Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 11:06
Static task
static1
Behavioral task
behavioral1
Sample
94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe
Resource
win10v2004-20230703-en
General
-
Target
94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe
-
Size
389KB
-
MD5
8684b4cdf4c74ff4a60e2a58251c7dcf
-
SHA1
745469e8139d773cb4de46304a3147fa851f3183
-
SHA256
94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a
-
SHA512
695bbf02ab1b1b60a20e5c280d2c25594e7ec8fcd49be702e54df464d595612bb62788461bac195502e05a79efcf10c6482f77ea5f8d46fc76d4e9573f5da8c2
-
SSDEEP
6144:Kcy+bnr+jp0yN90QEk9qdTc7WAnZcw944pvno8DXQG1aG/nGwrEF8sFrXKd4t:MMrTy90y9qBNs44pvoUda+n/EOd+
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000230a8-145.dat healer behavioral1/files/0x00070000000230a8-146.dat healer behavioral1/memory/1316-147-0x0000000000C80000-0x0000000000C8A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3874590.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3874590.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3874590.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3874590.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3874590.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3874590.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4572 z9698559.exe 1316 p3874590.exe 984 r4336867.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3874590.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9698559.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9698559.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 p3874590.exe 1316 p3874590.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1316 p3874590.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4572 4820 94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe 86 PID 4820 wrote to memory of 4572 4820 94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe 86 PID 4820 wrote to memory of 4572 4820 94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe 86 PID 4572 wrote to memory of 1316 4572 z9698559.exe 87 PID 4572 wrote to memory of 1316 4572 z9698559.exe 87 PID 4572 wrote to memory of 984 4572 z9698559.exe 88 PID 4572 wrote to memory of 984 4572 z9698559.exe 88 PID 4572 wrote to memory of 984 4572 z9698559.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe"C:\Users\Admin\AppData\Local\Temp\94ae55e82f9031d302a2aa9280827769b56226f79298c6393279997f0af66a0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9698559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9698559.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3874590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3874590.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4336867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4336867.exe3⤵
- Executes dropped EXE
PID:984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5201e9d477a82cc7c7b9541d03369e352
SHA135a12fbd92af4d2c4f8790d2ac62c9f0eaf175d7
SHA25616bcb6d5f7f16c05c3a9fd6cfc96cb95bc8e3cb989bc16bd0299f3caae63a401
SHA5125ef1291223872d86c1884dd589e178d35fa0382ec2cb7a94e973c42e40f973eb1c9d9d027671d84ff69102475317a65917d92b8cfc7c0e2a9eed0a1df8d389f2
-
Filesize
206KB
MD5201e9d477a82cc7c7b9541d03369e352
SHA135a12fbd92af4d2c4f8790d2ac62c9f0eaf175d7
SHA25616bcb6d5f7f16c05c3a9fd6cfc96cb95bc8e3cb989bc16bd0299f3caae63a401
SHA5125ef1291223872d86c1884dd589e178d35fa0382ec2cb7a94e973c42e40f973eb1c9d9d027671d84ff69102475317a65917d92b8cfc7c0e2a9eed0a1df8d389f2
-
Filesize
14KB
MD555af07d2c0fda0bade4e18ade40ed5b2
SHA1cec2309958fc0c0487d8f8e89c4b1821024dfcf9
SHA256b18290edc009a9777ea4d3ce54f48e7a6dbdc28d48c6e3fae59f26bc6a19f1a3
SHA5129e95738cb85e608cc813158e34d041fec75e29d0af07b2285bf25e0cce97e9c45e485605f86de14b00b2e8d342db1e45faa1af2b3db8871b980eba289e3d23eb
-
Filesize
14KB
MD555af07d2c0fda0bade4e18ade40ed5b2
SHA1cec2309958fc0c0487d8f8e89c4b1821024dfcf9
SHA256b18290edc009a9777ea4d3ce54f48e7a6dbdc28d48c6e3fae59f26bc6a19f1a3
SHA5129e95738cb85e608cc813158e34d041fec75e29d0af07b2285bf25e0cce97e9c45e485605f86de14b00b2e8d342db1e45faa1af2b3db8871b980eba289e3d23eb
-
Filesize
172KB
MD5fc2fc27736e40d8c3ed44faea9ddb174
SHA132e06b52116b872b18d585b01eac61b56001e6a4
SHA256e8d8ea241bfebeff04f63e3045708eca36efe466653c4ae9d666024aee7841c6
SHA5121cb412b3e88fe8e7e94cff8dd3b9359d360bafc9d217793e3a99fd8da937256eec74f32f802b46555e9ae90f37fc590570a5a79c10687487b0be75831c99a72d
-
Filesize
172KB
MD5fc2fc27736e40d8c3ed44faea9ddb174
SHA132e06b52116b872b18d585b01eac61b56001e6a4
SHA256e8d8ea241bfebeff04f63e3045708eca36efe466653c4ae9d666024aee7841c6
SHA5121cb412b3e88fe8e7e94cff8dd3b9359d360bafc9d217793e3a99fd8da937256eec74f32f802b46555e9ae90f37fc590570a5a79c10687487b0be75831c99a72d