Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 00:50
Static task
static1
Behavioral task
behavioral1
Sample
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe
Resource
win10v2004-20230703-en
General
-
Target
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe
-
Size
388KB
-
MD5
9aa7f97df38d59107c4d0de7a283f9bb
-
SHA1
8a027943608aa2d758451da41e87a4d04c998710
-
SHA256
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49
-
SHA512
86f51b56f2bd9ff0ef0a65bd78a2ffaaca596095190295d94753dde21a6e4a978d60dea84023dd087803075be4df4fe960d3889fee39d0487927afe7b64302c2
-
SSDEEP
6144:KFy+bnr+1p0yN90QEdbncoa2l3bcpXRrtR5HhJ1LabSBqZjiwdCMKU72N6qNJi:bMrVy90fnTa22pzhL2sQdXKr/N0
Malware Config
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exe healer C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exe healer behavioral2/memory/680-147-0x0000000000B40000-0x0000000000B4A000-memory.dmp healer -
Processes:
p2530582.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p2530582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p2530582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p2530582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p2530582.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p2530582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p2530582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
Processes:
z8046235.exep2530582.exer5627160.exepid process 2924 z8046235.exe 680 p2530582.exe 1668 r5627160.exe -
Processes:
p2530582.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p2530582.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exez8046235.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8046235.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
p2530582.exepid process 680 p2530582.exe 680 p2530582.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
p2530582.exedescription pid process Token: SeDebugPrivilege 680 p2530582.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exez8046235.exedescription pid process target process PID 4176 wrote to memory of 2924 4176 b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe z8046235.exe PID 4176 wrote to memory of 2924 4176 b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe z8046235.exe PID 4176 wrote to memory of 2924 4176 b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe z8046235.exe PID 2924 wrote to memory of 680 2924 z8046235.exe p2530582.exe PID 2924 wrote to memory of 680 2924 z8046235.exe p2530582.exe PID 2924 wrote to memory of 1668 2924 z8046235.exe r5627160.exe PID 2924 wrote to memory of 1668 2924 z8046235.exe r5627160.exe PID 2924 wrote to memory of 1668 2924 z8046235.exe r5627160.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe"C:\Users\Admin\AppData\Local\Temp\b88e69b9804b98ce2f0a9645a00ebd69b99c0bf117b8979e9d1a32e104077b49.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8046235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8046235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5627160.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5627160.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8046235.exeFilesize
206KB
MD5048da8d068d86912c8462851a9b450f2
SHA123f6c8123726b592710c699c9470f276fdc304c9
SHA25696368ea6944964e8b275f880bf22475bba86f8c93eda091adfd821a43622fd1e
SHA51223378346580df81c8cf7eddfae6919c4ebf5e1001b95a4be2a1d8e09323a2e7444f1d1af7afad0b9e19a76b423191da77c33f2a4def349644b3ea350df5b5ae4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8046235.exeFilesize
206KB
MD5048da8d068d86912c8462851a9b450f2
SHA123f6c8123726b592710c699c9470f276fdc304c9
SHA25696368ea6944964e8b275f880bf22475bba86f8c93eda091adfd821a43622fd1e
SHA51223378346580df81c8cf7eddfae6919c4ebf5e1001b95a4be2a1d8e09323a2e7444f1d1af7afad0b9e19a76b423191da77c33f2a4def349644b3ea350df5b5ae4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exeFilesize
11KB
MD517b3fb04536090610b736482c8c32ea4
SHA173017a5f9c35bbcfa96abb5c2f558c2d64dcb7f2
SHA2567a929bc9b394d96a7960ce3eaa907b619f9b903c473bf6433d4dd6d92681db75
SHA512c17c285595cfb99ae5de9f531f8c4df95aadd66657cc3e6876d1edbf601d99183aeef72821ceba1516b3e1cf6952561c7bd86b2bc05b013415c281fdbf1ae578
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p2530582.exeFilesize
11KB
MD517b3fb04536090610b736482c8c32ea4
SHA173017a5f9c35bbcfa96abb5c2f558c2d64dcb7f2
SHA2567a929bc9b394d96a7960ce3eaa907b619f9b903c473bf6433d4dd6d92681db75
SHA512c17c285595cfb99ae5de9f531f8c4df95aadd66657cc3e6876d1edbf601d99183aeef72821ceba1516b3e1cf6952561c7bd86b2bc05b013415c281fdbf1ae578
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5627160.exeFilesize
172KB
MD55a48eca114512ef71ef758cf2865bcde
SHA1ac0ce137739b85bb0e8228f715b15a93df306104
SHA256759a4de8dfd050ed138a796f03b37ffd893b85fefe652a6487bd086d943f3526
SHA51240beb76ef4497cff9e1836fbd17ed6e8dee709ff51b96ed9ec46d6ff225f3c66201b60d8ebe72668d85598c002a7e68680d9d22ec32e801c4eb92643f1cf62a8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5627160.exeFilesize
172KB
MD55a48eca114512ef71ef758cf2865bcde
SHA1ac0ce137739b85bb0e8228f715b15a93df306104
SHA256759a4de8dfd050ed138a796f03b37ffd893b85fefe652a6487bd086d943f3526
SHA51240beb76ef4497cff9e1836fbd17ed6e8dee709ff51b96ed9ec46d6ff225f3c66201b60d8ebe72668d85598c002a7e68680d9d22ec32e801c4eb92643f1cf62a8
-
memory/680-147-0x0000000000B40000-0x0000000000B4A000-memory.dmpFilesize
40KB
-
memory/680-150-0x00007FF97BA40000-0x00007FF97C501000-memory.dmpFilesize
10.8MB
-
memory/680-148-0x00007FF97BA40000-0x00007FF97C501000-memory.dmpFilesize
10.8MB
-
memory/1668-154-0x00000000001B0000-0x00000000001E0000-memory.dmpFilesize
192KB
-
memory/1668-155-0x00000000742E0000-0x0000000074A90000-memory.dmpFilesize
7.7MB
-
memory/1668-156-0x0000000005280000-0x0000000005898000-memory.dmpFilesize
6.1MB
-
memory/1668-157-0x0000000004D70000-0x0000000004E7A000-memory.dmpFilesize
1.0MB
-
memory/1668-159-0x0000000004A50000-0x0000000004A60000-memory.dmpFilesize
64KB
-
memory/1668-158-0x0000000004C80000-0x0000000004C92000-memory.dmpFilesize
72KB
-
memory/1668-160-0x0000000004CE0000-0x0000000004D1C000-memory.dmpFilesize
240KB
-
memory/1668-161-0x00000000742E0000-0x0000000074A90000-memory.dmpFilesize
7.7MB
-
memory/1668-162-0x0000000004A50000-0x0000000004A60000-memory.dmpFilesize
64KB