Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe
Resource
win10-20230703-en
General
-
Target
397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe
-
Size
389KB
-
MD5
8fe751efdc0967277c229ef2d19fcac5
-
SHA1
cea8b541adafaf1034d08edc073aec7c143c73ba
-
SHA256
397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380
-
SHA512
f2e6973011feaf91da46c1fe84a4fcc2f69f78b5b5c291f8803de3af217038eacade69a268549ceeaf47176c28235b671319fafbb888ec3135ad140bfafea07a
-
SSDEEP
6144:Kgy+bnr+Rp0yN90QEGjPlnS3y0tRYk8XPI3Syh4kn5QryH:QMrBy90cDlS3JoA3S+4g5QW
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afb0-132.dat healer behavioral1/files/0x000700000001afb0-133.dat healer behavioral1/memory/4160-134-0x00000000007A0000-0x00000000007AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3697221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3697221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3697221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3697221.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3697221.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2336 z5433238.exe 4160 p3697221.exe 4088 r2012429.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3697221.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5433238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5433238.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4160 p3697221.exe 4160 p3697221.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4160 p3697221.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 604 wrote to memory of 2336 604 397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe 70 PID 604 wrote to memory of 2336 604 397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe 70 PID 604 wrote to memory of 2336 604 397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe 70 PID 2336 wrote to memory of 4160 2336 z5433238.exe 71 PID 2336 wrote to memory of 4160 2336 z5433238.exe 71 PID 2336 wrote to memory of 4088 2336 z5433238.exe 72 PID 2336 wrote to memory of 4088 2336 z5433238.exe 72 PID 2336 wrote to memory of 4088 2336 z5433238.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe"C:\Users\Admin\AppData\Local\Temp\397e75374b14eb2672801d3c76354d62225ebd35fa9a20a3e6b42604c2a1f380.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5433238.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5433238.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3697221.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3697221.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2012429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2012429.exe3⤵
- Executes dropped EXE
PID:4088
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5a25d8ba955bf14b15d5fde62c99c2d67
SHA18341024b3df54301fe269e0a70fe17b79c3a7ef4
SHA256e178d713b1551c5be5c269091eae7dc197dba5c4ea53bd17fa16fcfb473ace11
SHA512c2356098e9fe0db8fd6607bb8d952ac8d5d9467c116a47e8a2ac34c23150e9080c7cb668578150f216192419161c9e4fc22931d5aa0cc92b79211c105b4531af
-
Filesize
206KB
MD5a25d8ba955bf14b15d5fde62c99c2d67
SHA18341024b3df54301fe269e0a70fe17b79c3a7ef4
SHA256e178d713b1551c5be5c269091eae7dc197dba5c4ea53bd17fa16fcfb473ace11
SHA512c2356098e9fe0db8fd6607bb8d952ac8d5d9467c116a47e8a2ac34c23150e9080c7cb668578150f216192419161c9e4fc22931d5aa0cc92b79211c105b4531af
-
Filesize
14KB
MD5b2045385b6aebb06dd572ddf5e4ec150
SHA164426ca314ec48a40ad051f110693313c546f048
SHA2567b9924beb56addf5f2ff997e29b4d3d4916ba8998e3737bb1976d72369702407
SHA512a2d9f36e794999355d663c7b97c3b136cfe485ae0f7acd5cb4adfae37d6dc62be8600071aae78ec5d3c2350597ea431efb07f8ebfd5a5bc368042b823f64a503
-
Filesize
14KB
MD5b2045385b6aebb06dd572ddf5e4ec150
SHA164426ca314ec48a40ad051f110693313c546f048
SHA2567b9924beb56addf5f2ff997e29b4d3d4916ba8998e3737bb1976d72369702407
SHA512a2d9f36e794999355d663c7b97c3b136cfe485ae0f7acd5cb4adfae37d6dc62be8600071aae78ec5d3c2350597ea431efb07f8ebfd5a5bc368042b823f64a503
-
Filesize
173KB
MD5f507e436215c6306404f5ba9fb1d5f59
SHA16e0c30f70162e62d382f00529825b7d051ae5a06
SHA256b527a0f48c3db24591083c933f92a01f11c9966cc66c1cbeca2492a8be60e994
SHA512e132970adfb583adbe9bcc7da412eae3e1eb423e18e592be36f99911773fca317c67a884a38fcb5bba088b8c76610d586f00ee22c09e6a4899dd4184fb8722e4
-
Filesize
173KB
MD5f507e436215c6306404f5ba9fb1d5f59
SHA16e0c30f70162e62d382f00529825b7d051ae5a06
SHA256b527a0f48c3db24591083c933f92a01f11c9966cc66c1cbeca2492a8be60e994
SHA512e132970adfb583adbe9bcc7da412eae3e1eb423e18e592be36f99911773fca317c67a884a38fcb5bba088b8c76610d586f00ee22c09e6a4899dd4184fb8722e4