Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 23:38
Static task
static1
Behavioral task
behavioral1
Sample
8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe
Resource
win10v2004-20230703-en
General
-
Target
8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe
-
Size
389KB
-
MD5
5852ce6173659b93ffb645ae359eeffa
-
SHA1
2d19da873f236f6a95b15340995dd71e9780e8a1
-
SHA256
8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d
-
SHA512
03810e7023435b96d36608b00ebe94290a2fd43c3b78059186b20d36ebe7e773779d57c24759be587ead49696259ebe6d0e08f6e2e34310e6d6a2cfdace67bb2
-
SSDEEP
6144:KDy+bnr+Ip0yN90QEFXUyhWbmhXparmS24wcHgeGm4GtOnz9OX:lMrAy90vXVFh1pWOzcX
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000230c8-145.dat healer behavioral1/files/0x00080000000230c8-146.dat healer behavioral1/memory/4496-147-0x0000000000730000-0x000000000073A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p5200068.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p5200068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p5200068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p5200068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p5200068.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p5200068.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2020 z5175182.exe 4496 p5200068.exe 5000 r2662669.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p5200068.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5175182.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5175182.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4496 p5200068.exe 4496 p5200068.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4496 p5200068.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2020 1684 8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe 86 PID 1684 wrote to memory of 2020 1684 8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe 86 PID 1684 wrote to memory of 2020 1684 8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe 86 PID 2020 wrote to memory of 4496 2020 z5175182.exe 87 PID 2020 wrote to memory of 4496 2020 z5175182.exe 87 PID 2020 wrote to memory of 5000 2020 z5175182.exe 93 PID 2020 wrote to memory of 5000 2020 z5175182.exe 93 PID 2020 wrote to memory of 5000 2020 z5175182.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe"C:\Users\Admin\AppData\Local\Temp\8cd8d79f382743c1f225c33e26ca87ce3e02be794f81bc27a2a4246ad9fac15d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5175182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5175182.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5200068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5200068.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2662669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2662669.exe3⤵
- Executes dropped EXE
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD56a5c2ac15220205aab9f6ff76d246913
SHA15d8ddfdee8b705e8b1f4025eaff1aaa7e96405ea
SHA256252aa130a8bea105e6a6f714e42d2c6ab49630e2d6c00293a9d22574aeb51df6
SHA51254018614f3c09899c52d4bc3ef038d5df9fd3fdac25cdbfbe38924515890545f2ee1e149589f65584106f123ca27cf3c6b1ee2da944a9d313bddbbf1226fb802
-
Filesize
206KB
MD56a5c2ac15220205aab9f6ff76d246913
SHA15d8ddfdee8b705e8b1f4025eaff1aaa7e96405ea
SHA256252aa130a8bea105e6a6f714e42d2c6ab49630e2d6c00293a9d22574aeb51df6
SHA51254018614f3c09899c52d4bc3ef038d5df9fd3fdac25cdbfbe38924515890545f2ee1e149589f65584106f123ca27cf3c6b1ee2da944a9d313bddbbf1226fb802
-
Filesize
15KB
MD55def9eecaa204f613f22ee01ea28c840
SHA1b70edb04bec15813304e3117358085ec56016c1f
SHA2565bbe4e1cae2d894bb6d05a272da690d3e7300398df6704dc60059ecb24840e66
SHA51287945b1c788fb61b6cfa7ae659281527d4c7223fdb42338fc9601f7e9f9947b2996d54f76c77bca3afae50cc9697226aed6097b597c23ad36240f986ab6ab528
-
Filesize
15KB
MD55def9eecaa204f613f22ee01ea28c840
SHA1b70edb04bec15813304e3117358085ec56016c1f
SHA2565bbe4e1cae2d894bb6d05a272da690d3e7300398df6704dc60059ecb24840e66
SHA51287945b1c788fb61b6cfa7ae659281527d4c7223fdb42338fc9601f7e9f9947b2996d54f76c77bca3afae50cc9697226aed6097b597c23ad36240f986ab6ab528
-
Filesize
175KB
MD5051e2b6071d0f3d9c9ddccacb3152a10
SHA182813a087108a606dfac35f9309b45362adc890d
SHA2561edb380fb15797b25ff1d6cc631dade15d6cba075e4291c1df3d943e7f10c144
SHA512840aeba121f73d1f07aa21fb8737e42333879a09ca390670c45822361a3a00e12a1bf35a368718f6956c66ef3db10fb40f2ede438ade3928ac4c253cc94cda42
-
Filesize
175KB
MD5051e2b6071d0f3d9c9ddccacb3152a10
SHA182813a087108a606dfac35f9309b45362adc890d
SHA2561edb380fb15797b25ff1d6cc631dade15d6cba075e4291c1df3d943e7f10c144
SHA512840aeba121f73d1f07aa21fb8737e42333879a09ca390670c45822361a3a00e12a1bf35a368718f6956c66ef3db10fb40f2ede438ade3928ac4c253cc94cda42