Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe
Resource
win10v2004-20230703-en
General
-
Target
08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe
-
Size
504KB
-
MD5
ac6fb3a0c6a33f59f6e2702bebf24cb4
-
SHA1
32a930c622fa276ff567feac91d0829983bebf4f
-
SHA256
08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206
-
SHA512
08bfb21fd25576ce0c5a0bb4886a38450802d54976973e19b174ce5e57c08c74125f429cd75efe0db8786c3cd64b288fe977eb7f2837e692538e49aa808c4800
-
SSDEEP
12288:eMrRy90aPA6hXBmbCJVfTMNNlU/DhwMuxV:PycM7MNNQDBCV
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023209-155.dat healer behavioral1/files/0x0006000000023209-156.dat healer behavioral1/memory/4632-157-0x00000000001A0000-0x00000000001AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2458687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2458687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2458687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2458687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2458687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h2458687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1452 x9879429.exe 3940 x9184238.exe 4052 g3661850.exe 4632 h2458687.exe 3988 i5628418.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h2458687.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9879429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9184238.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4632 h2458687.exe 4632 h2458687.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4632 h2458687.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1452 2468 08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe 82 PID 2468 wrote to memory of 1452 2468 08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe 82 PID 2468 wrote to memory of 1452 2468 08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe 82 PID 1452 wrote to memory of 3940 1452 x9879429.exe 83 PID 1452 wrote to memory of 3940 1452 x9879429.exe 83 PID 1452 wrote to memory of 3940 1452 x9879429.exe 83 PID 3940 wrote to memory of 4052 3940 x9184238.exe 84 PID 3940 wrote to memory of 4052 3940 x9184238.exe 84 PID 3940 wrote to memory of 4052 3940 x9184238.exe 84 PID 3940 wrote to memory of 4632 3940 x9184238.exe 85 PID 3940 wrote to memory of 4632 3940 x9184238.exe 85 PID 1452 wrote to memory of 3988 1452 x9879429.exe 86 PID 1452 wrote to memory of 3988 1452 x9879429.exe 86 PID 1452 wrote to memory of 3988 1452 x9879429.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe"C:\Users\Admin\AppData\Local\Temp\08faf220e7959bb5a4c9814749687351e6120629b5649d965425172e5df3d206.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9879429.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9879429.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9184238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9184238.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3661850.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3661850.exe4⤵
- Executes dropped EXE
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h2458687.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h2458687.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5628418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5628418.exe3⤵
- Executes dropped EXE
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5f708a24f1976bf3dcbb2bebc1ed05d46
SHA1efb8a04308959465e65afb5f5869625521b1a4cf
SHA2568135c28df9ea805ecd9eed55ab402ef8e4b90e70706c26221ee843b99a420fef
SHA512d23327a099cd81c4e47dd1d0465fda48914933b325e8ba105b0376a1e0ab5ea2eea28af4120c040067b357fc88f026753573968e4dcc4ab03e8a65d1d6953aa6
-
Filesize
372KB
MD5f708a24f1976bf3dcbb2bebc1ed05d46
SHA1efb8a04308959465e65afb5f5869625521b1a4cf
SHA2568135c28df9ea805ecd9eed55ab402ef8e4b90e70706c26221ee843b99a420fef
SHA512d23327a099cd81c4e47dd1d0465fda48914933b325e8ba105b0376a1e0ab5ea2eea28af4120c040067b357fc88f026753573968e4dcc4ab03e8a65d1d6953aa6
-
Filesize
174KB
MD55c1fe2d5fe1a744499cc1bbcedecc9f2
SHA10b2d8e5cd939ea0b955e03f092d079116c0f65a6
SHA2563d2ea4531dee1f8cb1d694ebc6ede1c068e1482b95d65d0bdc524abd72da2e4b
SHA51252afae6f4d57a03a994957dd8102f8cc4ddcbaf0cd91b90249e2cdb1e40e2e59699f998aa9be2bc33832f019ab12356f0e4feb3742ca0f4609b5f22c4b1b9d1a
-
Filesize
174KB
MD55c1fe2d5fe1a744499cc1bbcedecc9f2
SHA10b2d8e5cd939ea0b955e03f092d079116c0f65a6
SHA2563d2ea4531dee1f8cb1d694ebc6ede1c068e1482b95d65d0bdc524abd72da2e4b
SHA51252afae6f4d57a03a994957dd8102f8cc4ddcbaf0cd91b90249e2cdb1e40e2e59699f998aa9be2bc33832f019ab12356f0e4feb3742ca0f4609b5f22c4b1b9d1a
-
Filesize
217KB
MD56af74a6b03da36eab8297eaccbede325
SHA1d258c7d24aa8b46ebc8012a811729bcf274b1055
SHA256ae85d371d1783d14dece02bb22d266c5f67102bd9b44c343c8b20cc88db5093b
SHA5122fa7cde7db92e5c41afe8b4bde891528c7ac85c836362224fa5b78812f3a3a49916fa4fc60f5302594f23016b79a8fc73d530b44c8e408e321316b80cac94a80
-
Filesize
217KB
MD56af74a6b03da36eab8297eaccbede325
SHA1d258c7d24aa8b46ebc8012a811729bcf274b1055
SHA256ae85d371d1783d14dece02bb22d266c5f67102bd9b44c343c8b20cc88db5093b
SHA5122fa7cde7db92e5c41afe8b4bde891528c7ac85c836362224fa5b78812f3a3a49916fa4fc60f5302594f23016b79a8fc73d530b44c8e408e321316b80cac94a80
-
Filesize
140KB
MD5996d1beb2364bfcc4e268fecb495ce8d
SHA12f2ab0cf7336407e23a195e88c5a591f9a34af2b
SHA256b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981
SHA51266b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111
-
Filesize
140KB
MD5996d1beb2364bfcc4e268fecb495ce8d
SHA12f2ab0cf7336407e23a195e88c5a591f9a34af2b
SHA256b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981
SHA51266b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91