Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 07:26
Static task
static1
Behavioral task
behavioral1
Sample
4b5ac01b9c3209fb0bcddbad0986bb4a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4b5ac01b9c3209fb0bcddbad0986bb4a.exe
Resource
win10v2004-20230703-en
General
-
Target
4b5ac01b9c3209fb0bcddbad0986bb4a.exe
-
Size
1.2MB
-
MD5
4b5ac01b9c3209fb0bcddbad0986bb4a
-
SHA1
65f2ae841ced39a952231d5c948a03656722e518
-
SHA256
5de64d5ab56bad52329947e26f8110fed2348f921e93665a3999fc44153d6ef8
-
SHA512
cc70c77b2ba9c02593ba6053a98b31cb024fcf0558df0c33baaca4e814c1f71e83829d653640f229a954c88299bb463edbb64b2c9b1d304bda6d281c2df75c0c
-
SSDEEP
24576:kyYAb9wJ23e65odkfOhx+JdiKF6aLxOvTv/K1xBha1/jSZ6ZLBv:zX9wZMrlam7s
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral2/memory/1036-176-0x0000000000490000-0x00000000004CE000-memory.dmp healer behavioral2/files/0x0006000000023275-183.dat healer behavioral2/files/0x0006000000023275-184.dat healer behavioral2/memory/3920-185-0x00000000003F0000-0x00000000003FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3001931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3001931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3001931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3001931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3001931.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4255037.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3001931.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3832 v8319158.exe 4396 v0009867.exe 988 v5827570.exe 4468 v0780615.exe 1036 a4255037.exe 3920 b3001931.exe 5104 c8893916.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4255037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b3001931.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8319158.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0009867.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5827570.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0780615.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4b5ac01b9c3209fb0bcddbad0986bb4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b5ac01b9c3209fb0bcddbad0986bb4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8319158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0009867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5827570.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0780615.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1036 a4255037.exe 1036 a4255037.exe 3920 b3001931.exe 3920 b3001931.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1036 a4255037.exe Token: SeDebugPrivilege 3920 b3001931.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3832 4748 4b5ac01b9c3209fb0bcddbad0986bb4a.exe 86 PID 4748 wrote to memory of 3832 4748 4b5ac01b9c3209fb0bcddbad0986bb4a.exe 86 PID 4748 wrote to memory of 3832 4748 4b5ac01b9c3209fb0bcddbad0986bb4a.exe 86 PID 3832 wrote to memory of 4396 3832 v8319158.exe 87 PID 3832 wrote to memory of 4396 3832 v8319158.exe 87 PID 3832 wrote to memory of 4396 3832 v8319158.exe 87 PID 4396 wrote to memory of 988 4396 v0009867.exe 88 PID 4396 wrote to memory of 988 4396 v0009867.exe 88 PID 4396 wrote to memory of 988 4396 v0009867.exe 88 PID 988 wrote to memory of 4468 988 v5827570.exe 89 PID 988 wrote to memory of 4468 988 v5827570.exe 89 PID 988 wrote to memory of 4468 988 v5827570.exe 89 PID 4468 wrote to memory of 1036 4468 v0780615.exe 90 PID 4468 wrote to memory of 1036 4468 v0780615.exe 90 PID 4468 wrote to memory of 1036 4468 v0780615.exe 90 PID 4468 wrote to memory of 3920 4468 v0780615.exe 98 PID 4468 wrote to memory of 3920 4468 v0780615.exe 98 PID 988 wrote to memory of 5104 988 v5827570.exe 99 PID 988 wrote to memory of 5104 988 v5827570.exe 99 PID 988 wrote to memory of 5104 988 v5827570.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5ac01b9c3209fb0bcddbad0986bb4a.exe"C:\Users\Admin\AppData\Local\Temp\4b5ac01b9c3209fb0bcddbad0986bb4a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exe5⤵
- Executes dropped EXE
PID:5104
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.0MB
MD52554de4f69c715793d302d620a40eb81
SHA1b63ebe514ed1ad9f39a6d40d713e7d43cb58ce51
SHA2568b650875b3a4e3796586bf7368f52b1001d38f58eddd981b8e4e198f111c6292
SHA5126d3cde4ea1a9e51c7cc55d176d13e3714d5d47e0a5547ef21b1feac9bae55a0a80658abad6421d6941de5275f6e66562161de2022aa42a4525321e844f64b0f6
-
Filesize
1.0MB
MD52554de4f69c715793d302d620a40eb81
SHA1b63ebe514ed1ad9f39a6d40d713e7d43cb58ce51
SHA2568b650875b3a4e3796586bf7368f52b1001d38f58eddd981b8e4e198f111c6292
SHA5126d3cde4ea1a9e51c7cc55d176d13e3714d5d47e0a5547ef21b1feac9bae55a0a80658abad6421d6941de5275f6e66562161de2022aa42a4525321e844f64b0f6
-
Filesize
905KB
MD5bcafa44db7440eb1cd51c2ac880cfae8
SHA157581738292688e4c38d01fd2f29a454c38bcae2
SHA25653f95ffb4caa69ee7526493140fe6b8ee4aa96563a68d2c920bdd78ae1804277
SHA512b19e9c7da53a3f7369d3c5acf24959055277751e892f1e9d833fcc599e9b0eda0716ad5b917d26b1b7c98af432152b5e374478e69a412010fd010aa3f5b7a883
-
Filesize
905KB
MD5bcafa44db7440eb1cd51c2ac880cfae8
SHA157581738292688e4c38d01fd2f29a454c38bcae2
SHA25653f95ffb4caa69ee7526493140fe6b8ee4aa96563a68d2c920bdd78ae1804277
SHA512b19e9c7da53a3f7369d3c5acf24959055277751e892f1e9d833fcc599e9b0eda0716ad5b917d26b1b7c98af432152b5e374478e69a412010fd010aa3f5b7a883
-
Filesize
722KB
MD5c53b142269d1d9b131f279236444096e
SHA1b795a3d640b62851405b7d86c3c252f3521edc38
SHA25608dcb4581247485c99b5f3f288d6020accf80b831b030185812f7822e9420f51
SHA5124c235ff91b6f8482c1b18d99c452802b9dda423604c018b086d67c10e11434bf6f298d76861c03bb605b44ab95f498e0fb483cbc568e98222acd1d71a133a78e
-
Filesize
722KB
MD5c53b142269d1d9b131f279236444096e
SHA1b795a3d640b62851405b7d86c3c252f3521edc38
SHA25608dcb4581247485c99b5f3f288d6020accf80b831b030185812f7822e9420f51
SHA5124c235ff91b6f8482c1b18d99c452802b9dda423604c018b086d67c10e11434bf6f298d76861c03bb605b44ab95f498e0fb483cbc568e98222acd1d71a133a78e
-
Filesize
491KB
MD55259220ec6eae70ea9bee0a661a2a17f
SHA1e3b06b482922efed206c6e353afbfc6c04df9345
SHA25652a95a81b52fdb27422a7c78688e6389ec572f0425bd4361e2c382f0fb6f7efb
SHA5129c91b108d7b75432e0b6c6f43e0a32e9d55162c3bd4e1d0a9ed2b02584264ed4f703480907eab68c3e024d100a705801f3209d9059dfaa6fd55413c45e6cf22e
-
Filesize
491KB
MD55259220ec6eae70ea9bee0a661a2a17f
SHA1e3b06b482922efed206c6e353afbfc6c04df9345
SHA25652a95a81b52fdb27422a7c78688e6389ec572f0425bd4361e2c382f0fb6f7efb
SHA5129c91b108d7b75432e0b6c6f43e0a32e9d55162c3bd4e1d0a9ed2b02584264ed4f703480907eab68c3e024d100a705801f3209d9059dfaa6fd55413c45e6cf22e
-
Filesize
323KB
MD56b3eccbb4d12a45064c6c58f6d77771e
SHA114ea9a8e9d5c121dd0d3a2e5a421759ee28a14b6
SHA256856e08dc44de6d9ba71d82832cd0f11e057c57bbb21b6480e46cd7117a0f2235
SHA512c24870559328e301ed635996e56aa0d0836845ed4de19e6e8f8409258016cf3de8d86b4af4911d84698510897727c79223b7f52a41e451560cd2f263b4acb220
-
Filesize
323KB
MD56b3eccbb4d12a45064c6c58f6d77771e
SHA114ea9a8e9d5c121dd0d3a2e5a421759ee28a14b6
SHA256856e08dc44de6d9ba71d82832cd0f11e057c57bbb21b6480e46cd7117a0f2235
SHA512c24870559328e301ed635996e56aa0d0836845ed4de19e6e8f8409258016cf3de8d86b4af4911d84698510897727c79223b7f52a41e451560cd2f263b4acb220
-
Filesize
292KB
MD5a62d98b28392beea67d7698beb4de235
SHA105d00045d911869426146752ccd7fdc9a2b5dbbb
SHA2567a63b595dd620367a28894802fe55e3497a26f49c074542db5587a0b193f2ae8
SHA512aecdf139061559195ce1abfed46a11924e3615a65cb84e6d2a5730ce50e12776fe1b2c2e0a0c39c4da383728fdddc473e102bb88d81e6b17e46318794c925080
-
Filesize
292KB
MD5a62d98b28392beea67d7698beb4de235
SHA105d00045d911869426146752ccd7fdc9a2b5dbbb
SHA2567a63b595dd620367a28894802fe55e3497a26f49c074542db5587a0b193f2ae8
SHA512aecdf139061559195ce1abfed46a11924e3615a65cb84e6d2a5730ce50e12776fe1b2c2e0a0c39c4da383728fdddc473e102bb88d81e6b17e46318794c925080
-
Filesize
11KB
MD5b42bc94c173371cb29363bcec84ea891
SHA11186105182733ed6be1d1821c87c35dcf5630492
SHA256222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97
SHA51247595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6
-
Filesize
11KB
MD5b42bc94c173371cb29363bcec84ea891
SHA11186105182733ed6be1d1821c87c35dcf5630492
SHA256222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97
SHA51247595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6