Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2023, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe
Resource
win10-20230703-en
General
-
Target
9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe
-
Size
389KB
-
MD5
def8a2452dfb5e41c3acdd0d3055b4e5
-
SHA1
e6d0591c1b6af46ca20fd4fe3152a552ca370617
-
SHA256
9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d
-
SHA512
03466a86e3bf5076c944bda6ba4f6ade9ab66051561ad30b6a18732a41592f691807ddf9a7e7496d44408acb996e6760831e8090e242701f9a20f10bba1fefd8
-
SSDEEP
12288:IMr3y90j6IzPNnpo5WZ/2ag+AjEnrEWZZyvppo:/ycDNnPZ/2aej1cN
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afc3-132.dat healer behavioral1/files/0x000700000001afc3-133.dat healer behavioral1/memory/692-134-0x00000000005F0000-0x00000000005FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p5133600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p5133600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p5133600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p5133600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p5133600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4776 z8369243.exe 692 p5133600.exe 4436 r8347735.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p5133600.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8369243.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8369243.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 692 p5133600.exe 692 p5133600.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 692 p5133600.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4776 4704 9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe 70 PID 4704 wrote to memory of 4776 4704 9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe 70 PID 4704 wrote to memory of 4776 4704 9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe 70 PID 4776 wrote to memory of 692 4776 z8369243.exe 71 PID 4776 wrote to memory of 692 4776 z8369243.exe 71 PID 4776 wrote to memory of 4436 4776 z8369243.exe 72 PID 4776 wrote to memory of 4436 4776 z8369243.exe 72 PID 4776 wrote to memory of 4436 4776 z8369243.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe"C:\Users\Admin\AppData\Local\Temp\9e39e15db7d8e103bbc91bc4fc682f420da1e249db4a416b8956adc64309690d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8369243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8369243.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5133600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5133600.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8347735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8347735.exe3⤵
- Executes dropped EXE
PID:4436
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5922a6287834a386b4ecbb2df87b642ea
SHA16b632e75e22ccaf9a77a2b88c785a554e513e21d
SHA256e18b111e7cc77b3214811c36d66351ed5e0fa01d11f19eafb16b6ea99bea5dc4
SHA512c40ee0ae8f9fe366d4e54d32aa4b1fefc7a817381af86138b6f262201591d38938378d1182d81eeae26e7b4a2765fc1888bcaa4891a8325b9479e0b91886155d
-
Filesize
206KB
MD5922a6287834a386b4ecbb2df87b642ea
SHA16b632e75e22ccaf9a77a2b88c785a554e513e21d
SHA256e18b111e7cc77b3214811c36d66351ed5e0fa01d11f19eafb16b6ea99bea5dc4
SHA512c40ee0ae8f9fe366d4e54d32aa4b1fefc7a817381af86138b6f262201591d38938378d1182d81eeae26e7b4a2765fc1888bcaa4891a8325b9479e0b91886155d
-
Filesize
15KB
MD5634c8902516ad541a29b80f91bbff625
SHA1832705858a029391736f62cc75f67be2dd0af676
SHA2565aa1036cf6005ff38515632aafa8d71c861fd4544c704aca4e3ebf4a951fe4cb
SHA512501baa65f08101235ac1eab79c2a7f0cc44561f60573d61a2a684fdaab319dba0111cf8ee71ef29d56688bf0510e8e29943ed02cbb2048a995e0da9307002527
-
Filesize
15KB
MD5634c8902516ad541a29b80f91bbff625
SHA1832705858a029391736f62cc75f67be2dd0af676
SHA2565aa1036cf6005ff38515632aafa8d71c861fd4544c704aca4e3ebf4a951fe4cb
SHA512501baa65f08101235ac1eab79c2a7f0cc44561f60573d61a2a684fdaab319dba0111cf8ee71ef29d56688bf0510e8e29943ed02cbb2048a995e0da9307002527
-
Filesize
174KB
MD56157465725d4abe70728eafd53a67c37
SHA1b497d8e0b9bfde015e039f16494962cefd9647cb
SHA256a65369fced97407132a773433825ac96149ff055e6963a62c18e15ca5fbe18c2
SHA51211eebd02ee81d794cbd608168f2f3fe0491bd7c2a3d8f86574d962f4eb7e3b2301eaa517f727be044cdde67e3f0a7d357b40e32e95b1ff10d2508b78198422fd
-
Filesize
174KB
MD56157465725d4abe70728eafd53a67c37
SHA1b497d8e0b9bfde015e039f16494962cefd9647cb
SHA256a65369fced97407132a773433825ac96149ff055e6963a62c18e15ca5fbe18c2
SHA51211eebd02ee81d794cbd608168f2f3fe0491bd7c2a3d8f86574d962f4eb7e3b2301eaa517f727be044cdde67e3f0a7d357b40e32e95b1ff10d2508b78198422fd