Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe
Resource
win10v2004-20230703-en
General
-
Target
953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe
-
Size
389KB
-
MD5
8460839d88470abc63cb8b0627566bf9
-
SHA1
d2d3a870c95135379130e0c8a1a6454dde7eb346
-
SHA256
953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107
-
SHA512
6289d16e5ba5236ee45bfc9eca6b58ed740e7ee0a7c3fc99b6c96b5e7533bf7384121f9166e6f79fdcc17dc20613d3485b510d350be5ad86becc5db842459e84
-
SSDEEP
6144:K1y+bnr+ep0yN90QEn6DP5m21srlPhkxPb27HSZt8nlzcVF9SF+zrotU0Ky:zMray908Dhm21srlORiY8lvFCU1
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002326b-145.dat healer behavioral1/files/0x000800000002326b-146.dat healer behavioral1/memory/4456-147-0x00000000001E0000-0x00000000001EA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p7738617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p7738617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p7738617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p7738617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p7738617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p7738617.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5116 z1682308.exe 4456 p7738617.exe 3384 r5838206.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p7738617.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1682308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1682308.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2472 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4456 p7738617.exe 4456 p7738617.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4456 p7738617.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4644 wrote to memory of 5116 4644 953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe 86 PID 4644 wrote to memory of 5116 4644 953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe 86 PID 4644 wrote to memory of 5116 4644 953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe 86 PID 5116 wrote to memory of 4456 5116 z1682308.exe 87 PID 5116 wrote to memory of 4456 5116 z1682308.exe 87 PID 5116 wrote to memory of 3384 5116 z1682308.exe 95 PID 5116 wrote to memory of 3384 5116 z1682308.exe 95 PID 5116 wrote to memory of 3384 5116 z1682308.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe"C:\Users\Admin\AppData\Local\Temp\953317f4b9fe7c635a7e567bc8364004a924201e132d32b4b52e3e8ddc186107.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1682308.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1682308.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7738617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7738617.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5838206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5838206.exe3⤵
- Executes dropped EXE
PID:3384
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD545670307210ea2d13188590a65ef4d52
SHA1accdfc52272755a4911f376663f4cc4a19549e09
SHA25615c363b40e9d8c40bfcae71e938c00297023a6e86d5af7d206dd61d01462287f
SHA5120c031d53d2332af4b282c6ee325a98c75c2b858aaf354f5951b4b64596f340a1f7d6974f0c0a5470452e2efe4cd4b8851a6aafd8c370f7580294cff3dec0464b
-
Filesize
206KB
MD545670307210ea2d13188590a65ef4d52
SHA1accdfc52272755a4911f376663f4cc4a19549e09
SHA25615c363b40e9d8c40bfcae71e938c00297023a6e86d5af7d206dd61d01462287f
SHA5120c031d53d2332af4b282c6ee325a98c75c2b858aaf354f5951b4b64596f340a1f7d6974f0c0a5470452e2efe4cd4b8851a6aafd8c370f7580294cff3dec0464b
-
Filesize
14KB
MD5401d935743b951c182a66102839d1ce1
SHA1f430e91135b8781bd899177ad775ec4a3ef6d406
SHA2566e63c3ec76b7ce479b255d968b3c4a9eb8999590cd050018dc171101f7f16cca
SHA512c7c095ee8e9fd820931ffb48b85299edd92a8b8fe264a6a5e0a7bb137765ea8c217f7bfdd60af43b78d4ccb2a2ad41caed4d426875b57baee7ff6848211b6ed2
-
Filesize
14KB
MD5401d935743b951c182a66102839d1ce1
SHA1f430e91135b8781bd899177ad775ec4a3ef6d406
SHA2566e63c3ec76b7ce479b255d968b3c4a9eb8999590cd050018dc171101f7f16cca
SHA512c7c095ee8e9fd820931ffb48b85299edd92a8b8fe264a6a5e0a7bb137765ea8c217f7bfdd60af43b78d4ccb2a2ad41caed4d426875b57baee7ff6848211b6ed2
-
Filesize
172KB
MD5ad5bc0c86c062af70650d025f2232840
SHA1026ec6636162136f044e1a82558eee880f755bca
SHA2562318810d24bab47008d3dec198f922bf442b437591629a29c971a636bef8aed3
SHA512c1be37eba3784ea83b3f6e6e5babc1347d44b5b8327c2db94a90b4d2213c4b34e861aa935ff78562983838002da2bcb70506df7cb4f842b533b55cf60d264d1e
-
Filesize
172KB
MD5ad5bc0c86c062af70650d025f2232840
SHA1026ec6636162136f044e1a82558eee880f755bca
SHA2562318810d24bab47008d3dec198f922bf442b437591629a29c971a636bef8aed3
SHA512c1be37eba3784ea83b3f6e6e5babc1347d44b5b8327c2db94a90b4d2213c4b34e861aa935ff78562983838002da2bcb70506df7cb4f842b533b55cf60d264d1e