Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 10:13
Static task
static1
Behavioral task
behavioral1
Sample
be20e8d108cf9e94319678c0f61393d4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
be20e8d108cf9e94319678c0f61393d4.exe
Resource
win10v2004-20230703-en
General
-
Target
be20e8d108cf9e94319678c0f61393d4.exe
-
Size
389KB
-
MD5
be20e8d108cf9e94319678c0f61393d4
-
SHA1
9ca7da9916d071095a2985ecb2408f24f9978453
-
SHA256
277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94
-
SHA512
4a60a1bb61a320deabeeebb508685a024c2b6c1d065221bc5a2682a90193300899d49e355675b84293875486cd08e94d582c95df886ca3330bef74cb0921afca
-
SSDEEP
6144:KPy+bnr+Lp0yN90QE9dx9l253NzJGHDRezddZ5ULvrGEf51/HmbTME:FMr7y90P25uFEnwrGEr/YT5
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023264-145.dat healer behavioral2/files/0x0008000000023264-146.dat healer behavioral2/memory/3144-147-0x00000000005F0000-0x00000000005FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3758178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3758178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3758178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3758178.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3758178.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3758178.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3176 z1369519.exe 3144 p3758178.exe 1520 r2710542.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3758178.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be20e8d108cf9e94319678c0f61393d4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1369519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1369519.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce be20e8d108cf9e94319678c0f61393d4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3144 p3758178.exe 3144 p3758178.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3144 p3758178.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3176 3328 be20e8d108cf9e94319678c0f61393d4.exe 85 PID 3328 wrote to memory of 3176 3328 be20e8d108cf9e94319678c0f61393d4.exe 85 PID 3328 wrote to memory of 3176 3328 be20e8d108cf9e94319678c0f61393d4.exe 85 PID 3176 wrote to memory of 3144 3176 z1369519.exe 86 PID 3176 wrote to memory of 3144 3176 z1369519.exe 86 PID 3176 wrote to memory of 1520 3176 z1369519.exe 90 PID 3176 wrote to memory of 1520 3176 z1369519.exe 90 PID 3176 wrote to memory of 1520 3176 z1369519.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\be20e8d108cf9e94319678c0f61393d4.exe"C:\Users\Admin\AppData\Local\Temp\be20e8d108cf9e94319678c0f61393d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1369519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1369519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3758178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3758178.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2710542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2710542.exe3⤵
- Executes dropped EXE
PID:1520
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f34c885bc0878d18d10ff2a2bcab37bf
SHA1183ec4b6099090f5e12f2977855a5b8a47434b11
SHA256bc0bd82e116a9895ebc746eb946211813684173fb091a3b5beb68d633d8f8ed7
SHA512ac17cb90087c25fec2966c8ef59192b88d9ae2752d235af76a9b7e73900319750aef27becf5877f89560046b0c0cb43d2901cd501a032295f354fb2f7b27495d
-
Filesize
206KB
MD5f34c885bc0878d18d10ff2a2bcab37bf
SHA1183ec4b6099090f5e12f2977855a5b8a47434b11
SHA256bc0bd82e116a9895ebc746eb946211813684173fb091a3b5beb68d633d8f8ed7
SHA512ac17cb90087c25fec2966c8ef59192b88d9ae2752d235af76a9b7e73900319750aef27becf5877f89560046b0c0cb43d2901cd501a032295f354fb2f7b27495d
-
Filesize
14KB
MD5452bb0fa072d8b5b84e96b8135b88a33
SHA1958d7ebe07651e7de76fa57dad744174a6948840
SHA256e4864ebb7779217e5e02467385f0e1b64b27e1eda7c6ce12c81fa2ba5886d6af
SHA5121f7f6066b5b8c076894aed53d85f46a9c643d41a5faebc84400437bcb797a9b220c70b75be4139c9213121c841e868f2677096bbd167f3f151d7b3152cbdad9b
-
Filesize
14KB
MD5452bb0fa072d8b5b84e96b8135b88a33
SHA1958d7ebe07651e7de76fa57dad744174a6948840
SHA256e4864ebb7779217e5e02467385f0e1b64b27e1eda7c6ce12c81fa2ba5886d6af
SHA5121f7f6066b5b8c076894aed53d85f46a9c643d41a5faebc84400437bcb797a9b220c70b75be4139c9213121c841e868f2677096bbd167f3f151d7b3152cbdad9b
-
Filesize
174KB
MD529d290bc7cf52245c18068dd18a2b56b
SHA180834b85700772615c39a38757267968e32f3240
SHA256f66d99d19231a0f6abba5374f8916cdcb478e715c50f29d6e436e54ee0e2db44
SHA51286e90ae7c792bbae7bba8f0ee029c71233e540d74f9786aa3c5f381d2394ce7aa72c5cd6045eb9410821e59ba201558da773fc14e267cff0ca09ccc4a5314bed
-
Filesize
174KB
MD529d290bc7cf52245c18068dd18a2b56b
SHA180834b85700772615c39a38757267968e32f3240
SHA256f66d99d19231a0f6abba5374f8916cdcb478e715c50f29d6e436e54ee0e2db44
SHA51286e90ae7c792bbae7bba8f0ee029c71233e540d74f9786aa3c5f381d2394ce7aa72c5cd6045eb9410821e59ba201558da773fc14e267cff0ca09ccc4a5314bed