Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe
Resource
win10v2004-20230703-en
General
-
Target
65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe
-
Size
1.6MB
-
MD5
62f7b478ecbf64ad2098582048dac2f5
-
SHA1
2ecb59b1b3eafac90e1c092a1b021cd0c2ccb40d
-
SHA256
65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa
-
SHA512
3ef340f793fc6bafe8ca53a1bcaf516c9ffb527f81b985d4dbe9fc08c05fecb635375bcf800c138deba70cd1f9e601ff8707ea6eb3a37c5432ea532357331985
-
SSDEEP
49152:fvkaLBcURUnf2WakIFYvX0qYdFz97uBXll:zBcUaf2jkpvSdT7GVl
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/4968-161-0x0000000000400000-0x000000000041B000-memory.dmp healer behavioral1/memory/4968-162-0x0000000000530000-0x000000000053A000-memory.dmp healer behavioral1/files/0x00060000000230b7-172.dat healer behavioral1/files/0x00060000000230b7-173.dat healer behavioral1/memory/880-174-0x0000000000540000-0x000000000054A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1131121.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7793375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7793375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7793375.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7793375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7793375.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7793375.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2396 v6335898.exe 4928 v4152780.exe 4320 v6483864.exe 4968 a1131121.exe 880 b7793375.exe 3552 c2710999.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1131121.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7793375.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6335898.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4152780.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4152780.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6483864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6483864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6335898.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4968 a1131121.exe 4968 a1131121.exe 880 b7793375.exe 880 b7793375.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4968 a1131121.exe Token: SeDebugPrivilege 880 b7793375.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3904 wrote to memory of 2396 3904 65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe 85 PID 3904 wrote to memory of 2396 3904 65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe 85 PID 3904 wrote to memory of 2396 3904 65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe 85 PID 2396 wrote to memory of 4928 2396 v6335898.exe 86 PID 2396 wrote to memory of 4928 2396 v6335898.exe 86 PID 2396 wrote to memory of 4928 2396 v6335898.exe 86 PID 4928 wrote to memory of 4320 4928 v4152780.exe 88 PID 4928 wrote to memory of 4320 4928 v4152780.exe 88 PID 4928 wrote to memory of 4320 4928 v4152780.exe 88 PID 4320 wrote to memory of 4968 4320 v6483864.exe 89 PID 4320 wrote to memory of 4968 4320 v6483864.exe 89 PID 4320 wrote to memory of 4968 4320 v6483864.exe 89 PID 4320 wrote to memory of 880 4320 v6483864.exe 95 PID 4320 wrote to memory of 880 4320 v6483864.exe 95 PID 4928 wrote to memory of 3552 4928 v4152780.exe 96 PID 4928 wrote to memory of 3552 4928 v4152780.exe 96 PID 4928 wrote to memory of 3552 4928 v4152780.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe"C:\Users\Admin\AppData\Local\Temp\65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exe4⤵
- Executes dropped EXE
PID:3552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.4MB
MD54529795a97051fd0a167aea74476be69
SHA132a366607ec5b11f5e345dabeee18e8628dec92e
SHA2568193cdcf54b3728ca29152e9a5f4b90c2011f366150133c95f33004919069594
SHA512aeeea902661b09b0062590c7b2f622f282cae4259c91403365e07c250744607c87dcca71ff90cf3743c8545fb1ba4c3ab684b80a1df33174a25f9a04a56495e0
-
Filesize
1.4MB
MD54529795a97051fd0a167aea74476be69
SHA132a366607ec5b11f5e345dabeee18e8628dec92e
SHA2568193cdcf54b3728ca29152e9a5f4b90c2011f366150133c95f33004919069594
SHA512aeeea902661b09b0062590c7b2f622f282cae4259c91403365e07c250744607c87dcca71ff90cf3743c8545fb1ba4c3ab684b80a1df33174a25f9a04a56495e0
-
Filesize
1.3MB
MD563b38449240a5e0c3de1d6d18dd51ff6
SHA1be2fa917a5ae22430cfa5651b812ca039f88a741
SHA256b8a35758ad5fa7291c94cebf2f2934480360ec671d30dae3bf5e37bddba7e91e
SHA512331cc7efb75a84d484caa6eaa654cb7f2f6a6fb66794e112cdad387ab3c6ae59b9f10c4f58daed30227950ef836ec9674c8e7efcea8005631bf254b1fb0d8d44
-
Filesize
1.3MB
MD563b38449240a5e0c3de1d6d18dd51ff6
SHA1be2fa917a5ae22430cfa5651b812ca039f88a741
SHA256b8a35758ad5fa7291c94cebf2f2934480360ec671d30dae3bf5e37bddba7e91e
SHA512331cc7efb75a84d484caa6eaa654cb7f2f6a6fb66794e112cdad387ab3c6ae59b9f10c4f58daed30227950ef836ec9674c8e7efcea8005631bf254b1fb0d8d44
-
Filesize
729KB
MD5ecccbc301e5704fc71c5da8ba533f1fc
SHA1a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1
SHA2566b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f
SHA512ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac
-
Filesize
729KB
MD5ecccbc301e5704fc71c5da8ba533f1fc
SHA1a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1
SHA2566b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f
SHA512ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac
-
Filesize
640KB
MD53b8f4f29934062a12f16be8f68c1129a
SHA1c40ff5746c7855627e918fd69b2112dc7e399652
SHA25678fcd5b781a1623d910ea58fcd5addb4437ff9404f48b1361ee3112500acb243
SHA512c45b1f089e4428d8c5021e2388c495129dc0d6bcce35a7405bd19c8a2bbb5bfc513ce0a1c7e3b453d191a926ba962948118f3e21fbba8a807061c3c91b11be74
-
Filesize
640KB
MD53b8f4f29934062a12f16be8f68c1129a
SHA1c40ff5746c7855627e918fd69b2112dc7e399652
SHA25678fcd5b781a1623d910ea58fcd5addb4437ff9404f48b1361ee3112500acb243
SHA512c45b1f089e4428d8c5021e2388c495129dc0d6bcce35a7405bd19c8a2bbb5bfc513ce0a1c7e3b453d191a926ba962948118f3e21fbba8a807061c3c91b11be74
-
Filesize
568KB
MD50552ef0d19d28032376d8e6e743736b3
SHA15e4dab54018b916b30afa87e818572b74002f344
SHA2563f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9
SHA51215f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74
-
Filesize
568KB
MD50552ef0d19d28032376d8e6e743736b3
SHA15e4dab54018b916b30afa87e818572b74002f344
SHA2563f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9
SHA51215f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91