Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe
Resource
win10v2004-20230703-en
General
-
Target
a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe
-
Size
389KB
-
MD5
cc931a1f40b737a0c88c6a42bb68effd
-
SHA1
5b9931c45c5fa3efe4fbd37251a2f42f22ddc7d6
-
SHA256
a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8
-
SHA512
0c58f62981b9049052aaa53c0ec3e25d60bed383fb728e09e0b98f30d86f232f68833a92d846e58a5206067f2032a6125f8f45eca51dd9d9d770943b95dfb203
-
SSDEEP
6144:Kpy+bnr+Up0yN90QEoDsVSgXEGc7MEYKLKVJD8K5768Ldd/tQ4Z2L9iDv5iBn:HMrMy90OOlUGREYkw+07nG9LUDsBn
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002320c-145.dat healer behavioral1/files/0x000800000002320c-146.dat healer behavioral1/memory/1776-147-0x0000000000790000-0x000000000079A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8657797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8657797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8657797.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8657797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8657797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8657797.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3192 z0216621.exe 1776 p8657797.exe 4292 r7322492.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8657797.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0216621.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0216621.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2696 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 p8657797.exe 1776 p8657797.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1776 p8657797.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3192 2588 a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe 86 PID 2588 wrote to memory of 3192 2588 a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe 86 PID 2588 wrote to memory of 3192 2588 a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe 86 PID 3192 wrote to memory of 1776 3192 z0216621.exe 87 PID 3192 wrote to memory of 1776 3192 z0216621.exe 87 PID 3192 wrote to memory of 4292 3192 z0216621.exe 94 PID 3192 wrote to memory of 4292 3192 z0216621.exe 94 PID 3192 wrote to memory of 4292 3192 z0216621.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe"C:\Users\Admin\AppData\Local\Temp\a16dcd1fa129aafce3008428793020dafff1128bf9d83a16b9421c1aad1afcb8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0216621.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0216621.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8657797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8657797.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7322492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7322492.exe3⤵
- Executes dropped EXE
PID:4292
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD505226cb32037b3186881ba16444c571d
SHA14c8123c805d1d719bbe853887d3149720d3bb0db
SHA256ffcaa70b9ed704eb04641e37f7b31dc1c82ed750a1c5bc9ff4dae033e811de70
SHA51250e835df0aec4bd321e3df9d3fda9afba21a9feec9b3d8ee12935d14f88be9f48f93ccd513d6a60257b04d039756bebbb6bc6bad439baafd7f7185c4e633f909
-
Filesize
206KB
MD505226cb32037b3186881ba16444c571d
SHA14c8123c805d1d719bbe853887d3149720d3bb0db
SHA256ffcaa70b9ed704eb04641e37f7b31dc1c82ed750a1c5bc9ff4dae033e811de70
SHA51250e835df0aec4bd321e3df9d3fda9afba21a9feec9b3d8ee12935d14f88be9f48f93ccd513d6a60257b04d039756bebbb6bc6bad439baafd7f7185c4e633f909
-
Filesize
15KB
MD5b4eb588b40d6b2f4f0faf12c062d6f99
SHA1e6af831616ffe16fe6471b86e4f4c15f5e0ca190
SHA25639686596781192f3efa7cbac14f9aa093b3129a810b34e9daa79be4c6eee53bb
SHA5125089eaf2926aa88d69205ff38b6ba68c6d8534bf55189e2a648295b6ac6e5e4fbaec55643c066221e3d3cb532fb7d6cc8ef088f4d6974c325f62103ad63bd55a
-
Filesize
15KB
MD5b4eb588b40d6b2f4f0faf12c062d6f99
SHA1e6af831616ffe16fe6471b86e4f4c15f5e0ca190
SHA25639686596781192f3efa7cbac14f9aa093b3129a810b34e9daa79be4c6eee53bb
SHA5125089eaf2926aa88d69205ff38b6ba68c6d8534bf55189e2a648295b6ac6e5e4fbaec55643c066221e3d3cb532fb7d6cc8ef088f4d6974c325f62103ad63bd55a
-
Filesize
175KB
MD50d0ebca9296c287c38ad007945cc68ea
SHA1660e3114fc78d1bc7335936c636385b05e94cc44
SHA256be07f6018112266a6774c10cf83980507f3a701eb21036349eaaeb6e452f3b07
SHA5128ef28cfdb81dd0136910b5d1d850d48ee455c94c393f4a934eb99f9fd6f28daf1d3c0c773eee06dd6e602ddc13b5357d83ecf850ac8069500a3feeb0a81b36f1
-
Filesize
175KB
MD50d0ebca9296c287c38ad007945cc68ea
SHA1660e3114fc78d1bc7335936c636385b05e94cc44
SHA256be07f6018112266a6774c10cf83980507f3a701eb21036349eaaeb6e452f3b07
SHA5128ef28cfdb81dd0136910b5d1d850d48ee455c94c393f4a934eb99f9fd6f28daf1d3c0c773eee06dd6e602ddc13b5357d83ecf850ac8069500a3feeb0a81b36f1