Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe
Resource
win10v2004-20230703-en
General
-
Target
e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe
-
Size
389KB
-
MD5
ac742d9be518b47a9d42b5b784a9e3e2
-
SHA1
6bebcb288c5fb69b37be8fcdcb5997dc1b9e03a6
-
SHA256
e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1
-
SHA512
476465fea7cc5578ae4578777e1cd7e08900e5fc3f406904455e4c9176a82556c021ead6462f3f26093480d5ab166db77abde826f048b9d63f3fa8b1a5b48e37
-
SSDEEP
12288:rMrPy90egsnucuqzAV1f/0AIatWQzjg1l:cyqsnGFsAVWd1l
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000230dd-145.dat healer behavioral1/files/0x00070000000230dd-146.dat healer behavioral1/memory/4956-147-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2580264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2580264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2580264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2580264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2580264.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2580264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4300 z8430101.exe 4956 p2580264.exe 864 r6601247.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2580264.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8430101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8430101.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4956 p2580264.exe 4956 p2580264.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4956 p2580264.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3864 wrote to memory of 4300 3864 e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe 86 PID 3864 wrote to memory of 4300 3864 e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe 86 PID 3864 wrote to memory of 4300 3864 e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe 86 PID 4300 wrote to memory of 4956 4300 z8430101.exe 87 PID 4300 wrote to memory of 4956 4300 z8430101.exe 87 PID 4300 wrote to memory of 864 4300 z8430101.exe 93 PID 4300 wrote to memory of 864 4300 z8430101.exe 93 PID 4300 wrote to memory of 864 4300 z8430101.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe"C:\Users\Admin\AppData\Local\Temp\e186d15ae0a6bb5e30aa3d14c1841114769bc6165b757b5ed9de23f8e8911ba1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8430101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8430101.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2580264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2580264.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6601247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6601247.exe3⤵
- Executes dropped EXE
PID:864
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5d07e4ec995d8599d8769d21854fe1552
SHA161573cc9fac86744492765dc1177b77941eccaef
SHA2563398fec28faf65520057f7254ca75e30d6850bbfb7ec234c1ec5453894e8dbac
SHA5123e5718dedf7e881979b0591788a8e8a4a0abd8bbd89955723ead9a96f8380457ddffd86113ebedf467f444865ef83e25d506ab31a3605769bbfec810cc767501
-
Filesize
206KB
MD5d07e4ec995d8599d8769d21854fe1552
SHA161573cc9fac86744492765dc1177b77941eccaef
SHA2563398fec28faf65520057f7254ca75e30d6850bbfb7ec234c1ec5453894e8dbac
SHA5123e5718dedf7e881979b0591788a8e8a4a0abd8bbd89955723ead9a96f8380457ddffd86113ebedf467f444865ef83e25d506ab31a3605769bbfec810cc767501
-
Filesize
14KB
MD5a738b9aed1ed61c92b9bfa697ee5d3c5
SHA171e3e4d30aea09682f3f091ae2d7d5349a9a2173
SHA2566d7ab3bf87e145fa09dfaace9c25a6de23e962e2dac05ddeb1bc671bf737e2f8
SHA512c38f4bad89a930eaaf515dd256026313bb8947de2fc576452fb3766865eb70205a38b9b60ed3c730c1421b0e0d8db231a88d84225813e8e1020c53f7075a03e0
-
Filesize
14KB
MD5a738b9aed1ed61c92b9bfa697ee5d3c5
SHA171e3e4d30aea09682f3f091ae2d7d5349a9a2173
SHA2566d7ab3bf87e145fa09dfaace9c25a6de23e962e2dac05ddeb1bc671bf737e2f8
SHA512c38f4bad89a930eaaf515dd256026313bb8947de2fc576452fb3766865eb70205a38b9b60ed3c730c1421b0e0d8db231a88d84225813e8e1020c53f7075a03e0
-
Filesize
173KB
MD5e39e4a8fa5bb7a9771f95b87cfdd7ff0
SHA10f0f39fbfb897aec2a19edd537f01b372285e6e7
SHA25692b03a435bbe8e8e2cfaab8d2d607cc4b6352db1c1277998fb1348a9d468203e
SHA512ca490f3c9f03adfe8bf9a8dabdcd000359d4e5a3fe6306d6d43889b4ad6b66f152d52095e164ea48b9fb8b28cc80fb616413900a0cf811a5f871095305906a01
-
Filesize
173KB
MD5e39e4a8fa5bb7a9771f95b87cfdd7ff0
SHA10f0f39fbfb897aec2a19edd537f01b372285e6e7
SHA25692b03a435bbe8e8e2cfaab8d2d607cc4b6352db1c1277998fb1348a9d468203e
SHA512ca490f3c9f03adfe8bf9a8dabdcd000359d4e5a3fe6306d6d43889b4ad6b66f152d52095e164ea48b9fb8b28cc80fb616413900a0cf811a5f871095305906a01