Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 05:40
Static task
static1
Behavioral task
behavioral1
Sample
4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe
Resource
win10v2004-20230703-en
General
-
Target
4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe
-
Size
389KB
-
MD5
073f84f40946716ae47ea59af7fc3979
-
SHA1
f39ce1dd5b30a263986c6831bc7bf4b662b3ce5c
-
SHA256
4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675
-
SHA512
7a9758b20b794cac8a5a9e8dae5fb55f6cfb5b69e8ab5ab804088e67975436826746e5fe18473f56e4544bf148c35dc1a1029768bf3262e58372afbc7d9ca93a
-
SSDEEP
6144:KGy+bnr+xp0yN90QESFxnVkONlvhYZbG7qMh+hn0E3+YIu5ly4RChw/:yMrFy90wSONcbG75w3+YNly2Chw/
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002323b-146.dat healer behavioral1/files/0x000800000002323b-145.dat healer behavioral1/memory/4256-147-0x0000000000610000-0x000000000061A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p4607821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p4607821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p4607821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p4607821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p4607821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p4607821.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2324 z0401173.exe 4256 p4607821.exe 2976 r1698980.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p4607821.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0401173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0401173.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4256 p4607821.exe 4256 p4607821.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4256 p4607821.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2324 2672 4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe 86 PID 2672 wrote to memory of 2324 2672 4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe 86 PID 2672 wrote to memory of 2324 2672 4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe 86 PID 2324 wrote to memory of 4256 2324 z0401173.exe 87 PID 2324 wrote to memory of 4256 2324 z0401173.exe 87 PID 2324 wrote to memory of 2976 2324 z0401173.exe 95 PID 2324 wrote to memory of 2976 2324 z0401173.exe 95 PID 2324 wrote to memory of 2976 2324 z0401173.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe"C:\Users\Admin\AppData\Local\Temp\4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0401173.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0401173.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4607821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4607821.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1698980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1698980.exe3⤵
- Executes dropped EXE
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54e23e3ed92f482907c31141926908a4f
SHA16a090640bedf02b74bb7dad0b75c380d444f73fc
SHA256239a61d49eb6b626bd249926a1a3225d6005efe83cfbf21091cd381af22172d7
SHA512273e0ad97c40f1f70375251e66ce7f33bf54ae6dc068fdb3156925f59433009a16835ea1e528ab1422c26952b3835f62aff4ef267749978ad0e7725133920e8d
-
Filesize
206KB
MD54e23e3ed92f482907c31141926908a4f
SHA16a090640bedf02b74bb7dad0b75c380d444f73fc
SHA256239a61d49eb6b626bd249926a1a3225d6005efe83cfbf21091cd381af22172d7
SHA512273e0ad97c40f1f70375251e66ce7f33bf54ae6dc068fdb3156925f59433009a16835ea1e528ab1422c26952b3835f62aff4ef267749978ad0e7725133920e8d
-
Filesize
14KB
MD524680878da0cdb572f04dee724eb6374
SHA1e541d64aadaa8bbc00544fe62476886e15ffbe48
SHA2561ec13c26ada790637e7432690f135d84911e69be30fffbc673c0e63e2c7d1c3f
SHA5129196bb471e2a2eac844320afc95198af35c06d7c87dfd39779c69f1856fcec452c30dd61b1117eef825566cfee1e6f2b0962fed07fae269cd502263b008b5779
-
Filesize
14KB
MD524680878da0cdb572f04dee724eb6374
SHA1e541d64aadaa8bbc00544fe62476886e15ffbe48
SHA2561ec13c26ada790637e7432690f135d84911e69be30fffbc673c0e63e2c7d1c3f
SHA5129196bb471e2a2eac844320afc95198af35c06d7c87dfd39779c69f1856fcec452c30dd61b1117eef825566cfee1e6f2b0962fed07fae269cd502263b008b5779
-
Filesize
173KB
MD542d0dd8ee8b60ffcca10b682dccea2a2
SHA1d6069d38777c71e088d5addc73f6cce3a4bc8bd6
SHA256b0df05a1010f5da959d2539eb1014155e1859164aac2df73acd63a4990c97be4
SHA512ef304513350ff736d53cbfd87973cacdfe7251edc94cf57f75bfcfa3bc73f63116cc8bd931e25fe9f75718f344667c8a36706bd0c179e0678423a9c50842aa92
-
Filesize
173KB
MD542d0dd8ee8b60ffcca10b682dccea2a2
SHA1d6069d38777c71e088d5addc73f6cce3a4bc8bd6
SHA256b0df05a1010f5da959d2539eb1014155e1859164aac2df73acd63a4990c97be4
SHA512ef304513350ff736d53cbfd87973cacdfe7251edc94cf57f75bfcfa3bc73f63116cc8bd931e25fe9f75718f344667c8a36706bd0c179e0678423a9c50842aa92