Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe
Resource
win10v2004-20230703-en
General
-
Target
6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe
-
Size
1.0MB
-
MD5
9ace71edd231d0cd950980e2d32890a6
-
SHA1
4318b01918d1a734ab285de8c863cf6f8a0ee9da
-
SHA256
6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62
-
SHA512
262ebe4793bd9f6d7196124ad7e8142c24d2e11c348e910fba7fb265924d1d5c87cf63357cc0e497c855eecdcefc45b4ff687e0226af75982d2c3957ccb79ad2
-
SSDEEP
24576:4yrz6liMa3ygWnwbrT/BVl+zjj972P3s22cAwU3cP:/rztMSygWwXZ+jjR2kxcA1c
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2096-154-0x0000000000400000-0x000000000041B000-memory.dmp healer behavioral1/memory/2096-155-0x0000000000430000-0x000000000043A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6067716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6067716.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6067716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6067716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6067716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6067716.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4660 y1925265.exe 544 y6085425.exe 2096 k6067716.exe 3776 l9951531.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6067716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6067716.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1925265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1925265.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6085425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6085425.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2096 k6067716.exe 2096 k6067716.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 k6067716.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4660 1880 6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe 85 PID 1880 wrote to memory of 4660 1880 6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe 85 PID 1880 wrote to memory of 4660 1880 6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe 85 PID 4660 wrote to memory of 544 4660 y1925265.exe 87 PID 4660 wrote to memory of 544 4660 y1925265.exe 87 PID 4660 wrote to memory of 544 4660 y1925265.exe 87 PID 544 wrote to memory of 2096 544 y6085425.exe 88 PID 544 wrote to memory of 2096 544 y6085425.exe 88 PID 544 wrote to memory of 2096 544 y6085425.exe 88 PID 544 wrote to memory of 3776 544 y6085425.exe 99 PID 544 wrote to memory of 3776 544 y6085425.exe 99 PID 544 wrote to memory of 3776 544 y6085425.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe"C:\Users\Admin\AppData\Local\Temp\6d385ad27439451e9fd0ed12f03ac05698ae929dfcec9ef2436d208ffdda6c62.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1925265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1925265.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6085425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6085425.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6067716.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6067716.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9951531.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9951531.exe4⤵
- Executes dropped EXE
PID:3776
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
882KB
MD522660d28b18031280db853cff06c90a9
SHA1bd28db13dfd3ad2534b3459ec710f7bded8f130d
SHA2568cefa2110b90084bfccd8e3e9ae7113c1701db1a2e0612559d922893fa954c8e
SHA512ae3a143f03c136973d073311419df28ef5aaf52349fce651489d17d2a238661ee96e48b366951976389d7f8e21968ec117b1a4d58dc727e3e012fe729c926d1d
-
Filesize
882KB
MD522660d28b18031280db853cff06c90a9
SHA1bd28db13dfd3ad2534b3459ec710f7bded8f130d
SHA2568cefa2110b90084bfccd8e3e9ae7113c1701db1a2e0612559d922893fa954c8e
SHA512ae3a143f03c136973d073311419df28ef5aaf52349fce651489d17d2a238661ee96e48b366951976389d7f8e21968ec117b1a4d58dc727e3e012fe729c926d1d
-
Filesize
699KB
MD558c747d0709c4f0bc6f6e914a3172841
SHA12f5dbdb0b0f52a19948fab81a2443a42aa04da29
SHA2566d3246c74db19103cefedab223270055b75d63277b4a69252862e6d5387529f7
SHA512900f88b158f83ff465232bf4c0cf62acd1df12e7ef5c6625f720ac0b852f3fe14068e94a131235db1d9e6d1df7176a3a1f0d6ef4b6a78ab795c5bff3e22b0a3d
-
Filesize
699KB
MD558c747d0709c4f0bc6f6e914a3172841
SHA12f5dbdb0b0f52a19948fab81a2443a42aa04da29
SHA2566d3246c74db19103cefedab223270055b75d63277b4a69252862e6d5387529f7
SHA512900f88b158f83ff465232bf4c0cf62acd1df12e7ef5c6625f720ac0b852f3fe14068e94a131235db1d9e6d1df7176a3a1f0d6ef4b6a78ab795c5bff3e22b0a3d
-
Filesize
568KB
MD51fa5ee01e3ca2568c58be17b6ff9ab4f
SHA1e1a9375f6cbd4744f1581e54a3f6e8cbf79e2369
SHA256e51ee46929da35a45d4a00fa1d321dc58762f656ff4d00e1ca0b9784e260ba62
SHA5125df8554ea8045cb85840f08d4a6931ba0448c61bed1ae6ee6fe4f6190d395bfc374f25f756cace082c1bc674566fc87a71e76337421594f5807995456901f1fb
-
Filesize
568KB
MD51fa5ee01e3ca2568c58be17b6ff9ab4f
SHA1e1a9375f6cbd4744f1581e54a3f6e8cbf79e2369
SHA256e51ee46929da35a45d4a00fa1d321dc58762f656ff4d00e1ca0b9784e260ba62
SHA5125df8554ea8045cb85840f08d4a6931ba0448c61bed1ae6ee6fe4f6190d395bfc374f25f756cace082c1bc674566fc87a71e76337421594f5807995456901f1fb
-
Filesize
729KB
MD5e284fa6373deaafb2b96f047150374da
SHA151dc1c40230be3819bbe53b2186312e385877111
SHA2563f9454dd115e5b090330e2bd8c67768e9b79300f7aa789f107056b736ccb037b
SHA512925e188943d891452f8b9fb3622e8b3cccf45dfe7bd27d8a1cd76a90b891525c2b20e5d7df156cb7609be15646bc2263b8d9e312e73f00dbed8bf15dc24430dc
-
Filesize
729KB
MD5e284fa6373deaafb2b96f047150374da
SHA151dc1c40230be3819bbe53b2186312e385877111
SHA2563f9454dd115e5b090330e2bd8c67768e9b79300f7aa789f107056b736ccb037b
SHA512925e188943d891452f8b9fb3622e8b3cccf45dfe7bd27d8a1cd76a90b891525c2b20e5d7df156cb7609be15646bc2263b8d9e312e73f00dbed8bf15dc24430dc