Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 05:24
Static task
static1
Behavioral task
behavioral1
Sample
7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe
Resource
win10v2004-20230703-en
General
-
Target
7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe
-
Size
389KB
-
MD5
5f286d0fd40cd9646aeaee18e17a75d7
-
SHA1
28c1a00a6428ddd44ec0eb952ec1e5b80b475768
-
SHA256
7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688
-
SHA512
09abb3a3d45d7b44db2cbb2994b0bb29ecc6ba1ffb74399c2de8a9d19423218342a0d0a8dcd2166c410c3541f2ecc7ab3775916ab25bcbcf81ce6eb020d1b97d
-
SSDEEP
6144:Ksy+bnr+cp0yN90QEg/+X5WrF6eUhtjeXoOuwzpBEhbsgnlTuy5+Oy3mJ+4sqx:gMrky90+2XAGjeY/EpChwgn5+W2qx
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023085-148.dat healer behavioral1/files/0x0006000000023085-149.dat healer behavioral1/memory/636-150-0x0000000000B30000-0x0000000000B3A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p7285043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p7285043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p7285043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p7285043.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p7285043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p7285043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 928 z2946977.exe 636 p7285043.exe 3552 r6961113.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p7285043.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2946977.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2946977.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 636 p7285043.exe 636 p7285043.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 636 p7285043.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4740 wrote to memory of 928 4740 7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe 85 PID 4740 wrote to memory of 928 4740 7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe 85 PID 4740 wrote to memory of 928 4740 7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe 85 PID 928 wrote to memory of 636 928 z2946977.exe 86 PID 928 wrote to memory of 636 928 z2946977.exe 86 PID 928 wrote to memory of 3552 928 z2946977.exe 90 PID 928 wrote to memory of 3552 928 z2946977.exe 90 PID 928 wrote to memory of 3552 928 z2946977.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe"C:\Users\Admin\AppData\Local\Temp\7a51506822471b2f699afa9abb7d24300e051a17060e0953f92697c72351c688.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2946977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2946977.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7285043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7285043.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6961113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6961113.exe3⤵
- Executes dropped EXE
PID:3552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD57347ee43261a24c9442b38729640f0dc
SHA14148f61457368efae9f2b1fa06f090514065bc86
SHA256b24abcbbbfa891f1143af55c2d833a609143a647c4082ea671d38bd80fe33b7c
SHA5121be4b4fdf954c817660577620e44538c43c389c1c03d9e251e49ee7d39920340876c088394690b78505c63c20fb5d5c068d6c09d2d9b08be91ef7f15def96ac3
-
Filesize
206KB
MD57347ee43261a24c9442b38729640f0dc
SHA14148f61457368efae9f2b1fa06f090514065bc86
SHA256b24abcbbbfa891f1143af55c2d833a609143a647c4082ea671d38bd80fe33b7c
SHA5121be4b4fdf954c817660577620e44538c43c389c1c03d9e251e49ee7d39920340876c088394690b78505c63c20fb5d5c068d6c09d2d9b08be91ef7f15def96ac3
-
Filesize
13KB
MD5ad052e2c6588fd1a249bcf9e30de4109
SHA1d7dc263a061744d420bb36afaae1f3252784d77a
SHA256080a9cd8883f488b045673663398aebc924fc75cfac64338fb2e06c8741c2bf2
SHA512557947438c1048b6629c82643e483ea7b8682fbd4615225d26bbdebf1b6dd372c35362fa772498fa9ced0de9b94fb476b4590f84d743e00d551057ca65601368
-
Filesize
13KB
MD5ad052e2c6588fd1a249bcf9e30de4109
SHA1d7dc263a061744d420bb36afaae1f3252784d77a
SHA256080a9cd8883f488b045673663398aebc924fc75cfac64338fb2e06c8741c2bf2
SHA512557947438c1048b6629c82643e483ea7b8682fbd4615225d26bbdebf1b6dd372c35362fa772498fa9ced0de9b94fb476b4590f84d743e00d551057ca65601368
-
Filesize
175KB
MD59f56264e8a7cca7bddd7c373b82b0e41
SHA1e830ec14da5613c04747935d0dd85c80f689a092
SHA2567153abaafeec44d23dbcb717d5e0946663306feb1ca57ebef7f3ffc37ce6abc0
SHA512a60c34e4379b16f00fe6f51b17ad044d0261219b648fc6d42047cc807a9eb4982bd46d3e00d4777f88332acd6b7d7b2721edc4f606fbd2dde9796432aa35fcbe
-
Filesize
175KB
MD59f56264e8a7cca7bddd7c373b82b0e41
SHA1e830ec14da5613c04747935d0dd85c80f689a092
SHA2567153abaafeec44d23dbcb717d5e0946663306feb1ca57ebef7f3ffc37ce6abc0
SHA512a60c34e4379b16f00fe6f51b17ad044d0261219b648fc6d42047cc807a9eb4982bd46d3e00d4777f88332acd6b7d7b2721edc4f606fbd2dde9796432aa35fcbe