/memory/3916-155-0x0000000000540000-0x000000000054A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5250298.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5250298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5250298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5250298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5250298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5250298.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4100 y2311180.exe 824 y9840624.exe 3916 k5250298.exe 3144 l4276450.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5250298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5250298.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9840624.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2311180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2311180.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9840624.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3916 k5250298.exe 3916 k5250298.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 k5250298.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4100 2216 e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe 85 PID 2216 wrote to memory of 4100 2216 e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe 85 PID 2216 wrote to memory of 4100 2216 e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe 85 PID 4100 wrote to memory of 824 4100 y2311180.exe 86 PID 4100 wrote to memory of 824 4100 y2311180.exe 86 PID 4100 wrote to memory of 824 4100 y2311180.exe 86 PID 824 wrote to memory of 3916 824 y9840624.exe 87 PID 824 wrote to memory of 3916 824 y9840624.exe 87 PID 824 wrote to memory of 3916 824 y9840624.exe 87 PID 824 wrote to memory of 3144 824 y9840624.exe 101 PID 824 wrote to memory of 3144 824 y9840624.exe 101 PID 824 wrote to memory of 3144 824 y9840624.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe"C:\Users\Admin\AppData\Local\Temp\e75e53eebc6dce36c928faac8ec6e2bdb6c67873e28375184dce8a1a50e7b3c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2311180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2311180.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9840624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9840624.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5250298.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5250298.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4276450.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4276450.exe4⤵
- Executes dropped EXE
PID:3144
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
885KB
MD5b9ae085eb2163a4ae3e5d28a02852602
SHA1db414c148c5757c70c796ce65fb36f2744620c8b
SHA256e340cdb7306747d0a93759da2c386e6d4da642b739d78a769858396f42795f1f
SHA5128e11fbce864c543109bdc8a42db94721b5ecbbbcdb1e1579bb8baffb25d8ca91d8f14731d97080d115643a28cd478f55f27fb71d7728832ebb804c0c2a0ee4e5
-
Filesize
885KB
MD5b9ae085eb2163a4ae3e5d28a02852602
SHA1db414c148c5757c70c796ce65fb36f2744620c8b
SHA256e340cdb7306747d0a93759da2c386e6d4da642b739d78a769858396f42795f1f
SHA5128e11fbce864c543109bdc8a42db94721b5ecbbbcdb1e1579bb8baffb25d8ca91d8f14731d97080d115643a28cd478f55f27fb71d7728832ebb804c0c2a0ee4e5
-
Filesize
702KB
MD56fc0c6845c61413fff1ab32c93f417c7
SHA1835afcc822481bda2e443aabc889be1ffe02399c
SHA2563d713e4c99ecf83340f15db7b5c02ef24d12d8121bbc30f451a16908f02ff8cc
SHA512fdf101b4dd27b37ff155b841787763cc824fa3127e8ded19dfbbfdeda37a132b5a45931d99025c634f10685a43c97d33d8d5398e11570ad9db9194b5e0f5706a
-
Filesize
702KB
MD56fc0c6845c61413fff1ab32c93f417c7
SHA1835afcc822481bda2e443aabc889be1ffe02399c
SHA2563d713e4c99ecf83340f15db7b5c02ef24d12d8121bbc30f451a16908f02ff8cc
SHA512fdf101b4dd27b37ff155b841787763cc824fa3127e8ded19dfbbfdeda37a132b5a45931d99025c634f10685a43c97d33d8d5398e11570ad9db9194b5e0f5706a
-
Filesize
568KB
MD507dc0d8581c880f65309c813dd92396c
SHA11a59028d2788473c905aded0b049c7032c3d7f2a
SHA25687287b6312069d394712f763461b1238952c22c73e0df6ecd8c7e4fce87800e3
SHA512f1a6694319e85158970c2158eac20618a55e8ee07323837dcf261629e7efc1ffa53b7ece857d4ba1c0220d2e33d79a5461776e98d06b861199081d76c5a7ab6a
-
Filesize
568KB
MD507dc0d8581c880f65309c813dd92396c
SHA11a59028d2788473c905aded0b049c7032c3d7f2a
SHA25687287b6312069d394712f763461b1238952c22c73e0df6ecd8c7e4fce87800e3
SHA512f1a6694319e85158970c2158eac20618a55e8ee07323837dcf261629e7efc1ffa53b7ece857d4ba1c0220d2e33d79a5461776e98d06b861199081d76c5a7ab6a
-
Filesize
729KB
MD554a1e74ab2f49ddaa5c2f628615dccb0
SHA192ce2b533592ac0aaf1b91f978114a9e6da224ea
SHA25626ba6717a0712e6e30ae5b242a66b9f71bdbefd1b38fe7b05ab0f4b76fcd0b11
SHA51252ed4da963e103a5dc81eb6a32314af1e93e96746e075db1df762c1aa81b456289f9b580fc6748512bc20403cca1ae6180b669100678fe82702f9fc0754e64e0
-
Filesize
729KB
MD554a1e74ab2f49ddaa5c2f628615dccb0
SHA192ce2b533592ac0aaf1b91f978114a9e6da224ea
SHA25626ba6717a0712e6e30ae5b242a66b9f71bdbefd1b38fe7b05ab0f4b76fcd0b11
SHA51252ed4da963e103a5dc81eb6a32314af1e93e96746e075db1df762c1aa81b456289f9b580fc6748512bc20403cca1ae6180b669100678fe82702f9fc0754e64e0