Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/07/2023, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe
Resource
win10-20230703-en
General
-
Target
83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe
-
Size
389KB
-
MD5
c139fbd1b4725c51d2e4067096f4c83b
-
SHA1
c2f984b1193b36ac7ecf78eeff9d69e230ef31e7
-
SHA256
83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b
-
SHA512
02876c1cf94625ff396adb18bd5a61c55a2a2f21e52a50f43217a8d7432bddaa1e63985614180b0a7e4de6af034730bb1387bf8c1b529a06839af2e3c7782407
-
SSDEEP
6144:KNy+bnr+Np0yN90QE4d17xtq2+xXsGn3F/b1Wj8Xlrp:rMr5y90OdNxuxbVT/D
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afd1-130.dat healer behavioral1/files/0x000700000001afd1-131.dat healer behavioral1/memory/4184-132-0x0000000000430000-0x000000000043A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p1135636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p1135636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p1135636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p1135636.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p1135636.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2904 z7186535.exe 4184 p1135636.exe 3152 r0394142.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p1135636.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7186535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7186535.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4184 p1135636.exe 4184 p1135636.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4184 p1135636.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2904 4132 83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe 70 PID 4132 wrote to memory of 2904 4132 83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe 70 PID 4132 wrote to memory of 2904 4132 83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe 70 PID 2904 wrote to memory of 4184 2904 z7186535.exe 71 PID 2904 wrote to memory of 4184 2904 z7186535.exe 71 PID 2904 wrote to memory of 3152 2904 z7186535.exe 72 PID 2904 wrote to memory of 3152 2904 z7186535.exe 72 PID 2904 wrote to memory of 3152 2904 z7186535.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe"C:\Users\Admin\AppData\Local\Temp\83c73d0d9518dc6648db99281be89a279029f9c36a885ed039bb92cc3cbbdf5b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7186535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7186535.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1135636.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1135636.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0394142.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0394142.exe3⤵
- Executes dropped EXE
PID:3152
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5fe4b924d781c47ba46791cfc4820b5e3
SHA1a9e77643bd720e3abf8a13401c71c42f19f54595
SHA2561e42670c4944424af4e3789ec744cf3dbc92ccaf7002e1470395c45b76e8ccbc
SHA5128d7414bb508baa5bedd0059f044113b2bc3904f12aa7df9ab59cc0ba7c7463ad00dc0548abd2650f78093039665698888c193467235e3beecff5c05eb500f6a2
-
Filesize
206KB
MD5fe4b924d781c47ba46791cfc4820b5e3
SHA1a9e77643bd720e3abf8a13401c71c42f19f54595
SHA2561e42670c4944424af4e3789ec744cf3dbc92ccaf7002e1470395c45b76e8ccbc
SHA5128d7414bb508baa5bedd0059f044113b2bc3904f12aa7df9ab59cc0ba7c7463ad00dc0548abd2650f78093039665698888c193467235e3beecff5c05eb500f6a2
-
Filesize
13KB
MD508472a5304beae54178f450247d8075c
SHA1542522a353df144a8b6c21cd7af9fcccf21a5471
SHA256d8b83432045e9b8de008d6640cc99cb2a8af7c2db2fdb75650e3566fa4213087
SHA51259e93ffb2eed1492e7efc9be382147dbf9a3fc314d9ee92e984cd3ca2aeb2a15b96ada4ece6fd681adfb92f7023f11283852ff72a5c079306d7c7e8da0de6e05
-
Filesize
13KB
MD508472a5304beae54178f450247d8075c
SHA1542522a353df144a8b6c21cd7af9fcccf21a5471
SHA256d8b83432045e9b8de008d6640cc99cb2a8af7c2db2fdb75650e3566fa4213087
SHA51259e93ffb2eed1492e7efc9be382147dbf9a3fc314d9ee92e984cd3ca2aeb2a15b96ada4ece6fd681adfb92f7023f11283852ff72a5c079306d7c7e8da0de6e05
-
Filesize
174KB
MD58a621b09faa7f4b6c82b793b5a66b545
SHA16e4296a685f1cff0a6a553ea58c3f2f77009e19d
SHA2565b00060982b31611a906c7ed707e6bc6ade0e82e434c9df70473748099d1d476
SHA512fb22ca40a2636ddcdf913753552a6d1efe6695ec5e9f2014ff7c7b5677eadd70d415708a57a4836bac8fdf2dd0698af6169e4b7dbf6649f80fe2e7f2c3f27b3b
-
Filesize
174KB
MD58a621b09faa7f4b6c82b793b5a66b545
SHA16e4296a685f1cff0a6a553ea58c3f2f77009e19d
SHA2565b00060982b31611a906c7ed707e6bc6ade0e82e434c9df70473748099d1d476
SHA512fb22ca40a2636ddcdf913753552a6d1efe6695ec5e9f2014ff7c7b5677eadd70d415708a57a4836bac8fdf2dd0698af6169e4b7dbf6649f80fe2e7f2c3f27b3b