Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
1.6MB
-
MD5
fa48057cd1efdd46fe22c6a7c5992699
-
SHA1
1a34d112cc100e990a8eeb10eef51e0c45cbbe73
-
SHA256
f622870212115bf828ff64c1cd63083f1e63456d7070f35cabdaf5377d3b3780
-
SHA512
aa47b5b1173ab68346c9b6c1c9dbb3f265fccf8c0f5ddf39442741aa66ca71eb8a37bbbc95cf3b57891105c06095ae545756547dbf3f301c69027a6dffed9620
-
SSDEEP
49152:LR++MJvkJo0wgJWi90Ru8HXvyWIMhg/pEdjT:t++MJ2PJP9ZSvtIyUpS
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral2/memory/5076-161-0x0000000000400000-0x000000000041B000-memory.dmp healer behavioral2/memory/5076-162-0x0000000000460000-0x000000000046A000-memory.dmp healer behavioral2/files/0x000700000002322d-172.dat healer behavioral2/files/0x000700000002322d-173.dat healer behavioral2/memory/4028-174-0x0000000000080000-0x000000000008A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0568115.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8307622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8307622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8307622.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8307622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8307622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8307622.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3440 v3444578.exe 3604 v2119553.exe 4204 v8870407.exe 5076 a0568115.exe 4028 b8307622.exe 3416 c4151506.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0568115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8307622.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3444578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3444578.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2119553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2119553.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8870407.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8870407.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5076 a0568115.exe 5076 a0568115.exe 4028 b8307622.exe 4028 b8307622.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5076 a0568115.exe Token: SeDebugPrivilege 4028 b8307622.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3440 4820 file.exe 86 PID 4820 wrote to memory of 3440 4820 file.exe 86 PID 4820 wrote to memory of 3440 4820 file.exe 86 PID 3440 wrote to memory of 3604 3440 v3444578.exe 87 PID 3440 wrote to memory of 3604 3440 v3444578.exe 87 PID 3440 wrote to memory of 3604 3440 v3444578.exe 87 PID 3604 wrote to memory of 4204 3604 v2119553.exe 88 PID 3604 wrote to memory of 4204 3604 v2119553.exe 88 PID 3604 wrote to memory of 4204 3604 v2119553.exe 88 PID 4204 wrote to memory of 5076 4204 v8870407.exe 89 PID 4204 wrote to memory of 5076 4204 v8870407.exe 89 PID 4204 wrote to memory of 5076 4204 v8870407.exe 89 PID 4204 wrote to memory of 4028 4204 v8870407.exe 95 PID 4204 wrote to memory of 4028 4204 v8870407.exe 95 PID 3604 wrote to memory of 3416 3604 v2119553.exe 96 PID 3604 wrote to memory of 3416 3604 v2119553.exe 96 PID 3604 wrote to memory of 3416 3604 v2119553.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3444578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3444578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2119553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2119553.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8870407.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8870407.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0568115.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0568115.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8307622.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8307622.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4151506.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4151506.exe4⤵
- Executes dropped EXE
PID:3416
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.4MB
MD5d2533399ab3096c16f5f05d3a01c7190
SHA19e11d949e06c2a39941688afcd2fe5f3146ee0a8
SHA256fa9a6cfe544a802e2f53447ecf9bb16a669f92949de7fcd6f7fd35fa01ee76cb
SHA51246223ba3112de0978db07af565d15c0ca51c918c8db6d6971ddbeadee95bcf37c69457455eb1bed0d8c2cfd21c94b461f98a90b618d4d66f91c6ad0393ab4662
-
Filesize
1.4MB
MD5d2533399ab3096c16f5f05d3a01c7190
SHA19e11d949e06c2a39941688afcd2fe5f3146ee0a8
SHA256fa9a6cfe544a802e2f53447ecf9bb16a669f92949de7fcd6f7fd35fa01ee76cb
SHA51246223ba3112de0978db07af565d15c0ca51c918c8db6d6971ddbeadee95bcf37c69457455eb1bed0d8c2cfd21c94b461f98a90b618d4d66f91c6ad0393ab4662
-
Filesize
1.3MB
MD5da0eacecb548f2bd5baf19808b3b4470
SHA1460e2736931b01d550bea0094ba405cea10633a6
SHA256af2d2a5cb9962c55b3b191e53b3bd6c9a0d1879a7eb3bc0abd6d4f4912f1c2d1
SHA512b1b1cabd8c65fa4cec52baba4f8cf02d8e927db10aa240b12af84c5c2491c13b15b89cfb0d40e23ba85d15e42497863f510faf7b37e522ad3f08b0fed3a7f161
-
Filesize
1.3MB
MD5da0eacecb548f2bd5baf19808b3b4470
SHA1460e2736931b01d550bea0094ba405cea10633a6
SHA256af2d2a5cb9962c55b3b191e53b3bd6c9a0d1879a7eb3bc0abd6d4f4912f1c2d1
SHA512b1b1cabd8c65fa4cec52baba4f8cf02d8e927db10aa240b12af84c5c2491c13b15b89cfb0d40e23ba85d15e42497863f510faf7b37e522ad3f08b0fed3a7f161
-
Filesize
729KB
MD5ecccbc301e5704fc71c5da8ba533f1fc
SHA1a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1
SHA2566b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f
SHA512ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac
-
Filesize
729KB
MD5ecccbc301e5704fc71c5da8ba533f1fc
SHA1a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1
SHA2566b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f
SHA512ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac
-
Filesize
640KB
MD5f723a639b8d68bd58d8a3704254431b9
SHA1e9d576e24457d8fd6856eeb2e5fbb8da7b9874c3
SHA256f0bdc1f9d9ddc08e4d4c1167ebb9f974a586ebc2460ede2c26fef1b5c5f88490
SHA51249e24f2da30e63ab626a6320e56a0f7c10cfff2a65b13b6cfc45a3bb00936d7b44d6c7fb1f5c8102468dfff5670243034ef379a8f75c10e65e12c67e4043770a
-
Filesize
640KB
MD5f723a639b8d68bd58d8a3704254431b9
SHA1e9d576e24457d8fd6856eeb2e5fbb8da7b9874c3
SHA256f0bdc1f9d9ddc08e4d4c1167ebb9f974a586ebc2460ede2c26fef1b5c5f88490
SHA51249e24f2da30e63ab626a6320e56a0f7c10cfff2a65b13b6cfc45a3bb00936d7b44d6c7fb1f5c8102468dfff5670243034ef379a8f75c10e65e12c67e4043770a
-
Filesize
568KB
MD50552ef0d19d28032376d8e6e743736b3
SHA15e4dab54018b916b30afa87e818572b74002f344
SHA2563f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9
SHA51215f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74
-
Filesize
568KB
MD50552ef0d19d28032376d8e6e743736b3
SHA15e4dab54018b916b30afa87e818572b74002f344
SHA2563f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9
SHA51215f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91