Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe
Resource
win10v2004-20230703-en
General
-
Target
b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe
-
Size
389KB
-
MD5
a02e159b2a984bdb0d2d2559fba7269e
-
SHA1
ff9ea0c81d4d05564b71b9a735bfdc7b32ef2573
-
SHA256
b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5
-
SHA512
acdca84a2deab0eeef4b7c15405f5693be9d9badae41346a8fdb7deb52d4fdea2dcc32dd237c14e2c783946cd71baf5e652fc0fa2da62467e53eca8e1bd2168d
-
SSDEEP
6144:Kay+bnr+zp0yN90QECc+rAA5WKkWxjZNSQRWcPFwyXAgm+Ernmzgga3lrmbkRhGy:uMrby90Ucz+QsZNkrYoh8QV
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231f2-145.dat healer behavioral1/files/0x00070000000231f2-146.dat healer behavioral1/memory/4372-147-0x0000000000730000-0x000000000073A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2119255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2119255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2119255.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2119255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2119255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2119255.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2348 z7078072.exe 4372 p2119255.exe 3752 r4473893.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2119255.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7078072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7078072.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 p2119255.exe 4372 p2119255.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4372 p2119255.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2348 4724 b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe 86 PID 4724 wrote to memory of 2348 4724 b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe 86 PID 4724 wrote to memory of 2348 4724 b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe 86 PID 2348 wrote to memory of 4372 2348 z7078072.exe 87 PID 2348 wrote to memory of 4372 2348 z7078072.exe 87 PID 2348 wrote to memory of 3752 2348 z7078072.exe 88 PID 2348 wrote to memory of 3752 2348 z7078072.exe 88 PID 2348 wrote to memory of 3752 2348 z7078072.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe"C:\Users\Admin\AppData\Local\Temp\b20dc87b265c93b6666cb997a87c40df3a4d73fe7413216cd47b6c218d2408c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7078072.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7078072.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2119255.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2119255.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4473893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4473893.exe3⤵
- Executes dropped EXE
PID:3752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54ba36568f6b78d954702e75b7a8bf45e
SHA1ff4bc8f25dc1abaf371796c93ce806458f26a3cb
SHA256a9820f497c7da24649bc11d6689005eb44ba277cfadaac06927e7f91a8f97b24
SHA51241fca189ee7c7ab820e0339c8e1690bd083db387436878f1f89d6372a9f91d06bb4a90acadac893433f99173b95e056f3e0b25fc8339bee14a0536c6db384a66
-
Filesize
206KB
MD54ba36568f6b78d954702e75b7a8bf45e
SHA1ff4bc8f25dc1abaf371796c93ce806458f26a3cb
SHA256a9820f497c7da24649bc11d6689005eb44ba277cfadaac06927e7f91a8f97b24
SHA51241fca189ee7c7ab820e0339c8e1690bd083db387436878f1f89d6372a9f91d06bb4a90acadac893433f99173b95e056f3e0b25fc8339bee14a0536c6db384a66
-
Filesize
14KB
MD5b6d8535a4f01ee6353c1fc97729653b4
SHA146e8d22093f14941d719b0fd45ab255348de1cc0
SHA2569764feb210d842bff640df3b406c99fe77492c0ee4cbfc22dd60d648b0ef8c1c
SHA512732deb510f1bbf920f039311732aebc673771730b04c67a565210aaabccce4b10497863fb1599bfe320ca1a0d2964f4414b5c76f577abf840568b6b8a54d3c3a
-
Filesize
14KB
MD5b6d8535a4f01ee6353c1fc97729653b4
SHA146e8d22093f14941d719b0fd45ab255348de1cc0
SHA2569764feb210d842bff640df3b406c99fe77492c0ee4cbfc22dd60d648b0ef8c1c
SHA512732deb510f1bbf920f039311732aebc673771730b04c67a565210aaabccce4b10497863fb1599bfe320ca1a0d2964f4414b5c76f577abf840568b6b8a54d3c3a
-
Filesize
173KB
MD592ceac1b359061b75a3d9ef94b66b3ce
SHA1a49a59e8b7c966bd2d73f83eee85ac595be8a23b
SHA256e581478e6e3edb9349df1d2edb60705e8f2bf19ca5d94b30630c24f4ba7b9515
SHA51203aef779e834c61764360334bc51ab88f4655179ee4bb2ad2c61bfeab4acb57b1444a727837d9b82a23818595e4a5540010317f1288dba93826a2f695baebfc0
-
Filesize
173KB
MD592ceac1b359061b75a3d9ef94b66b3ce
SHA1a49a59e8b7c966bd2d73f83eee85ac595be8a23b
SHA256e581478e6e3edb9349df1d2edb60705e8f2bf19ca5d94b30630c24f4ba7b9515
SHA51203aef779e834c61764360334bc51ab88f4655179ee4bb2ad2c61bfeab4acb57b1444a727837d9b82a23818595e4a5540010317f1288dba93826a2f695baebfc0