Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe
Resource
win10v2004-20230703-en
General
-
Target
93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe
-
Size
389KB
-
MD5
3cae94f4d460b740684a15bf30e56883
-
SHA1
e15f506e7ee51d4d0e44638a364ba1b2467714f8
-
SHA256
93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72
-
SHA512
5f95833ead25dbc86081434bc50bd86c7da73fa3799c3da7556c4c324f40cb81beb18130339addd226d451351af79ce80deadbfd90df0a02062a9496b8bfdafa
-
SSDEEP
6144:Kfy+bnr+2p0yN90QE3Gf5DO9kW8PZNw3hEZLd8UyGntSUASt3T5wZsrYho8p:pMrSy90AxDOHEZh7SMt39mThoG
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231ea-145.dat healer behavioral1/files/0x00070000000231ea-146.dat healer behavioral1/memory/2524-147-0x0000000000230000-0x000000000023A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p1014187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p1014187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p1014187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p1014187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p1014187.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p1014187.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2716 z7320450.exe 2524 p1014187.exe 4828 r5712245.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p1014187.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7320450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7320450.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2524 p1014187.exe 2524 p1014187.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 p1014187.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3736 wrote to memory of 2716 3736 93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe 84 PID 3736 wrote to memory of 2716 3736 93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe 84 PID 3736 wrote to memory of 2716 3736 93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe 84 PID 2716 wrote to memory of 2524 2716 z7320450.exe 85 PID 2716 wrote to memory of 2524 2716 z7320450.exe 85 PID 2716 wrote to memory of 4828 2716 z7320450.exe 97 PID 2716 wrote to memory of 4828 2716 z7320450.exe 97 PID 2716 wrote to memory of 4828 2716 z7320450.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe"C:\Users\Admin\AppData\Local\Temp\93cc2d27d45225b83ea1c77dc105b9c92aac74917593100c4e6940f5f0e4dc72.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7320450.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7320450.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1014187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1014187.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5712245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5712245.exe3⤵
- Executes dropped EXE
PID:4828
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f9dfc47edf26085924d691932ad2f96b
SHA1be7c5b34aca5cb7fbed4e934c4ae681c65343667
SHA256d1479cb435eb45754045fea2870fd47db4bcc46ea3425adf0cd9e31ef1aef43c
SHA512a78d49cf3f0d17f1f57b4fd5788867e3b0afe63dbe7f301b32499b1dc480e6ee544816a292a9d30a219415b7e856cd5295f88b505a95e6a36385e61e31a1e7f1
-
Filesize
206KB
MD5f9dfc47edf26085924d691932ad2f96b
SHA1be7c5b34aca5cb7fbed4e934c4ae681c65343667
SHA256d1479cb435eb45754045fea2870fd47db4bcc46ea3425adf0cd9e31ef1aef43c
SHA512a78d49cf3f0d17f1f57b4fd5788867e3b0afe63dbe7f301b32499b1dc480e6ee544816a292a9d30a219415b7e856cd5295f88b505a95e6a36385e61e31a1e7f1
-
Filesize
14KB
MD513e995216f5c3bd5f030f650241e7dbd
SHA10d70f76e8fd00926b7b4c802e28fd362c0837126
SHA256b55b7858d91a400e25383d93665a414755124188cb82006bff40a3c6a40fa3d3
SHA5123c891a886ebaa5caac301e97512bf77f5f7940b287c1467348d29aafd0002ee8cb88554296127884b921eb47716a974bc4df47d790dadcd21d05f87b5cc82276
-
Filesize
14KB
MD513e995216f5c3bd5f030f650241e7dbd
SHA10d70f76e8fd00926b7b4c802e28fd362c0837126
SHA256b55b7858d91a400e25383d93665a414755124188cb82006bff40a3c6a40fa3d3
SHA5123c891a886ebaa5caac301e97512bf77f5f7940b287c1467348d29aafd0002ee8cb88554296127884b921eb47716a974bc4df47d790dadcd21d05f87b5cc82276
-
Filesize
173KB
MD573dd2c796c2d354236ccbae5756abd16
SHA1924bd0a3bd68831e5410c3f8372247f57056ef01
SHA256ce2933cc64a375bfc4a9de84575220e8d7dece94615a0b6c29f9929d41660d32
SHA512a96e1a6dc77dc113e4e166aeaeb5490e2e070517a36db9dd90d48a2ecce72974623d9ba4943fa40d9b9e26cfdd4acae4c94895e1fc234fede3c447bf36f5fa1c
-
Filesize
173KB
MD573dd2c796c2d354236ccbae5756abd16
SHA1924bd0a3bd68831e5410c3f8372247f57056ef01
SHA256ce2933cc64a375bfc4a9de84575220e8d7dece94615a0b6c29f9929d41660d32
SHA512a96e1a6dc77dc113e4e166aeaeb5490e2e070517a36db9dd90d48a2ecce72974623d9ba4943fa40d9b9e26cfdd4acae4c94895e1fc234fede3c447bf36f5fa1c