Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe
Resource
win10v2004-20230703-en
General
-
Target
e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe
-
Size
505KB
-
MD5
61d13e499b6b75fde33d557b7c739887
-
SHA1
4bd98cb895903695c9fdbf72bf31c4d920db10e5
-
SHA256
e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4
-
SHA512
69cf7531fe79a79953a9393744b24062f907ca65c4604ab766fe3e53b6e4b5174b01dcfcb24e2e22570f160aec235a801840af971b3b60d0009cc164a1b301d2
-
SSDEEP
12288:BMrLy90THWUCDMPUyhZQd+uw/YhCC4b5h/+fE2:aySWOo8vSCpdUfE2
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00060000000230d8-155.dat healer behavioral1/files/0x00060000000230d8-156.dat healer behavioral1/memory/2308-157-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h7828433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7828433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7828433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7828433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7828433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7828433.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1976 x2985833.exe 4700 x0022987.exe 4712 g8637250.exe 2308 h7828433.exe 2508 i0271447.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h7828433.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2985833.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0022987.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 h7828433.exe 2308 h7828433.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 h7828433.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4868 wrote to memory of 1976 4868 e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe 81 PID 4868 wrote to memory of 1976 4868 e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe 81 PID 4868 wrote to memory of 1976 4868 e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe 81 PID 1976 wrote to memory of 4700 1976 x2985833.exe 82 PID 1976 wrote to memory of 4700 1976 x2985833.exe 82 PID 1976 wrote to memory of 4700 1976 x2985833.exe 82 PID 4700 wrote to memory of 4712 4700 x0022987.exe 83 PID 4700 wrote to memory of 4712 4700 x0022987.exe 83 PID 4700 wrote to memory of 4712 4700 x0022987.exe 83 PID 4700 wrote to memory of 2308 4700 x0022987.exe 84 PID 4700 wrote to memory of 2308 4700 x0022987.exe 84 PID 1976 wrote to memory of 2508 1976 x2985833.exe 91 PID 1976 wrote to memory of 2508 1976 x2985833.exe 91 PID 1976 wrote to memory of 2508 1976 x2985833.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe"C:\Users\Admin\AppData\Local\Temp\e5fd5233e26131e12e2be01919705c98852e4739e26f3845004091cbc07ea6d4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2985833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2985833.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022987.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022987.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8637250.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8637250.exe4⤵
- Executes dropped EXE
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7828433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7828433.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0271447.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0271447.exe3⤵
- Executes dropped EXE
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5caa8256b09cad1406e406ae1ec6e837f
SHA1fa6cdb91de9a09e471b5ce6202e288204815bbb1
SHA25654d52453529134c7a22622245100972f42f71c2d3e28655ff23cee7e3ddc881f
SHA5122d8b8311a22d28fe2841e44f002789b673f7a6648f626569c78498a71e94bdb03dd8290d50c84502aa81b67789f913f1f09cd71e69c62003ce11ae8b4a3644fc
-
Filesize
372KB
MD5caa8256b09cad1406e406ae1ec6e837f
SHA1fa6cdb91de9a09e471b5ce6202e288204815bbb1
SHA25654d52453529134c7a22622245100972f42f71c2d3e28655ff23cee7e3ddc881f
SHA5122d8b8311a22d28fe2841e44f002789b673f7a6648f626569c78498a71e94bdb03dd8290d50c84502aa81b67789f913f1f09cd71e69c62003ce11ae8b4a3644fc
-
Filesize
174KB
MD5b1d9865d526a8ac67664c837fdbae03d
SHA195eaa24760a43cbe8b099967c2c1987d108a65ef
SHA256aa2c08a7877b40dbbeb38b88ca03611763655f997b043e66ab5212ac3a838333
SHA512f0385220edcab6c572ac2bda993873b309cec714e15600fa76fae9f4c2234783df8fc8d7753e192fe1c821cea683983723b1419d9134de0eb3ec39f022df4296
-
Filesize
174KB
MD5b1d9865d526a8ac67664c837fdbae03d
SHA195eaa24760a43cbe8b099967c2c1987d108a65ef
SHA256aa2c08a7877b40dbbeb38b88ca03611763655f997b043e66ab5212ac3a838333
SHA512f0385220edcab6c572ac2bda993873b309cec714e15600fa76fae9f4c2234783df8fc8d7753e192fe1c821cea683983723b1419d9134de0eb3ec39f022df4296
-
Filesize
216KB
MD5c10ca80ed5159002d94f753bd0e08d84
SHA1db9947b3e5e730670c7e08668db0cf8bd4692c64
SHA256c9f8534008063081277619943c506c5633afe5b720359a6f979cce2218f326ea
SHA512076e329d5b18c6a00a898d4ead927c3fd47076d7b9ef12dfe1040936395d11a6671b53b155f060be097fcbe1cf37db19d0fb5ba6213df89ebe43ec7842db6238
-
Filesize
216KB
MD5c10ca80ed5159002d94f753bd0e08d84
SHA1db9947b3e5e730670c7e08668db0cf8bd4692c64
SHA256c9f8534008063081277619943c506c5633afe5b720359a6f979cce2218f326ea
SHA512076e329d5b18c6a00a898d4ead927c3fd47076d7b9ef12dfe1040936395d11a6671b53b155f060be097fcbe1cf37db19d0fb5ba6213df89ebe43ec7842db6238
-
Filesize
140KB
MD546f215514d38705332b16b516228162d
SHA1bbd96986d09536c7c40a28db347fc736fb56fb6a
SHA2561d681aa43c72770eb6fc74e573f17778ba71fb602d5c0e9c7b17e6b904baefc5
SHA512b68ad2a0b194f18f542f00b3f99d18782e50b1e39f559fd1a3e6adee1decd1ed2dfdaff1b161d5dd246967917165e7ec3c5ddf44e651ab27c0613dfcd04884ad
-
Filesize
140KB
MD546f215514d38705332b16b516228162d
SHA1bbd96986d09536c7c40a28db347fc736fb56fb6a
SHA2561d681aa43c72770eb6fc74e573f17778ba71fb602d5c0e9c7b17e6b904baefc5
SHA512b68ad2a0b194f18f542f00b3f99d18782e50b1e39f559fd1a3e6adee1decd1ed2dfdaff1b161d5dd246967917165e7ec3c5ddf44e651ab27c0613dfcd04884ad
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91