Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
cf6809e9e8bb20cf3fac50872e8f28ae.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cf6809e9e8bb20cf3fac50872e8f28ae.exe
Resource
win10v2004-20230703-en
General
-
Target
cf6809e9e8bb20cf3fac50872e8f28ae.exe
-
Size
389KB
-
MD5
cf6809e9e8bb20cf3fac50872e8f28ae
-
SHA1
601dd183283b57368370eba9d3b5c20b9bf410e5
-
SHA256
132b4ea4fb442c501afaecf9c88242e2d2bd3cfca6cceb2fb3b4f610dbd1eecd
-
SHA512
6fcc1b9b2251bc56fb32e77b269056d086cbb0eb89211044380147f6bf1b2be2ea2913dcc13a598fe7da3de1cf73568649affdd4cf4a04575ecee5afbd9db843
-
SSDEEP
6144:K8y+bnr+zp0yN90QE7LetLJSRHf6baT5E5CXF2l8Iue3XvC6JpEBUUyYweE/0X:gMrjy90A/05xXF4TuAxEqDYweP
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023268-145.dat healer behavioral2/files/0x0008000000023268-146.dat healer behavioral2/memory/3372-147-0x0000000000D70000-0x0000000000D7A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p6678684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p6678684.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p6678684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p6678684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p6678684.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p6678684.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4452 z5645134.exe 3372 p6678684.exe 2200 r3658126.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p6678684.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf6809e9e8bb20cf3fac50872e8f28ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf6809e9e8bb20cf3fac50872e8f28ae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5645134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5645134.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4952 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3372 p6678684.exe 3372 p6678684.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3372 p6678684.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 752 wrote to memory of 4452 752 cf6809e9e8bb20cf3fac50872e8f28ae.exe 85 PID 752 wrote to memory of 4452 752 cf6809e9e8bb20cf3fac50872e8f28ae.exe 85 PID 752 wrote to memory of 4452 752 cf6809e9e8bb20cf3fac50872e8f28ae.exe 85 PID 4452 wrote to memory of 3372 4452 z5645134.exe 86 PID 4452 wrote to memory of 3372 4452 z5645134.exe 86 PID 4452 wrote to memory of 2200 4452 z5645134.exe 94 PID 4452 wrote to memory of 2200 4452 z5645134.exe 94 PID 4452 wrote to memory of 2200 4452 z5645134.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6809e9e8bb20cf3fac50872e8f28ae.exe"C:\Users\Admin\AppData\Local\Temp\cf6809e9e8bb20cf3fac50872e8f28ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5645134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5645134.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6678684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6678684.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3658126.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3658126.exe3⤵
- Executes dropped EXE
PID:2200
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD57dd916ad4ab4cae01954aa53d4ec9233
SHA11ba48ec474e1f117f4286274210f6e20eb7369fb
SHA2560bf8d9a97ad152ffd2d7a55127ce421f8f24a802a890988abe678d18413bc320
SHA512925e017e31db29c5f85e197affff40dc1d7590960f14c6996609fe56d1fbbbce4d9d088292c6ab5b24d303bccc31ba9ed291f035f331911f9f921387c1fc5090
-
Filesize
206KB
MD57dd916ad4ab4cae01954aa53d4ec9233
SHA11ba48ec474e1f117f4286274210f6e20eb7369fb
SHA2560bf8d9a97ad152ffd2d7a55127ce421f8f24a802a890988abe678d18413bc320
SHA512925e017e31db29c5f85e197affff40dc1d7590960f14c6996609fe56d1fbbbce4d9d088292c6ab5b24d303bccc31ba9ed291f035f331911f9f921387c1fc5090
-
Filesize
14KB
MD5028e47da14603ca389815a46a9839026
SHA178061b0ea92b65af956577752ba0848a412259bd
SHA256cc0f310f6643e7a292fd99a1b22c3c4dc7ecb6cc6dc900f6c16c14dc7775db7b
SHA51289b62bd8646491a309ae97259aaeed9fb0827cf7872ef015da535ba76c355323ff2c6fda97ed9adea794c0a5bd6979cefda94a1139f8d45b5389931362238b8a
-
Filesize
14KB
MD5028e47da14603ca389815a46a9839026
SHA178061b0ea92b65af956577752ba0848a412259bd
SHA256cc0f310f6643e7a292fd99a1b22c3c4dc7ecb6cc6dc900f6c16c14dc7775db7b
SHA51289b62bd8646491a309ae97259aaeed9fb0827cf7872ef015da535ba76c355323ff2c6fda97ed9adea794c0a5bd6979cefda94a1139f8d45b5389931362238b8a
-
Filesize
173KB
MD56585a9a3be7de6287d7ab54773681a2a
SHA1b69031d640285e96aed455db8cb7153e893cefcf
SHA2564ae5b586eb3adafe8474d1a45c92677a299edf4847d429f3479b65b73a0114f9
SHA512680141bde3df9e994b2c21066ed205f8321a8605e9a2b3906605e8f5b85b28107577b17590ef914d70dc0b1c9df555b5174a90b8d3bf5a5ecc30c4c2b6cb5f33
-
Filesize
173KB
MD56585a9a3be7de6287d7ab54773681a2a
SHA1b69031d640285e96aed455db8cb7153e893cefcf
SHA2564ae5b586eb3adafe8474d1a45c92677a299edf4847d429f3479b65b73a0114f9
SHA512680141bde3df9e994b2c21066ed205f8321a8605e9a2b3906605e8f5b85b28107577b17590ef914d70dc0b1c9df555b5174a90b8d3bf5a5ecc30c4c2b6cb5f33