Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20-07-2023 02:19
Static task
static1
Behavioral task
behavioral1
Sample
31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe
Resource
win10-20230703-en
General
-
Target
31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe
-
Size
389KB
-
MD5
1df37ffd68e024a5b20554e7ecf8f01c
-
SHA1
ce893db0e5882090dfe9755d9f49f5d40348d0e1
-
SHA256
31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff
-
SHA512
3a23e1dccf286d380b2474948134273397edf703de553c9f663a4c13f7f938176e9f86271973f8996fe19dff9cf070962c964949fec320f85194515735fd993d
-
SSDEEP
6144:Koy+bnr+np0yN90QEDvwHiW0FKFA8/6CCmRnn4JZHVxHY0NSSWj6xwp5/:0MrHy90BYHi7FPzrU47HHY0NSf6xo5/
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000600000001b00a-129.dat healer behavioral1/files/0x000600000001b00a-130.dat healer behavioral1/memory/4936-131-0x00000000008E0000-0x00000000008EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2923306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2923306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2923306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2923306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2923306.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5048 z6281494.exe 4936 p2923306.exe 2156 r6312869.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2923306.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6281494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6281494.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4936 p2923306.exe 4936 p2923306.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4936 p2923306.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2540 wrote to memory of 5048 2540 31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe 70 PID 2540 wrote to memory of 5048 2540 31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe 70 PID 2540 wrote to memory of 5048 2540 31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe 70 PID 5048 wrote to memory of 4936 5048 z6281494.exe 71 PID 5048 wrote to memory of 4936 5048 z6281494.exe 71 PID 5048 wrote to memory of 2156 5048 z6281494.exe 72 PID 5048 wrote to memory of 2156 5048 z6281494.exe 72 PID 5048 wrote to memory of 2156 5048 z6281494.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe"C:\Users\Admin\AppData\Local\Temp\31969f0a5dbca92dd2739cfdb7651a0ceb4af5b7d20ce617bee30479d1424fff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6281494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6281494.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2923306.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2923306.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6312869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6312869.exe3⤵
- Executes dropped EXE
PID:2156
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD58d96ad1f7fa49d8633862c67c1d27f79
SHA1a9bfe69c3423b87342338af1a7fd772ded69ecaf
SHA2563b53cb9c3da05503476d1ab26e61e2a120bc5316542c0feafe5547ff0edc274b
SHA5127c12caa96a7eeeb5644573ad978686857facb70986cadc94c4231923d4c94a28a64615a9e2d7cfb6974b3d0c813a79ecd91bc249044b492cfec481db74778a8b
-
Filesize
206KB
MD58d96ad1f7fa49d8633862c67c1d27f79
SHA1a9bfe69c3423b87342338af1a7fd772ded69ecaf
SHA2563b53cb9c3da05503476d1ab26e61e2a120bc5316542c0feafe5547ff0edc274b
SHA5127c12caa96a7eeeb5644573ad978686857facb70986cadc94c4231923d4c94a28a64615a9e2d7cfb6974b3d0c813a79ecd91bc249044b492cfec481db74778a8b
-
Filesize
14KB
MD50a150139bc07a4465b0111d616ac5b0f
SHA19a3183beba4a48162702c3346aa54108407f5bf0
SHA25650b3cee09834d4a2900eb1808cf7bf47f670381ef1f9769c3f1cd5bffd89067a
SHA5121fe04b1d233be86fea4b10432ed50ad48dcf451c597ff2eb7e9b5566a8002eb2079d0e79df02adfd5780cad6c7a107101aa963e0f8805fda0f932ecb8c7aebcf
-
Filesize
14KB
MD50a150139bc07a4465b0111d616ac5b0f
SHA19a3183beba4a48162702c3346aa54108407f5bf0
SHA25650b3cee09834d4a2900eb1808cf7bf47f670381ef1f9769c3f1cd5bffd89067a
SHA5121fe04b1d233be86fea4b10432ed50ad48dcf451c597ff2eb7e9b5566a8002eb2079d0e79df02adfd5780cad6c7a107101aa963e0f8805fda0f932ecb8c7aebcf
-
Filesize
173KB
MD5f794af4c81107accee845f34044fec6f
SHA1f8066eb6879fda06246d2214cf767c4e86bb3e94
SHA256a71342545d2e6d42c7677f3ab2620e340ca5198bae4e6da96737b5b84683d86d
SHA512cd7b8aff3bf2f0162d5de60772ba0eb3405409860997173724cdb3caa2e84ad7103c46de2bb41ec4e97d775fa55b0d36694b42b90bbebf9b06d8c6e2c57f07ca
-
Filesize
173KB
MD5f794af4c81107accee845f34044fec6f
SHA1f8066eb6879fda06246d2214cf767c4e86bb3e94
SHA256a71342545d2e6d42c7677f3ab2620e340ca5198bae4e6da96737b5b84683d86d
SHA512cd7b8aff3bf2f0162d5de60772ba0eb3405409860997173724cdb3caa2e84ad7103c46de2bb41ec4e97d775fa55b0d36694b42b90bbebf9b06d8c6e2c57f07ca