Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2023 23:41
Static task
static1
Behavioral task
behavioral1
Sample
4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe
Resource
win10v2004-20230703-en
General
-
Target
4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe
-
Size
388KB
-
MD5
c41e7a606209a663480235a4de8e23da
-
SHA1
58edfca9ee2e14e7cc17f68f85af8a5e73e84ce1
-
SHA256
4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf
-
SHA512
0d26a65ee4c431221d47078d9ce55dfcbedc709e0cb9033db86339802377706432cfc49713e9eab4fe7ee0268047fe3c5cab642622e2d0e073e65ab709bd0f60
-
SSDEEP
12288:SMr9y90oq3fLDAnSdctvKZLZO5G5mA4T:/y9cfLEnSmZKZb57s
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023280-145.dat healer behavioral1/files/0x0008000000023280-146.dat healer behavioral1/memory/1600-147-0x0000000000460000-0x000000000046A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p6016279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p6016279.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p6016279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p6016279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p6016279.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p6016279.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4724 z7361623.exe 1600 p6016279.exe 2184 r6035712.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p6016279.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7361623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7361623.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4360 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 p6016279.exe 1600 p6016279.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 p6016279.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4724 4172 4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe 86 PID 4172 wrote to memory of 4724 4172 4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe 86 PID 4172 wrote to memory of 4724 4172 4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe 86 PID 4724 wrote to memory of 1600 4724 z7361623.exe 87 PID 4724 wrote to memory of 1600 4724 z7361623.exe 87 PID 4724 wrote to memory of 2184 4724 z7361623.exe 92 PID 4724 wrote to memory of 2184 4724 z7361623.exe 92 PID 4724 wrote to memory of 2184 4724 z7361623.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe"C:\Users\Admin\AppData\Local\Temp\4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exe3⤵
- Executes dropped EXE
PID:2184
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5dd893a6c42d6a057e46968af0755d3e5
SHA14c4788974b6a9dd278924e03a0e4118695de9242
SHA256754998efa966f18bbfc6f844a4f6f18b57da6dd8213b0d8123376417452161ba
SHA51280810d5b7741ed23fa73e1face4bc9dd78c9ebde930f01958ab3223201a066346f79e6f2c363c2a1dc50343f50ac8e8885fe3c30c71c6d9e67876008aecb8e51
-
Filesize
206KB
MD5dd893a6c42d6a057e46968af0755d3e5
SHA14c4788974b6a9dd278924e03a0e4118695de9242
SHA256754998efa966f18bbfc6f844a4f6f18b57da6dd8213b0d8123376417452161ba
SHA51280810d5b7741ed23fa73e1face4bc9dd78c9ebde930f01958ab3223201a066346f79e6f2c363c2a1dc50343f50ac8e8885fe3c30c71c6d9e67876008aecb8e51
-
Filesize
13KB
MD550d726d53175bcd47ed344a3e0ad68ca
SHA152c24c53c292b79cea0b53ce2d5a45801975ef87
SHA25600b1fdd8427a2e6af082ce1156a7cdc2acdf6d24cd1b9cfdc255f88e3327c154
SHA512b9cba9fa8bb8143d5f48166e6e2f9ef981175450a7c3f12e74d496913f1002db7d5fbcfab475bf9318ccf1d2e76556cb5ae59ce7317474f1fae696f99e2dcc67
-
Filesize
13KB
MD550d726d53175bcd47ed344a3e0ad68ca
SHA152c24c53c292b79cea0b53ce2d5a45801975ef87
SHA25600b1fdd8427a2e6af082ce1156a7cdc2acdf6d24cd1b9cfdc255f88e3327c154
SHA512b9cba9fa8bb8143d5f48166e6e2f9ef981175450a7c3f12e74d496913f1002db7d5fbcfab475bf9318ccf1d2e76556cb5ae59ce7317474f1fae696f99e2dcc67
-
Filesize
175KB
MD5f5459adae3f9001d7bb87dce48d4f7ad
SHA16682f18d18bc51464eee9c2e21fbed213afb8bbe
SHA256be107baf51f46b0f4f0a287653866989c4429016fb541f41b092f169aefa8b39
SHA51271e765cc3bb860f783f6d2a682bee5dd25c12b1a1784b27bf9e9a909c52ebcc05a234a88b6a0afe0bbea872e0c13cb856eb71a24a6469bff394cc6f5af6615ff
-
Filesize
175KB
MD5f5459adae3f9001d7bb87dce48d4f7ad
SHA16682f18d18bc51464eee9c2e21fbed213afb8bbe
SHA256be107baf51f46b0f4f0a287653866989c4429016fb541f41b092f169aefa8b39
SHA51271e765cc3bb860f783f6d2a682bee5dd25c12b1a1784b27bf9e9a909c52ebcc05a234a88b6a0afe0bbea872e0c13cb856eb71a24a6469bff394cc6f5af6615ff