Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 02:12
Static task
static1
Behavioral task
behavioral1
Sample
9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe
Resource
win10v2004-20230703-en
General
-
Target
9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe
-
Size
1.0MB
-
MD5
3ad5e82f3a7dbb1b6d146a8647cc9e77
-
SHA1
ddac6f30fb036bedb2c9c1c254b7eb9492cbbdd9
-
SHA256
9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702
-
SHA512
e2826c61d5a2ef619b103985be03c98ec7b58025209c5375f6a49b774a972942bb3f24c24f7af5bc2c7628944145782ae09babcbe0014dba38e2e31871010112
-
SSDEEP
24576:xy2cQxFkisUQlgyH5yCL44yyPn8Q0i+j8rRvkAwVPrw:k2JxFkN2P4/Pn8QF+j8lvkAwVP
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/3740-155-0x00000000004F0000-0x00000000004FA000-memory.dmp healer behavioral1/memory/3740-154-0x0000000000400000-0x000000000041B000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1277461.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 624 y2110325.exe 3008 y7219097.exe 3740 k1277461.exe 1660 l9679822.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1277461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1277461.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2110325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2110325.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7219097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7219097.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3740 k1277461.exe 3740 k1277461.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3740 k1277461.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3248 wrote to memory of 624 3248 9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe 85 PID 3248 wrote to memory of 624 3248 9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe 85 PID 3248 wrote to memory of 624 3248 9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe 85 PID 624 wrote to memory of 3008 624 y2110325.exe 86 PID 624 wrote to memory of 3008 624 y2110325.exe 86 PID 624 wrote to memory of 3008 624 y2110325.exe 86 PID 3008 wrote to memory of 3740 3008 y7219097.exe 87 PID 3008 wrote to memory of 3740 3008 y7219097.exe 87 PID 3008 wrote to memory of 3740 3008 y7219097.exe 87 PID 3008 wrote to memory of 1660 3008 y7219097.exe 99 PID 3008 wrote to memory of 1660 3008 y7219097.exe 99 PID 3008 wrote to memory of 1660 3008 y7219097.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe"C:\Users\Admin\AppData\Local\Temp\9c6ad923333a59228d71f4d9c3215a79f3b11c0428e6cc81373b9582c1f35702.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2110325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2110325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7219097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7219097.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1277461.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1277461.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9679822.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9679822.exe4⤵
- Executes dropped EXE
PID:1660
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
885KB
MD5ce5bb595c05ad2d491666d1cfd347359
SHA1dc451e7fc06892758cd3ad36ae24931cc7d4c97a
SHA256f97a4049a6d6fd2cfbc031f1614f0e362cc97c59cd841217cb4eba8f141435eb
SHA5123d38ccdc2dc6726bfe08202360b880a49101998c6b05275df92bbb81eee9321bd0f5676b7950901ec7b18f5dc039a1c44ff036a0d40f0be0722f1f5424119cec
-
Filesize
885KB
MD5ce5bb595c05ad2d491666d1cfd347359
SHA1dc451e7fc06892758cd3ad36ae24931cc7d4c97a
SHA256f97a4049a6d6fd2cfbc031f1614f0e362cc97c59cd841217cb4eba8f141435eb
SHA5123d38ccdc2dc6726bfe08202360b880a49101998c6b05275df92bbb81eee9321bd0f5676b7950901ec7b18f5dc039a1c44ff036a0d40f0be0722f1f5424119cec
-
Filesize
701KB
MD589487fc38eb8aca4d0f1167dc45b0f89
SHA196f67acb6092db10695bc4fdee27f358e698df17
SHA25643daeee4f6c7186e558cf7763675ed6d517b6a7808561cb0abe3e510290a7d0c
SHA51268e21d784fd2879686ad2c9e3eca3aab178f90eb1f519a4a4c71fe721f92b5aeda95b38c65ecf85398eaab50d8a836fc7861ed9872155bf2ee8cced40354827f
-
Filesize
701KB
MD589487fc38eb8aca4d0f1167dc45b0f89
SHA196f67acb6092db10695bc4fdee27f358e698df17
SHA25643daeee4f6c7186e558cf7763675ed6d517b6a7808561cb0abe3e510290a7d0c
SHA51268e21d784fd2879686ad2c9e3eca3aab178f90eb1f519a4a4c71fe721f92b5aeda95b38c65ecf85398eaab50d8a836fc7861ed9872155bf2ee8cced40354827f
-
Filesize
568KB
MD54316bdf03728e9a8824795d20802a4e9
SHA1243d019081fda4e30d3cbcce130240d59ad6bb79
SHA256e4044b4db4835d29a0a537b0ea60e9f82a5b447520b15a1561b23a340e3df6c9
SHA5123dcf5d931fc19ebe564f0888befe2d13f05c775a9b00766d64adbd0a22b528994e4feb0ef9855c2cecaf10d7874e273d3f3c6cda293925f79b378a161b4c9e56
-
Filesize
568KB
MD54316bdf03728e9a8824795d20802a4e9
SHA1243d019081fda4e30d3cbcce130240d59ad6bb79
SHA256e4044b4db4835d29a0a537b0ea60e9f82a5b447520b15a1561b23a340e3df6c9
SHA5123dcf5d931fc19ebe564f0888befe2d13f05c775a9b00766d64adbd0a22b528994e4feb0ef9855c2cecaf10d7874e273d3f3c6cda293925f79b378a161b4c9e56
-
Filesize
729KB
MD5dee8c80ac6f5419e9c3aecc5763ece3e
SHA1146832789d1e28dc9dff6df2319ed98eb4daea16
SHA25607b3ff6e9dbbb5216da47d244d26fec3529a867bd0baf78002dea37cdb8f2519
SHA5126d1bc2a853a70f84995c1d36a059fcb791172762d342404dacff70cb4f91f9785e229b17c450f9691c40a60f62149ba86dacf2f7e952b7d52d35beb94fa338c7
-
Filesize
729KB
MD5dee8c80ac6f5419e9c3aecc5763ece3e
SHA1146832789d1e28dc9dff6df2319ed98eb4daea16
SHA25607b3ff6e9dbbb5216da47d244d26fec3529a867bd0baf78002dea37cdb8f2519
SHA5126d1bc2a853a70f84995c1d36a059fcb791172762d342404dacff70cb4f91f9785e229b17c450f9691c40a60f62149ba86dacf2f7e952b7d52d35beb94fa338c7