Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe
Resource
win10v2004-20230703-en
General
-
Target
b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe
-
Size
389KB
-
MD5
dc040decb5b2c6d9ecea559a7c5adc75
-
SHA1
e86cf376c49fb3c5c44ba7a16adbb3fe210621f1
-
SHA256
b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e
-
SHA512
8a76c94b058a49678440aadb905a60c74b75076d019d8f53098bdfe927e5a6736eef0889be74d489cfaf1cb8648aec3ee9e41590986bce116762423af6de6df0
-
SSDEEP
6144:Kpy+bnr+ep0yN90QE9ktVd8DkWcnZNbQR59iq/PMGNZleISatV2xPN8n6degk6uz:rMriy90LkHdN6nfzG86IF
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231d5-145.dat healer behavioral1/files/0x00080000000231d5-146.dat healer behavioral1/memory/3704-147-0x0000000000EE0000-0x0000000000EEA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p9028422.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p9028422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p9028422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p9028422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p9028422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p9028422.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4244 z4546804.exe 3704 p9028422.exe 3824 r8754031.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p9028422.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4546804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4546804.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3704 p9028422.exe 3704 p9028422.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3704 p9028422.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4244 4404 b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe 85 PID 4404 wrote to memory of 4244 4404 b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe 85 PID 4404 wrote to memory of 4244 4404 b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe 85 PID 4244 wrote to memory of 3704 4244 z4546804.exe 86 PID 4244 wrote to memory of 3704 4244 z4546804.exe 86 PID 4244 wrote to memory of 3824 4244 z4546804.exe 101 PID 4244 wrote to memory of 3824 4244 z4546804.exe 101 PID 4244 wrote to memory of 3824 4244 z4546804.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe"C:\Users\Admin\AppData\Local\Temp\b529184a968e187d8e3c1fb1d4133608e61ff7f7e95fc84098679ae5339f907e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4546804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4546804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9028422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9028422.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8754031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8754031.exe3⤵
- Executes dropped EXE
PID:3824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD51ae81ee65d5f4844b00c6acaab3879c7
SHA141727f9b14d383d9f1c81a5f694b2e70df7d9c1a
SHA25659e6b06484b1f5ea0b1fc60f1538b648b33ccab92338b0aa254163be57e96e88
SHA5128aa7da0ebfa95fb1b3c96eadbedd73a386e48ff5387b992988b43c88e754045701a6b9083fd245aba8fd1cc195487466e150fc267232fa662c85cf9a6ed4863b
-
Filesize
206KB
MD51ae81ee65d5f4844b00c6acaab3879c7
SHA141727f9b14d383d9f1c81a5f694b2e70df7d9c1a
SHA25659e6b06484b1f5ea0b1fc60f1538b648b33ccab92338b0aa254163be57e96e88
SHA5128aa7da0ebfa95fb1b3c96eadbedd73a386e48ff5387b992988b43c88e754045701a6b9083fd245aba8fd1cc195487466e150fc267232fa662c85cf9a6ed4863b
-
Filesize
14KB
MD5175c4e2ac002cb35f48ba3dd1fccea31
SHA106713e5403e736c2a1f7b7e45ab85977e0548af0
SHA256603d54329427db981a3bc8db57158ef07cdb5e97fb6b97032b4afe67f183ca14
SHA51274a422a3604c23394cf89ce00ae341aa475561e8a83ddb965bcac848e23f4d6ca051089791e265186a3958f316692af94a9b922b75d1484b89883efc4104dca1
-
Filesize
14KB
MD5175c4e2ac002cb35f48ba3dd1fccea31
SHA106713e5403e736c2a1f7b7e45ab85977e0548af0
SHA256603d54329427db981a3bc8db57158ef07cdb5e97fb6b97032b4afe67f183ca14
SHA51274a422a3604c23394cf89ce00ae341aa475561e8a83ddb965bcac848e23f4d6ca051089791e265186a3958f316692af94a9b922b75d1484b89883efc4104dca1
-
Filesize
172KB
MD59db49e0699e91bd6432e0709b840d098
SHA157f693cb5ab91aabf31b4065b49e340b7b185c88
SHA256f3ee188c13942e52dd3dc6a4e804c4f1f07c307c1cb2287fcde7293f9d27b1d8
SHA51290ceaf432e7712db57218350e138f5e034d8356d3afb5e349dbe69ff0de9330913e6a833ad0a2ca50ca82805aa70dbb00f0e0024e78f590a84f1bd80a473f59a
-
Filesize
172KB
MD59db49e0699e91bd6432e0709b840d098
SHA157f693cb5ab91aabf31b4065b49e340b7b185c88
SHA256f3ee188c13942e52dd3dc6a4e804c4f1f07c307c1cb2287fcde7293f9d27b1d8
SHA51290ceaf432e7712db57218350e138f5e034d8356d3afb5e349dbe69ff0de9330913e6a833ad0a2ca50ca82805aa70dbb00f0e0024e78f590a84f1bd80a473f59a