Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 07:32
Static task
static1
Behavioral task
behavioral1
Sample
b4c1293dce1605a1556693303e88cd64.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b4c1293dce1605a1556693303e88cd64.exe
Resource
win10v2004-20230703-en
General
-
Target
b4c1293dce1605a1556693303e88cd64.exe
-
Size
389KB
-
MD5
b4c1293dce1605a1556693303e88cd64
-
SHA1
5b36befa445ad4a4407d146f65fa73481c4e7fb5
-
SHA256
6388154b88d7e6430e048e6b44ae647527fea9bb48918f678b04600396fd9095
-
SHA512
8dfd45f57faa3b2140675eb081d87823643a0024a544575a9d7803414ec7100bc1ad39e2b03fdcad04d6cc8293bbc86bc5bae9fa4452165c18160108915925fb
-
SSDEEP
12288:EMrUy90DroP4MYhD3nlF4ifHyA3s+MQh3d:wyi0xYhDX8HkTht
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023234-144.dat healer behavioral2/files/0x0007000000023234-146.dat healer behavioral2/memory/3632-147-0x0000000000E00000-0x0000000000E0A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8137477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8137477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8137477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8137477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8137477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8137477.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1768 z0632674.exe 3632 p8137477.exe 3476 r5541124.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8137477.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4c1293dce1605a1556693303e88cd64.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0632674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0632674.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b4c1293dce1605a1556693303e88cd64.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 p8137477.exe 3632 p8137477.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3632 p8137477.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 784 wrote to memory of 1768 784 b4c1293dce1605a1556693303e88cd64.exe 85 PID 784 wrote to memory of 1768 784 b4c1293dce1605a1556693303e88cd64.exe 85 PID 784 wrote to memory of 1768 784 b4c1293dce1605a1556693303e88cd64.exe 85 PID 1768 wrote to memory of 3632 1768 z0632674.exe 86 PID 1768 wrote to memory of 3632 1768 z0632674.exe 86 PID 1768 wrote to memory of 3476 1768 z0632674.exe 94 PID 1768 wrote to memory of 3476 1768 z0632674.exe 94 PID 1768 wrote to memory of 3476 1768 z0632674.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c1293dce1605a1556693303e88cd64.exe"C:\Users\Admin\AppData\Local\Temp\b4c1293dce1605a1556693303e88cd64.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exe3⤵
- Executes dropped EXE
PID:3476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD58ca0a12f0ae366aa1a0376551d08ebd9
SHA13449da575e4965dd1887828d88e557e79794aabf
SHA2564e5e20cd5b854ab4d217f6d7866b472fbbac74b6168298e88b2580d330ed36a2
SHA512fcd4f8b557e1878835107c626e8ecec40bc8cfb00456115de1a84430568e49b5b56d3818578eaf06a262b8acc15065a9ae721499669e12d9d58279025ebfa4ea
-
Filesize
206KB
MD58ca0a12f0ae366aa1a0376551d08ebd9
SHA13449da575e4965dd1887828d88e557e79794aabf
SHA2564e5e20cd5b854ab4d217f6d7866b472fbbac74b6168298e88b2580d330ed36a2
SHA512fcd4f8b557e1878835107c626e8ecec40bc8cfb00456115de1a84430568e49b5b56d3818578eaf06a262b8acc15065a9ae721499669e12d9d58279025ebfa4ea
-
Filesize
14KB
MD5706a2ee7c943943f563411c91f8d7cce
SHA129880e82414e8963a34dc70a7e67f794ced8e121
SHA2567d0ddac09ef5391e69ac6183eefcf5e5cdb29b8e2a866a6746ae3c9ff00f6c1f
SHA512076e429862726912767d9aa5224850d22cfa8a1f98d69116963d04ac6a85543a9fde9aa53a0eb2306bef2e8f686a328b6a1e991d82fe65bde0556202f738ecd7
-
Filesize
14KB
MD5706a2ee7c943943f563411c91f8d7cce
SHA129880e82414e8963a34dc70a7e67f794ced8e121
SHA2567d0ddac09ef5391e69ac6183eefcf5e5cdb29b8e2a866a6746ae3c9ff00f6c1f
SHA512076e429862726912767d9aa5224850d22cfa8a1f98d69116963d04ac6a85543a9fde9aa53a0eb2306bef2e8f686a328b6a1e991d82fe65bde0556202f738ecd7
-
Filesize
173KB
MD5170149de9393a2ae1a97b321a674ec9c
SHA1ed906575b5f1dd8b0b2a2d187a86b9ebac1b5483
SHA256227bf7cdc5170f203ae0046af121ca26ae4cbf3919a620b1c30a82b4aee77122
SHA512973dc3001cf3b4a77a0d01c5dc3e96687e968a2b1b5aafa795658c5b86e9c1c88cdd5e56d38cd9b1be239cbca95e6114e2d4d3d0f0ef81941bc54b7b296c0554
-
Filesize
173KB
MD5170149de9393a2ae1a97b321a674ec9c
SHA1ed906575b5f1dd8b0b2a2d187a86b9ebac1b5483
SHA256227bf7cdc5170f203ae0046af121ca26ae4cbf3919a620b1c30a82b4aee77122
SHA512973dc3001cf3b4a77a0d01c5dc3e96687e968a2b1b5aafa795658c5b86e9c1c88cdd5e56d38cd9b1be239cbca95e6114e2d4d3d0f0ef81941bc54b7b296c0554