Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe
Resource
win10v2004-20230703-en
General
-
Target
d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe
-
Size
389KB
-
MD5
d4b29e8f6dbaacd6afab3c5f240314da
-
SHA1
637283774d25a6781c796bed544c49172be3d13f
-
SHA256
d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1
-
SHA512
b2f76bea5ecbf4c45b3e5b6cfc51f466388ea68c0347d1bef84413ce201855b04b39540c3a4d1764df6e439ab3929e4bca334479a353e50a0114cbf6c7898fbe
-
SSDEEP
6144:Koy+bnr+Dp0yN90QEdY/iSg47fs8FElg5qhE87Z0NeZUHkksptVXfQHZW:YMrjy90s/dgIsuElW8m8iHkZdfUW
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002328b-145.dat healer behavioral1/files/0x000700000002328b-146.dat healer behavioral1/memory/4500-147-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p1085134.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p1085134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p1085134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p1085134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p1085134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p1085134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2512 z2110235.exe 4500 p1085134.exe 4288 r0521568.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p1085134.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2110235.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2110235.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1376 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 p1085134.exe 4500 p1085134.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4500 p1085134.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2512 3920 d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe 85 PID 3920 wrote to memory of 2512 3920 d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe 85 PID 3920 wrote to memory of 2512 3920 d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe 85 PID 2512 wrote to memory of 4500 2512 z2110235.exe 86 PID 2512 wrote to memory of 4500 2512 z2110235.exe 86 PID 2512 wrote to memory of 4288 2512 z2110235.exe 94 PID 2512 wrote to memory of 4288 2512 z2110235.exe 94 PID 2512 wrote to memory of 4288 2512 z2110235.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe"C:\Users\Admin\AppData\Local\Temp\d8738ce3cc03096157c3756f7a5010583830f150867d84b0fdd4d0438c4228d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2110235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2110235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1085134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1085134.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0521568.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0521568.exe3⤵
- Executes dropped EXE
PID:4288
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD56fbcb395e9decb41112e226211abd295
SHA1807cb494d4628817208067a93aa97fb1deff7dfe
SHA256787a3d3d375248bb8b492e65b53a3a763c4bfcfe751058c3d570b3c481f4abc0
SHA5120a117cd75975b9568b8152bc73cfaa6d0399227537cd2efe4878977c2e398a97258a93c06fbfa40a66879d2a74139936c1a59b9a9e44fd3bff0e7e9bef437543
-
Filesize
206KB
MD56fbcb395e9decb41112e226211abd295
SHA1807cb494d4628817208067a93aa97fb1deff7dfe
SHA256787a3d3d375248bb8b492e65b53a3a763c4bfcfe751058c3d570b3c481f4abc0
SHA5120a117cd75975b9568b8152bc73cfaa6d0399227537cd2efe4878977c2e398a97258a93c06fbfa40a66879d2a74139936c1a59b9a9e44fd3bff0e7e9bef437543
-
Filesize
13KB
MD5c0f7c7d486b9cccd0c7915a132536bff
SHA1473416639b633c0ad99f42f4918ff04bb8a28793
SHA2569646391a4aa3189d0c367025621b62398d48fc4a93d64b3fb917466accb7ed9a
SHA5126f8d79f2e65168601084f5843e2ae1944c6044fe7f8fbe36ac2d67fa34137e0c2b5463cf4372c6b7189abf35cba7242be0cc182cd52d933d354ada6fb4908383
-
Filesize
13KB
MD5c0f7c7d486b9cccd0c7915a132536bff
SHA1473416639b633c0ad99f42f4918ff04bb8a28793
SHA2569646391a4aa3189d0c367025621b62398d48fc4a93d64b3fb917466accb7ed9a
SHA5126f8d79f2e65168601084f5843e2ae1944c6044fe7f8fbe36ac2d67fa34137e0c2b5463cf4372c6b7189abf35cba7242be0cc182cd52d933d354ada6fb4908383
-
Filesize
174KB
MD546420d23ed279ba28274968dd98994d1
SHA114932597aef53895c86e1cac2871291e76846816
SHA256c53b3b107724bfe5cd2ec26f161b62ce63feb0acb5a1697b7af8d1d68f3de290
SHA512cadb14858a917c6adccddc6138f761073b4080855660ac7f926d7bf7a131f462dd8c77034d0366e6df2fbf7830cdb5352f6f29b876f23e22ae901094d27ba6fb
-
Filesize
174KB
MD546420d23ed279ba28274968dd98994d1
SHA114932597aef53895c86e1cac2871291e76846816
SHA256c53b3b107724bfe5cd2ec26f161b62ce63feb0acb5a1697b7af8d1d68f3de290
SHA512cadb14858a917c6adccddc6138f761073b4080855660ac7f926d7bf7a131f462dd8c77034d0366e6df2fbf7830cdb5352f6f29b876f23e22ae901094d27ba6fb