Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe
Resource
win10v2004-20230703-en
General
-
Target
0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe
-
Size
505KB
-
MD5
b8c795216a2c012e9d39db2e5cf573e2
-
SHA1
e1050257a2e944b5f868202845102f18c39c5eb8
-
SHA256
0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26
-
SHA512
8eebbb7afd943f20f7bce140faa3b433ce164d6e4453ffddc66528565c9f70ad30f7e87636272c9174e0be817e3ef720c9b088c509e69c3902d8359a24a1681a
-
SSDEEP
12288:qMrRy900zT5opJnx2qqhnStdqfTMNNIfkZO3PJHctw:Ty0x2qqhStdq7MNNdFtw
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002322c-155.dat healer behavioral1/files/0x000700000002322c-156.dat healer behavioral1/memory/3328-157-0x0000000000AA0000-0x0000000000AAA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h3641116.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3641116.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3641116.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3641116.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3641116.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3641116.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2224 x8075298.exe 1908 x5611495.exe 2760 g7955938.exe 3328 h3641116.exe 1536 i5413076.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h3641116.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5611495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8075298.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3328 h3641116.exe 3328 h3641116.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3328 h3641116.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2224 3988 0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe 83 PID 3988 wrote to memory of 2224 3988 0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe 83 PID 3988 wrote to memory of 2224 3988 0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe 83 PID 2224 wrote to memory of 1908 2224 x8075298.exe 84 PID 2224 wrote to memory of 1908 2224 x8075298.exe 84 PID 2224 wrote to memory of 1908 2224 x8075298.exe 84 PID 1908 wrote to memory of 2760 1908 x5611495.exe 85 PID 1908 wrote to memory of 2760 1908 x5611495.exe 85 PID 1908 wrote to memory of 2760 1908 x5611495.exe 85 PID 1908 wrote to memory of 3328 1908 x5611495.exe 86 PID 1908 wrote to memory of 3328 1908 x5611495.exe 86 PID 2224 wrote to memory of 1536 2224 x8075298.exe 91 PID 2224 wrote to memory of 1536 2224 x8075298.exe 91 PID 2224 wrote to memory of 1536 2224 x8075298.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe"C:\Users\Admin\AppData\Local\Temp\0f979cb8af260f00e154f08809ad0f5f264269b78fe270cdf68732508cb22d26.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8075298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8075298.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5611495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5611495.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7955938.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7955938.exe4⤵
- Executes dropped EXE
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3641116.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h3641116.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5413076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i5413076.exe3⤵
- Executes dropped EXE
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5d7d6e2a46ecf116cc0b73e8a0d79ba53
SHA1766803325323510d25550c4356fac8f226fb6d20
SHA256f92141ee5951a4c7f0ade112d7878d36cf2c68bf405cf79e7dc1aa3814202a69
SHA512ba9d77f14e507e608879f3beebf5846ecfae2c292a459e9d3ff070fc8e06f1269c65f10c38adf36d623ba8d15ab5524acee7dce3244fb9949e42934fff5efec2
-
Filesize
372KB
MD5d7d6e2a46ecf116cc0b73e8a0d79ba53
SHA1766803325323510d25550c4356fac8f226fb6d20
SHA256f92141ee5951a4c7f0ade112d7878d36cf2c68bf405cf79e7dc1aa3814202a69
SHA512ba9d77f14e507e608879f3beebf5846ecfae2c292a459e9d3ff070fc8e06f1269c65f10c38adf36d623ba8d15ab5524acee7dce3244fb9949e42934fff5efec2
-
Filesize
174KB
MD5853c48a0df0f8295de59c80b9a713282
SHA1f2e9bf838a6d19d5954449438671ddcdffd1037a
SHA256938219eeff257f54fddabbc151db6fac76ba2a7e79e03586f54bda78bf449692
SHA5127af8681596c8ae558299dcfce0f2c0c60ca4660ff82752cbde096fe8a618be522b99e512d74262f3b01a5044bdee6c5a4483c301055912a07c705cf4f3396a69
-
Filesize
174KB
MD5853c48a0df0f8295de59c80b9a713282
SHA1f2e9bf838a6d19d5954449438671ddcdffd1037a
SHA256938219eeff257f54fddabbc151db6fac76ba2a7e79e03586f54bda78bf449692
SHA5127af8681596c8ae558299dcfce0f2c0c60ca4660ff82752cbde096fe8a618be522b99e512d74262f3b01a5044bdee6c5a4483c301055912a07c705cf4f3396a69
-
Filesize
217KB
MD5c919ec570bc50c9d29aeb9b18c73e1e1
SHA19cf21cfa00d383638a8a2d2eb23760ff0fd4c37b
SHA256cb68ef2116f2f3b609d1e53340628783f16adaf1415793c8364ed06f1558cc61
SHA512b1afa50d3e4bb535bed20ddc629232b7c7c63a931fbd5369a434717827f0f528743eec145dca4d687a85b1127cb359bb1f213c419e222a507944c4e67d6d1d6f
-
Filesize
217KB
MD5c919ec570bc50c9d29aeb9b18c73e1e1
SHA19cf21cfa00d383638a8a2d2eb23760ff0fd4c37b
SHA256cb68ef2116f2f3b609d1e53340628783f16adaf1415793c8364ed06f1558cc61
SHA512b1afa50d3e4bb535bed20ddc629232b7c7c63a931fbd5369a434717827f0f528743eec145dca4d687a85b1127cb359bb1f213c419e222a507944c4e67d6d1d6f
-
Filesize
140KB
MD5996d1beb2364bfcc4e268fecb495ce8d
SHA12f2ab0cf7336407e23a195e88c5a591f9a34af2b
SHA256b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981
SHA51266b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111
-
Filesize
140KB
MD5996d1beb2364bfcc4e268fecb495ce8d
SHA12f2ab0cf7336407e23a195e88c5a591f9a34af2b
SHA256b1606e1f0a89927c61b2c0b4fa311313eec6df17038aac8ca8beb7b58c00d981
SHA51266b22250ba63c4613f28d0f93699aa9c9954acb824ab5c17a331ecd4cb836e6530c516a47456e36b6650ac9abeca685011539643acc5398f23546cd56d57a111
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91