Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 08:53
Static task
static1
Behavioral task
behavioral1
Sample
dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe
Resource
win10v2004-20230703-en
General
-
Target
dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe
-
Size
389KB
-
MD5
f7d34b7643b7df4d83458c5f60559058
-
SHA1
0ca3f570fce4b8ec914c04101d97baec523ccaa2
-
SHA256
dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5
-
SHA512
e548c1bded97fd1a56b9ee702aa38f0811d86d9b67ef18b42babb11388fd9a749be2dc7b5e6c8ccafa2ca0d9e0440d69b17e5b22680aa777dc293897f5c9f8c2
-
SSDEEP
6144:Kwy+bnr+zp0yN90QEIn7RaewstBVjfqs5de1SnsRQHfmnZj5FX4harndRG3NACP:EMr/y90WNvVjfj5deoopV5yBNAi
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002321d-145.dat healer behavioral1/files/0x000800000002321d-146.dat healer behavioral1/memory/4884-147-0x0000000000E40000-0x0000000000E4A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3636958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3636958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3636958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3636958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3636958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3636958.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2176 z3854126.exe 4884 p3636958.exe 2920 r6960198.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3636958.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3854126.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3854126.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 p3636958.exe 4884 p3636958.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4884 p3636958.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 884 wrote to memory of 2176 884 dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe 86 PID 884 wrote to memory of 2176 884 dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe 86 PID 884 wrote to memory of 2176 884 dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe 86 PID 2176 wrote to memory of 4884 2176 z3854126.exe 87 PID 2176 wrote to memory of 4884 2176 z3854126.exe 87 PID 2176 wrote to memory of 2920 2176 z3854126.exe 90 PID 2176 wrote to memory of 2920 2176 z3854126.exe 90 PID 2176 wrote to memory of 2920 2176 z3854126.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe"C:\Users\Admin\AppData\Local\Temp\dc4881610aae65d50b42577b4bbc8c2ba598d759d5f5e817393923aa15279cb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3854126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3854126.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3636958.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3636958.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6960198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6960198.exe3⤵
- Executes dropped EXE
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5176cd625c82bc47285c36236c2ea41f2
SHA19e2f3128079d743bcca4d649dbd064a2f9355335
SHA256ae808c20a2399360625a2394ae073c91b5bf0919a5457ce36eacf00126c55fb1
SHA5123a7dfbd318fe606584804ab9ce5c7016bd167a963442dea5697ccee2491d44c5d09b440e30b027a692a087952f2a1e7b6592d9fd4d738e2120c42e5e2d7b55a9
-
Filesize
206KB
MD5176cd625c82bc47285c36236c2ea41f2
SHA19e2f3128079d743bcca4d649dbd064a2f9355335
SHA256ae808c20a2399360625a2394ae073c91b5bf0919a5457ce36eacf00126c55fb1
SHA5123a7dfbd318fe606584804ab9ce5c7016bd167a963442dea5697ccee2491d44c5d09b440e30b027a692a087952f2a1e7b6592d9fd4d738e2120c42e5e2d7b55a9
-
Filesize
15KB
MD5c8da767166dbd2f115c8c7bd007a7df0
SHA1f423d2a2373ec4956797193651dd004b19c8f502
SHA25655b77d1608a1d006b3f9d10c12ecbe081888af27b3f8e64b245b0f092ed4dc08
SHA512c5f12113cff8ec19cccc4a694d10c8178c738fae2d96e3afd55e53bcec016b07ff887b62242ee3be2d4bdd8c279e74733f11905e77171c3726c7d87cd93eabdb
-
Filesize
15KB
MD5c8da767166dbd2f115c8c7bd007a7df0
SHA1f423d2a2373ec4956797193651dd004b19c8f502
SHA25655b77d1608a1d006b3f9d10c12ecbe081888af27b3f8e64b245b0f092ed4dc08
SHA512c5f12113cff8ec19cccc4a694d10c8178c738fae2d96e3afd55e53bcec016b07ff887b62242ee3be2d4bdd8c279e74733f11905e77171c3726c7d87cd93eabdb
-
Filesize
175KB
MD51b2b6cd22049d08aaa51bc3961fd5d74
SHA1e7eccf685e65d3efc6e2a67018aed20eef9712e0
SHA256d163ed454de83050197f2a420cff900714aa4bae23eece22e12c68a5e9ea172b
SHA51287ced57cfc2884276bf87c14b77700bdf63abb4b32324b7baf77a0c0b295b02257b15b6933f9518b603384577f2a18aaf5708cc8e8c9643e56dd2baf798d9015
-
Filesize
175KB
MD51b2b6cd22049d08aaa51bc3961fd5d74
SHA1e7eccf685e65d3efc6e2a67018aed20eef9712e0
SHA256d163ed454de83050197f2a420cff900714aa4bae23eece22e12c68a5e9ea172b
SHA51287ced57cfc2884276bf87c14b77700bdf63abb4b32324b7baf77a0c0b295b02257b15b6933f9518b603384577f2a18aaf5708cc8e8c9643e56dd2baf798d9015