Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe
Resource
win10v2004-20230703-en
General
-
Target
a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe
-
Size
389KB
-
MD5
9cd4244f9b8ce974992c42d4c264585f
-
SHA1
fccd922df7ec49540ad65f182b9f87d6d42ec932
-
SHA256
a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec
-
SHA512
d5acf94a20d101989e8cb2afda2f4fa4971e5ba6f72750b6482aca1098f255c6b97ed2a74d2df6d04ec21081a1ecacc0c64b0d109d28c3425d51b26294b91d54
-
SSDEEP
6144:Kny+bnr+Hp0yN90QEzhahaoar8ObWHqrdRphUlNbbMcztzkqp:hMrDy90ga6yCqrdRphstyqp
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002321e-145.dat healer behavioral1/files/0x000700000002321e-146.dat healer behavioral1/memory/4576-147-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p5974387.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p5974387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p5974387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p5974387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p5974387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p5974387.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1200 z6901441.exe 4576 p5974387.exe 1048 r2594359.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p5974387.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6901441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6901441.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4576 p5974387.exe 4576 p5974387.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4576 p5974387.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1200 1932 a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe 86 PID 1932 wrote to memory of 1200 1932 a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe 86 PID 1932 wrote to memory of 1200 1932 a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe 86 PID 1200 wrote to memory of 4576 1200 z6901441.exe 87 PID 1200 wrote to memory of 4576 1200 z6901441.exe 87 PID 1200 wrote to memory of 1048 1200 z6901441.exe 96 PID 1200 wrote to memory of 1048 1200 z6901441.exe 96 PID 1200 wrote to memory of 1048 1200 z6901441.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe"C:\Users\Admin\AppData\Local\Temp\a0fde39fbadc5301e63aab1c8eaaba286ca43e70464eb1097968f54db95cfeec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6901441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6901441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5974387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5974387.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2594359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2594359.exe3⤵
- Executes dropped EXE
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5844a248373e61342b75b9ca781357df0
SHA1fa8dea3f70c3453b8f8a23cac3cfc28ef6035b2a
SHA2568f5ad9960030538e5112e632b35baa6396397b0c24bc92be9781c265fe77e805
SHA512be270fdb57cdaebc0000b558df3b0bf7f252545876f420d1bc46165be4650fec846b0111c1314fbdfc8a5bab35af369f91b59af2ecefa2c28bc41d16e5df786a
-
Filesize
206KB
MD5844a248373e61342b75b9ca781357df0
SHA1fa8dea3f70c3453b8f8a23cac3cfc28ef6035b2a
SHA2568f5ad9960030538e5112e632b35baa6396397b0c24bc92be9781c265fe77e805
SHA512be270fdb57cdaebc0000b558df3b0bf7f252545876f420d1bc46165be4650fec846b0111c1314fbdfc8a5bab35af369f91b59af2ecefa2c28bc41d16e5df786a
-
Filesize
14KB
MD542a9b33fd1fa1535a8902fcd4a33289e
SHA1e73b75058840463c1b69aa5da8a5ebb2245ca474
SHA256bfb2c117a2be5a3f899d6919624304e4f958894facd73cc594c0b1f095848e41
SHA512cab7a2014b1eabd8d8ecb1f797dac7ad42a2e6b52bb9699bfdd5198773622d7db3b44f8bb58f4d95a0b9048b2be701d6d42e9457452e827305fd05d67227a01e
-
Filesize
14KB
MD542a9b33fd1fa1535a8902fcd4a33289e
SHA1e73b75058840463c1b69aa5da8a5ebb2245ca474
SHA256bfb2c117a2be5a3f899d6919624304e4f958894facd73cc594c0b1f095848e41
SHA512cab7a2014b1eabd8d8ecb1f797dac7ad42a2e6b52bb9699bfdd5198773622d7db3b44f8bb58f4d95a0b9048b2be701d6d42e9457452e827305fd05d67227a01e
-
Filesize
172KB
MD5aa1de16d53c1e816efa48af0d9f513d0
SHA183d446afd2203cfffb40e7f623a09b74cd7bcb6f
SHA2560ac70f66b4b96dda119bd588f6cd886599319ce158b3780a6ef651de9f386f36
SHA5128cf882980babded6b54feaedc808bd7cdf00ff11d57f348cde05b4b38c3400ebc2b7f2f8529d82f668b32be2dc3035b11a5a7523697b0753f9427eb86bf793bb
-
Filesize
172KB
MD5aa1de16d53c1e816efa48af0d9f513d0
SHA183d446afd2203cfffb40e7f623a09b74cd7bcb6f
SHA2560ac70f66b4b96dda119bd588f6cd886599319ce158b3780a6ef651de9f386f36
SHA5128cf882980babded6b54feaedc808bd7cdf00ff11d57f348cde05b4b38c3400ebc2b7f2f8529d82f668b32be2dc3035b11a5a7523697b0753f9427eb86bf793bb