Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe
Resource
win10v2004-20230703-en
General
-
Target
b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe
-
Size
389KB
-
MD5
8a0f4289b99fb33def3140c849321cdd
-
SHA1
48ce800243b80391979c1efbf4a2e30b5bf04331
-
SHA256
b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b
-
SHA512
3c489c6560eb56f797565e21a45df81daabe2e96d3d3847cf503068430e43c8942484d7f34e3a06932dc024b7fefeca14a13de37645f38078dc5d43f89cbae1a
-
SSDEEP
6144:KHy+bnr+Vp0yN90QEmjAlrUolD7dxXMuiGVHyjZhOZTpC/ZwglZQ5Gfh45639X:NMrNy90YACoHxcpyH8ruT+vZC639X
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231cd-145.dat healer behavioral1/files/0x00080000000231cd-146.dat healer behavioral1/memory/3180-147-0x0000000000140000-0x000000000014A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2930872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2930872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2930872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2930872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2930872.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2930872.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 228 z4607495.exe 3180 p2930872.exe 2840 r2975905.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2930872.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4607495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4607495.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 112 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 p2930872.exe 3180 p2930872.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3180 p2930872.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1132 wrote to memory of 228 1132 b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe 85 PID 1132 wrote to memory of 228 1132 b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe 85 PID 1132 wrote to memory of 228 1132 b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe 85 PID 228 wrote to memory of 3180 228 z4607495.exe 86 PID 228 wrote to memory of 3180 228 z4607495.exe 86 PID 228 wrote to memory of 2840 228 z4607495.exe 92 PID 228 wrote to memory of 2840 228 z4607495.exe 92 PID 228 wrote to memory of 2840 228 z4607495.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe"C:\Users\Admin\AppData\Local\Temp\b7d32dd66507f98e67e516220048ce3e47cbb10af251b92ca19db22a85ab667b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4607495.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4607495.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2930872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2930872.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2975905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2975905.exe3⤵
- Executes dropped EXE
PID:2840
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5bf383e9a76d71a62d67d160f8fa32736
SHA182fccf39a682e2e886e391aadbfe18ece416e96f
SHA2569fd26aeb608850d590d6cdcc331b818a38fef6aed4ef3d0c5208269b61ac3f11
SHA51214fd709a9a08b0a79d7bf41bf7447988d7aed56dfd78e01d44e56660617e17c70a645df04e70cd02d64606d10c74ebe88d82e905296026436873b5a0bdc7ff39
-
Filesize
206KB
MD5bf383e9a76d71a62d67d160f8fa32736
SHA182fccf39a682e2e886e391aadbfe18ece416e96f
SHA2569fd26aeb608850d590d6cdcc331b818a38fef6aed4ef3d0c5208269b61ac3f11
SHA51214fd709a9a08b0a79d7bf41bf7447988d7aed56dfd78e01d44e56660617e17c70a645df04e70cd02d64606d10c74ebe88d82e905296026436873b5a0bdc7ff39
-
Filesize
15KB
MD529720c95922396b5de277a0ef0490e2c
SHA145085fc978beb18eb2c5c5c11c03c4bffc969f0d
SHA25654c68039fa0bc5d0fccbf8f2f80aaaf1b52946d8e66fbf3b31cb5572a4fdce5f
SHA5127055d72d814fa7233d93b23b32a0574d351dc746bc3fc05e525ec82992b14514f919fd1b9c8a50d069e4622395c9b380b690a34e68d96c24a93e3d8379c82074
-
Filesize
15KB
MD529720c95922396b5de277a0ef0490e2c
SHA145085fc978beb18eb2c5c5c11c03c4bffc969f0d
SHA25654c68039fa0bc5d0fccbf8f2f80aaaf1b52946d8e66fbf3b31cb5572a4fdce5f
SHA5127055d72d814fa7233d93b23b32a0574d351dc746bc3fc05e525ec82992b14514f919fd1b9c8a50d069e4622395c9b380b690a34e68d96c24a93e3d8379c82074
-
Filesize
174KB
MD5c29e8532175c0991e7022ff4ef3f15c2
SHA19b2bac731a7a698113c2ad82d50321f256de97e4
SHA256a8a73973c98920fcb4db2d019dd3c9eecb798a12797ca47c2d30d076c67d7776
SHA5126a81e304ba105d758b012b3f2cadc418bea4d02f0c1322acba3d4257cb74fd71be7ebe903159f941f2f35315af1c32c7b05be79989da35552ca7e52bcc023049
-
Filesize
174KB
MD5c29e8532175c0991e7022ff4ef3f15c2
SHA19b2bac731a7a698113c2ad82d50321f256de97e4
SHA256a8a73973c98920fcb4db2d019dd3c9eecb798a12797ca47c2d30d076c67d7776
SHA5126a81e304ba105d758b012b3f2cadc418bea4d02f0c1322acba3d4257cb74fd71be7ebe903159f941f2f35315af1c32c7b05be79989da35552ca7e52bcc023049