Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe
Resource
win10v2004-20230703-en
General
-
Target
c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe
-
Size
389KB
-
MD5
e88a579bd25f26182005bf8c98d2abd7
-
SHA1
214eebef65bb450f402cf362c2af0f6b6fa78984
-
SHA256
c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610
-
SHA512
d495e6eebaca79c4c2097379763f932e94d9d0b55495939a77ee532585655d4344fdc9517d52df5533685b821918501caaf4abbd151a626ad8c40b5eca9c1ca1
-
SSDEEP
12288:IMrxy90JQUTYnidMt78M6G8x+QrYt3mA:5yBUTY9AM6Xx+Q02A
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023090-148.dat healer behavioral1/files/0x0007000000023090-149.dat healer behavioral1/memory/3352-150-0x0000000000880000-0x000000000088A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p1375226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p1375226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p1375226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p1375226.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p1375226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p1375226.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1536 z7455798.exe 3352 p1375226.exe 3108 r7992924.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p1375226.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7455798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7455798.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3352 p1375226.exe 3352 p1375226.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3352 p1375226.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1536 4888 c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe 85 PID 4888 wrote to memory of 1536 4888 c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe 85 PID 4888 wrote to memory of 1536 4888 c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe 85 PID 1536 wrote to memory of 3352 1536 z7455798.exe 86 PID 1536 wrote to memory of 3352 1536 z7455798.exe 86 PID 1536 wrote to memory of 3108 1536 z7455798.exe 94 PID 1536 wrote to memory of 3108 1536 z7455798.exe 94 PID 1536 wrote to memory of 3108 1536 z7455798.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe"C:\Users\Admin\AppData\Local\Temp\c7ca00af5f683fb94fae3eab5fcdb5a5e75c9d93bdfbec2421ed8dbf2c2fb610.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7455798.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7455798.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1375226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1375226.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7992924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7992924.exe3⤵
- Executes dropped EXE
PID:3108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5180778639f69104fe83760999ef083ea
SHA1be464cb92d082ef5bb02dd163b035a692dbc45a5
SHA2566657666de32399ec2c982d03299601951b2430bb72cc52cff9d20075411881fa
SHA512fa1f37a7336f85a7f73efb3bce3e2c7bfd970d808cfc1362a8c02bf6a116996e843ace61ebd850a61b05d07a67a5cd3ec8e050cb20a3591d08cac1590b59939b
-
Filesize
206KB
MD5180778639f69104fe83760999ef083ea
SHA1be464cb92d082ef5bb02dd163b035a692dbc45a5
SHA2566657666de32399ec2c982d03299601951b2430bb72cc52cff9d20075411881fa
SHA512fa1f37a7336f85a7f73efb3bce3e2c7bfd970d808cfc1362a8c02bf6a116996e843ace61ebd850a61b05d07a67a5cd3ec8e050cb20a3591d08cac1590b59939b
-
Filesize
14KB
MD5528ca19a6f8bc4ee99f865d1660b1b9f
SHA130cd193c536c43cd8e3187962ad9c6aaf48d12f0
SHA25663569b2759ac8cc220b696d06ab3dc8a9fc2a49a207d3390962acda9a8775ea3
SHA512c784ff2f00ed4c7c31ba5eeb0a29a6e0419103af6a0a71f0ac34ed99845e4a5990a3df84bacecb170c1116100bbda365ad0fe7146498f8d010a347be51e67cba
-
Filesize
14KB
MD5528ca19a6f8bc4ee99f865d1660b1b9f
SHA130cd193c536c43cd8e3187962ad9c6aaf48d12f0
SHA25663569b2759ac8cc220b696d06ab3dc8a9fc2a49a207d3390962acda9a8775ea3
SHA512c784ff2f00ed4c7c31ba5eeb0a29a6e0419103af6a0a71f0ac34ed99845e4a5990a3df84bacecb170c1116100bbda365ad0fe7146498f8d010a347be51e67cba
-
Filesize
173KB
MD5ea0144835f6d598c25f1ad6612ee5e68
SHA138c510bb85224dc0a06955e74ca4d1ed303abad9
SHA2562d6cc4557f85943fa82e28bed87b64aafb851213ec2764a8f2588ec0bfab5d04
SHA512e110d47ab0629e50a7e8e0a094b94648508333127a8f17c680b8bdbf58202e0e51d641188dc21adbd111ad1515121ae0d3a6e3a45ca0ea0d372ebbdd79439d01
-
Filesize
173KB
MD5ea0144835f6d598c25f1ad6612ee5e68
SHA138c510bb85224dc0a06955e74ca4d1ed303abad9
SHA2562d6cc4557f85943fa82e28bed87b64aafb851213ec2764a8f2588ec0bfab5d04
SHA512e110d47ab0629e50a7e8e0a094b94648508333127a8f17c680b8bdbf58202e0e51d641188dc21adbd111ad1515121ae0d3a6e3a45ca0ea0d372ebbdd79439d01