Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 08:55
Static task
static1
Behavioral task
behavioral1
Sample
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe
Resource
win10v2004-20230703-en
General
-
Target
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe
-
Size
389KB
-
MD5
becabbca0941778fb8f52ebcf672ad0a
-
SHA1
da72cfa309e64af3faac23d8a7896fd5d1ad8244
-
SHA256
a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19
-
SHA512
b15d5e51c2e4042114d1a9fa04457d67bf9c5cea5dd7fabef7c0b1ce79fc9ad802b40b452e93acf5698478be5db988d8aac62192a12d76a7e5ccb5375595c547
-
SSDEEP
6144:Koy+bnr+xp0yN90QENkSoTkaWu5VEzkW2PZNwGepXZpTBy15SlObUhqb96NLrx3:IMrpy902j5V0pbtyTawb9E3
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023211-144.dat healer behavioral1/files/0x0007000000023211-146.dat healer behavioral1/memory/1908-147-0x00000000001E0000-0x00000000001EA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p0399742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p0399742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p0399742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p0399742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p0399742.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p0399742.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1196 z3174339.exe 1908 p0399742.exe 1928 r0707251.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p0399742.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3174339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3174339.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 p0399742.exe 1908 p0399742.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1908 p0399742.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1196 4924 a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe 85 PID 4924 wrote to memory of 1196 4924 a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe 85 PID 4924 wrote to memory of 1196 4924 a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe 85 PID 1196 wrote to memory of 1908 1196 z3174339.exe 86 PID 1196 wrote to memory of 1908 1196 z3174339.exe 86 PID 1196 wrote to memory of 1928 1196 z3174339.exe 88 PID 1196 wrote to memory of 1928 1196 z3174339.exe 88 PID 1196 wrote to memory of 1928 1196 z3174339.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe"C:\Users\Admin\AppData\Local\Temp\a46f30d95bf1e4d6998d6e1e9670e89071253e0e418201de919ecef360950d19.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3174339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3174339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0399742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0399742.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0707251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0707251.exe3⤵
- Executes dropped EXE
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5182eb3ff5e5056a4b4acff1bce91d1f2
SHA18adb99c59ddd37286a27de271cb5d6d3d19e51c2
SHA2568223b5fe2ede4b24373d1e832b38b22e18b785b361a27afc61fef90cd87627fa
SHA512ad35005db48a92abc6c183a7a1daebc4dbbfea1b703e88c2159dd61c5f6863244f5ae66568a604cf42cf167f05d8d963ba15312d7fae473e8c3a17c5b67dd979
-
Filesize
206KB
MD5182eb3ff5e5056a4b4acff1bce91d1f2
SHA18adb99c59ddd37286a27de271cb5d6d3d19e51c2
SHA2568223b5fe2ede4b24373d1e832b38b22e18b785b361a27afc61fef90cd87627fa
SHA512ad35005db48a92abc6c183a7a1daebc4dbbfea1b703e88c2159dd61c5f6863244f5ae66568a604cf42cf167f05d8d963ba15312d7fae473e8c3a17c5b67dd979
-
Filesize
15KB
MD5cbafe7982b797fb29c8467b5133204db
SHA131c83dde04f2b9dc550c02457982403c87c6f5cc
SHA256c0ffc2875105725511d220d881dccc4fbaa382bcdc849455e2049ae204a77918
SHA512ff476a4436aaa23432843b717c39e7cfb76914223526b6a66a600f16c9de077447a76e383797f76e20d7475045eae162afc0f630b760faf375dfa2b17dd2fd3d
-
Filesize
15KB
MD5cbafe7982b797fb29c8467b5133204db
SHA131c83dde04f2b9dc550c02457982403c87c6f5cc
SHA256c0ffc2875105725511d220d881dccc4fbaa382bcdc849455e2049ae204a77918
SHA512ff476a4436aaa23432843b717c39e7cfb76914223526b6a66a600f16c9de077447a76e383797f76e20d7475045eae162afc0f630b760faf375dfa2b17dd2fd3d
-
Filesize
175KB
MD5caa6b3eb8f4b2947c993942f297181a4
SHA1f937bd50df0c71fc32c06f0a9f6a2ed7add19f80
SHA2562717a3eceb5f0f1306b9ee18f72a615e37105d86093175370c2efbc9420dfb41
SHA51215f88e88e94889f4a8e762b8d74cb8e76aedff4eb56a384925521be909779424536fbb04b3ab1ce5e7ebb69d709e3bf5adf9bb01c5b0d0c95e7f962b69270fa1
-
Filesize
175KB
MD5caa6b3eb8f4b2947c993942f297181a4
SHA1f937bd50df0c71fc32c06f0a9f6a2ed7add19f80
SHA2562717a3eceb5f0f1306b9ee18f72a615e37105d86093175370c2efbc9420dfb41
SHA51215f88e88e94889f4a8e762b8d74cb8e76aedff4eb56a384925521be909779424536fbb04b3ab1ce5e7ebb69d709e3bf5adf9bb01c5b0d0c95e7f962b69270fa1