Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2023 00:44
Static task
static1
Behavioral task
behavioral1
Sample
b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe
Resource
win10-20230703-en
General
-
Target
b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe
-
Size
389KB
-
MD5
db1285c69b32682a27f40ba7a828ca05
-
SHA1
0754e5cd55eddc0bc8ed3d6708a963506d7c8858
-
SHA256
b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721
-
SHA512
fce8c2f2f8a02f7925f71836c8dce97319e41504bf93814ee242a2619698a5689d0c66674c351bac7bdf6fafee5ef7da0f5683f4f56baa8816c8481c04c167f7
-
SSDEEP
6144:Kxy+bnr+yp0yN90QE/rlZdfkWcnZNbeZj7tj5yflGHz+pfHWZO+/WQ+YRk9qXQPJ:rMrWy90PD7jOB/WZOhgAPZv
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b000-132.dat healer behavioral1/files/0x000700000001b000-133.dat healer behavioral1/memory/2532-134-0x0000000000310000-0x000000000031A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p4710879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p4710879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p4710879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p4710879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p4710879.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5052 z8527774.exe 2532 p4710879.exe 4960 r1493742.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p4710879.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8527774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8527774.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2532 p4710879.exe 2532 p4710879.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 p4710879.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3552 wrote to memory of 5052 3552 b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe 70 PID 3552 wrote to memory of 5052 3552 b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe 70 PID 3552 wrote to memory of 5052 3552 b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe 70 PID 5052 wrote to memory of 2532 5052 z8527774.exe 71 PID 5052 wrote to memory of 2532 5052 z8527774.exe 71 PID 5052 wrote to memory of 4960 5052 z8527774.exe 72 PID 5052 wrote to memory of 4960 5052 z8527774.exe 72 PID 5052 wrote to memory of 4960 5052 z8527774.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe"C:\Users\Admin\AppData\Local\Temp\b30b630fda1f860877a95210200001a406a9a706d68b4dbc069ce69efa1b6721.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8527774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8527774.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4710879.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4710879.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1493742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1493742.exe3⤵
- Executes dropped EXE
PID:4960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD50a92936789790ce73ad02900fd7ef397
SHA1128b5794f978a2dcb5268b198f03d9988e92f214
SHA25697d317ec497af7f914f6a6c06d44fb867c703c2af7b1bb61f6a1536351648600
SHA512a1ac2fb0af17eeab445d61c6313473448d43ef0598c458b6dd99864cac2550834659c0be28e9ee8abd48e1dd2ab5a5ebbaa3fbdac0a4c0bb60948b78ff9c116b
-
Filesize
206KB
MD50a92936789790ce73ad02900fd7ef397
SHA1128b5794f978a2dcb5268b198f03d9988e92f214
SHA25697d317ec497af7f914f6a6c06d44fb867c703c2af7b1bb61f6a1536351648600
SHA512a1ac2fb0af17eeab445d61c6313473448d43ef0598c458b6dd99864cac2550834659c0be28e9ee8abd48e1dd2ab5a5ebbaa3fbdac0a4c0bb60948b78ff9c116b
-
Filesize
14KB
MD5194aa2bc612a4818bf604895bb0cb561
SHA170a7dbf0d24454348ad9da64be006cda914c7625
SHA256f4a1e9a78ea957bd9e4a2c6d0eccca8af0d16c3671a2f1020c26e38fdeadb17c
SHA512e0c7278a90d55c6fe6e1d139b5662795ae08b85347785ba592926eacd1032aee3660a13180617c37a83b1efb146e5c6b078d82f1650c53cce2b94a0ea616771c
-
Filesize
14KB
MD5194aa2bc612a4818bf604895bb0cb561
SHA170a7dbf0d24454348ad9da64be006cda914c7625
SHA256f4a1e9a78ea957bd9e4a2c6d0eccca8af0d16c3671a2f1020c26e38fdeadb17c
SHA512e0c7278a90d55c6fe6e1d139b5662795ae08b85347785ba592926eacd1032aee3660a13180617c37a83b1efb146e5c6b078d82f1650c53cce2b94a0ea616771c
-
Filesize
173KB
MD51a71bf6f625555157bbbe9dd402f490e
SHA1177c466fbff7ec6480d058869775dfd22bfda206
SHA2561b1cb33e08db38930434b31e92369b95d96a77dbbadd4b375c92877cb19027ad
SHA512020d2116045daeaa04d7c473e67e13595a8a87b5f112606634a31d85fd31d6fae8d913923dd80055e2da349c4196e5ea300b3a4406dd4b75f0f2664d95127102
-
Filesize
173KB
MD51a71bf6f625555157bbbe9dd402f490e
SHA1177c466fbff7ec6480d058869775dfd22bfda206
SHA2561b1cb33e08db38930434b31e92369b95d96a77dbbadd4b375c92877cb19027ad
SHA512020d2116045daeaa04d7c473e67e13595a8a87b5f112606634a31d85fd31d6fae8d913923dd80055e2da349c4196e5ea300b3a4406dd4b75f0f2664d95127102