Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 02:09
Static task
static1
Behavioral task
behavioral1
Sample
5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe
Resource
win10v2004-20230703-en
General
-
Target
5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe
-
Size
1.0MB
-
MD5
be45be16fad4076558fd205a0488ea94
-
SHA1
32391c45d423601da805187a50f7bcfc65f0e665
-
SHA256
5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e
-
SHA512
d3def8cd19c40ffb0354aee030aafc07b49fb947f5628d5f88ef99ad578df719e256d3801c3ff989a019177c85f9976135b06bd11996ef1d84b27d41342e3722
-
SSDEEP
24576:Fy1urNNX55bhJo9JwLkOjwQXIxyT5SWehFTqZpY9mSf+cf:gwrNpbhJl6yT56FTqvY9l+
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/216-169-0x0000000000560000-0x000000000059E000-memory.dmp healer behavioral2/files/0x0006000000023247-176.dat healer behavioral2/files/0x0006000000023247-177.dat healer behavioral2/memory/2148-178-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9586554.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8229368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8229368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8229368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8229368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8229368.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8229368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9586554.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1332 v8231498.exe 760 v5975842.exe 1320 v8767608.exe 216 a9586554.exe 2148 b8229368.exe 4784 c1391808.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9586554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8229368.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8231498.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5975842.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5975842.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8767608.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8767608.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8231498.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 216 a9586554.exe 216 a9586554.exe 2148 b8229368.exe 2148 b8229368.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 216 a9586554.exe Token: SeDebugPrivilege 2148 b8229368.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1332 4336 5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe 86 PID 4336 wrote to memory of 1332 4336 5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe 86 PID 4336 wrote to memory of 1332 4336 5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe 86 PID 1332 wrote to memory of 760 1332 v8231498.exe 87 PID 1332 wrote to memory of 760 1332 v8231498.exe 87 PID 1332 wrote to memory of 760 1332 v8231498.exe 87 PID 760 wrote to memory of 1320 760 v5975842.exe 88 PID 760 wrote to memory of 1320 760 v5975842.exe 88 PID 760 wrote to memory of 1320 760 v5975842.exe 88 PID 1320 wrote to memory of 216 1320 v8767608.exe 89 PID 1320 wrote to memory of 216 1320 v8767608.exe 89 PID 1320 wrote to memory of 216 1320 v8767608.exe 89 PID 1320 wrote to memory of 2148 1320 v8767608.exe 95 PID 1320 wrote to memory of 2148 1320 v8767608.exe 95 PID 760 wrote to memory of 4784 760 v5975842.exe 96 PID 760 wrote to memory of 4784 760 v5975842.exe 96 PID 760 wrote to memory of 4784 760 v5975842.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe"C:\Users\Admin\AppData\Local\Temp\5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exe4⤵
- Executes dropped EXE
PID:4784
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
908KB
MD57da10baea42b6ad3a0f29ba9556785bf
SHA1563d63699736e79b4ed6a8ec5a33d3dd675d3358
SHA256aea2526dc083c98ca6b34f421929283edf6a7d7e8e3cd010af39cfe42a659c8d
SHA512650625661a711f10ad7c2d22256e78b758067c8d900183853fb865071974f391684773f13ee5b6d7ad1763d6b13e0ae53ff0c8ec5633f6c87f91d1763ac1290b
-
Filesize
908KB
MD57da10baea42b6ad3a0f29ba9556785bf
SHA1563d63699736e79b4ed6a8ec5a33d3dd675d3358
SHA256aea2526dc083c98ca6b34f421929283edf6a7d7e8e3cd010af39cfe42a659c8d
SHA512650625661a711f10ad7c2d22256e78b758067c8d900183853fb865071974f391684773f13ee5b6d7ad1763d6b13e0ae53ff0c8ec5633f6c87f91d1763ac1290b
-
Filesize
725KB
MD571957528baae993b1641ee223ee2774b
SHA139bd4bc03e866253508a192c06ea2c2769802b70
SHA256446d83382fcf57da6c2d413035519d2b858f27e6323ce5663d2cebed095a6a7e
SHA51282584c6a8bb62cc9f6eb760f8e7196af731174bf9659649be6ae9b6eaf7e39172843c312fa7c7dfe8554430213c71bbdbde39353b5065b924f9cb7fb8e88ba02
-
Filesize
725KB
MD571957528baae993b1641ee223ee2774b
SHA139bd4bc03e866253508a192c06ea2c2769802b70
SHA256446d83382fcf57da6c2d413035519d2b858f27e6323ce5663d2cebed095a6a7e
SHA51282584c6a8bb62cc9f6eb760f8e7196af731174bf9659649be6ae9b6eaf7e39172843c312fa7c7dfe8554430213c71bbdbde39353b5065b924f9cb7fb8e88ba02
-
Filesize
492KB
MD589687151e74829c67e476f4ba00c11a6
SHA1e741203b32de50840b90861ad47e26a32c9e62f2
SHA2561a56f5014451cf43a25675759b26bd1a3f83c212bfcb81211a87dd0bebc5a608
SHA51231ca138e78d52a8ead71509acb2a723c61896e6645c43e205cc4e3a320741c71fac7fb0e0b0bad50f351e7c9caa7ea57cb3c8cb1ae5bbef823972a8d1dd997c7
-
Filesize
492KB
MD589687151e74829c67e476f4ba00c11a6
SHA1e741203b32de50840b90861ad47e26a32c9e62f2
SHA2561a56f5014451cf43a25675759b26bd1a3f83c212bfcb81211a87dd0bebc5a608
SHA51231ca138e78d52a8ead71509acb2a723c61896e6645c43e205cc4e3a320741c71fac7fb0e0b0bad50f351e7c9caa7ea57cb3c8cb1ae5bbef823972a8d1dd997c7
-
Filesize
325KB
MD595b9bc86e89f7d03faa3647558ade3a8
SHA1df9b5e4c873383c6c90e64dd876a8aa78913783d
SHA2566d6ceb69521c9428046213af9e53033156dcac00adfb52d51acbb126913e2149
SHA5124dc78d2a0b904c199983e404812026b126ec78b83919cf4299dfdc7b2c2c94d92c2d1faf2504d413a1c9db24aa8bebbb59272488ac6065a87ba3ab79c897ab54
-
Filesize
325KB
MD595b9bc86e89f7d03faa3647558ade3a8
SHA1df9b5e4c873383c6c90e64dd876a8aa78913783d
SHA2566d6ceb69521c9428046213af9e53033156dcac00adfb52d51acbb126913e2149
SHA5124dc78d2a0b904c199983e404812026b126ec78b83919cf4299dfdc7b2c2c94d92c2d1faf2504d413a1c9db24aa8bebbb59272488ac6065a87ba3ab79c897ab54
-
Filesize
294KB
MD5270c0a34d0fa2f168743874e8b8a0e43
SHA19c3acc955ed84ab55f3062d0cdfee1dc0a66529e
SHA256183c9a06508edd7185e50d3ef0e55afd850f14de3e82bfdd0a6e1e27e9e5c987
SHA51296c5a5900c46e9c3144cd9bba497dc556461e8612f246334697f2c7d4f058e73cce4bd2e1cbef7e90908f45106e8c56b154cdcd2b362d77eed44a186762e697b
-
Filesize
294KB
MD5270c0a34d0fa2f168743874e8b8a0e43
SHA19c3acc955ed84ab55f3062d0cdfee1dc0a66529e
SHA256183c9a06508edd7185e50d3ef0e55afd850f14de3e82bfdd0a6e1e27e9e5c987
SHA51296c5a5900c46e9c3144cd9bba497dc556461e8612f246334697f2c7d4f058e73cce4bd2e1cbef7e90908f45106e8c56b154cdcd2b362d77eed44a186762e697b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91