Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 11:11
Static task
static1
Behavioral task
behavioral1
Sample
ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe
Resource
win10v2004-20230703-en
General
-
Target
ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe
-
Size
389KB
-
MD5
94e43c273522765f1bc662bdbf660c67
-
SHA1
6b996a5905a1905c2a49a639853020fa1dabc55c
-
SHA256
ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669
-
SHA512
b269fc063ac6352b3d5f1896bd899df52ec3e83997acf174490506438c0e35472bbf341bbc3aaa929662cfbf20ed1fb9d665d42c99ec7e9c7401ea01742a8e05
-
SSDEEP
6144:KMy+bnr+5p0yN90QE0GAjiT71e+gl2v2yGJA17BYhrCu/yBAgrv/a+SDc9FyZQR7:QMrNy903TJenyGOKrCOo/aXDyyZQV
Malware Config
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023215-146.dat healer behavioral1/files/0x0008000000023215-145.dat healer behavioral1/memory/3388-147-0x00000000008D0000-0x00000000008DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p8445386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p8445386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p8445386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p8445386.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p8445386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p8445386.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3972 z3856041.exe 3388 p8445386.exe 1660 r7243245.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p8445386.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3856041.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3856041.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3388 p8445386.exe 3388 p8445386.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3388 p8445386.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3972 2372 ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe 85 PID 2372 wrote to memory of 3972 2372 ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe 85 PID 2372 wrote to memory of 3972 2372 ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe 85 PID 3972 wrote to memory of 3388 3972 z3856041.exe 86 PID 3972 wrote to memory of 3388 3972 z3856041.exe 86 PID 3972 wrote to memory of 1660 3972 z3856041.exe 94 PID 3972 wrote to memory of 1660 3972 z3856041.exe 94 PID 3972 wrote to memory of 1660 3972 z3856041.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe"C:\Users\Admin\AppData\Local\Temp\ef61de76e67841fbf7588d6ccc134feb41d4ddc3b53cf279ef25559d7dce1669.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3856041.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3856041.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8445386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8445386.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7243245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7243245.exe3⤵
- Executes dropped EXE
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5d5ba3adacb7121df4acd8f552fe3d3eb
SHA1255232470fa64b2840ae417ee43afa0850acf252
SHA2567aa800e25769c850a991e11c79e53d3b79f439f0fb1d805d49701f12877c978c
SHA51264e974634c7dfb65ed16ef881fd7d9c2194837aafd2d434c5ed6db575c19661e270e36a3271a78aac40f9e45097b3852bb030bb0c0102343f9e3f551858b8d96
-
Filesize
206KB
MD5d5ba3adacb7121df4acd8f552fe3d3eb
SHA1255232470fa64b2840ae417ee43afa0850acf252
SHA2567aa800e25769c850a991e11c79e53d3b79f439f0fb1d805d49701f12877c978c
SHA51264e974634c7dfb65ed16ef881fd7d9c2194837aafd2d434c5ed6db575c19661e270e36a3271a78aac40f9e45097b3852bb030bb0c0102343f9e3f551858b8d96
-
Filesize
15KB
MD5169656930c2febd1e1aaed4717203bb9
SHA1461ce429ae09eeb1bcb1eee4ad45bf1824874dfa
SHA2567c9aa052caff084db8661090e3d6b46e49516c6503550b60cc5c83265c9962cb
SHA512bd16a73d591e2cf46ad770e8ea9026bfb041e30352689498c35c64091547b416f7895437901331a68f294a0fa01f51b2efdc46a44f469013ebfee7212a390f83
-
Filesize
15KB
MD5169656930c2febd1e1aaed4717203bb9
SHA1461ce429ae09eeb1bcb1eee4ad45bf1824874dfa
SHA2567c9aa052caff084db8661090e3d6b46e49516c6503550b60cc5c83265c9962cb
SHA512bd16a73d591e2cf46ad770e8ea9026bfb041e30352689498c35c64091547b416f7895437901331a68f294a0fa01f51b2efdc46a44f469013ebfee7212a390f83
-
Filesize
172KB
MD523a578f39df18c01808df43a0e2d61b1
SHA1199b566735eda3e98919e6e22a67fa8b482cf70d
SHA2564145c1ff5fb0771320d959f70f0ebb1a8e1f7eca9c8fd202935386c46de067d9
SHA512e930029d311f5df5c113154db77c6312318da21b748ad25c7d9b04995b6d2e6bd35dfa34b1406350be7b62eedee5374e140c460ea3f6290428619cf1e33ec2e8
-
Filesize
172KB
MD523a578f39df18c01808df43a0e2d61b1
SHA1199b566735eda3e98919e6e22a67fa8b482cf70d
SHA2564145c1ff5fb0771320d959f70f0ebb1a8e1f7eca9c8fd202935386c46de067d9
SHA512e930029d311f5df5c113154db77c6312318da21b748ad25c7d9b04995b6d2e6bd35dfa34b1406350be7b62eedee5374e140c460ea3f6290428619cf1e33ec2e8