Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe
Resource
win10v2004-20230703-en
General
-
Target
d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe
-
Size
563KB
-
MD5
07c820efb94c4708a9cf195e6f4b8157
-
SHA1
ecaf86b92abc299656f6e941d44923a49dfda841
-
SHA256
d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a
-
SHA512
0491767f7e0f136bd322d5258faf72e34e4734165037c5ef8b6cc367cb876be0a211eb973feb49d9bcd2f2d809ab82691115d60f370a6c465e3ef7121c2ddeb7
-
SSDEEP
12288:8Mr6y90Pgdkp7NGMsq50HcIPzwN7VNGKsRtqyqaMEEb4C7NlkYOtXj:uyF+vJP0HcIchiBqa/iJfAj
Malware Config
Extracted
redline
dava
77.91.124.54:19071
-
auth_value
3ce5222c1baaa06681dfe0012ce1de23
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002321c-153.dat healer behavioral1/files/0x000700000002321c-152.dat healer behavioral1/memory/4912-154-0x0000000000F50000-0x0000000000F5A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection r1003241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r1003241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r1003241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r1003241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r1003241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r1003241.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3136 z6872401.exe 4684 z1631373.exe 4912 r1003241.exe 2236 s9288599.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" r1003241.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6872401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1631373.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 r1003241.exe 4912 r1003241.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 r1003241.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1500 wrote to memory of 3136 1500 d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe 82 PID 1500 wrote to memory of 3136 1500 d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe 82 PID 1500 wrote to memory of 3136 1500 d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe 82 PID 3136 wrote to memory of 4684 3136 z6872401.exe 83 PID 3136 wrote to memory of 4684 3136 z6872401.exe 83 PID 3136 wrote to memory of 4684 3136 z6872401.exe 83 PID 4684 wrote to memory of 4912 4684 z1631373.exe 84 PID 4684 wrote to memory of 4912 4684 z1631373.exe 84 PID 4684 wrote to memory of 2236 4684 z1631373.exe 85 PID 4684 wrote to memory of 2236 4684 z1631373.exe 85 PID 4684 wrote to memory of 2236 4684 z1631373.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe"C:\Users\Admin\AppData\Local\Temp\d3594ef796b899037cbc4834a55723b44948deee106c415aa61522cfe119e40a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6872401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6872401.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1631373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1631373.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1003241.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1003241.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9288599.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9288599.exe4⤵
- Executes dropped EXE
PID:2236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD513da6cd61923a2ff6d9ec75d81a91acd
SHA15896addd3a9766622bb86254e315f8fbd2a086a0
SHA2566aad63ca535a7a407ec236b612b37869b3d3437a75e8732509a25b973562be5c
SHA5120e69ff13e388cc11b96f0024f2279ee1207085f3b96783915ce4b71282539597e44b63396618f1ad735b25e86c0f56ba6773a5c139d8a99d2ca34dac96abb840
-
Filesize
431KB
MD513da6cd61923a2ff6d9ec75d81a91acd
SHA15896addd3a9766622bb86254e315f8fbd2a086a0
SHA2566aad63ca535a7a407ec236b612b37869b3d3437a75e8732509a25b973562be5c
SHA5120e69ff13e388cc11b96f0024f2279ee1207085f3b96783915ce4b71282539597e44b63396618f1ad735b25e86c0f56ba6773a5c139d8a99d2ca34dac96abb840
-
Filesize
206KB
MD5a3f1166e660e362018212064ec6c08b7
SHA1ccaa3ba66e7ad5ca3b3a763c1b69452aa9860239
SHA25675d4ec311d9494f52d7e6959c8bb0fdb0021011bf18d659ba73cd3691acf6464
SHA512e8c60aac941ea7f3a03c6f68be592be591b0c243e62d75bc884690f779f41c72926e634f4dc53c49eb305df1129e424b71c71e3efa4a50076e684c1f27a2ca3f
-
Filesize
206KB
MD5a3f1166e660e362018212064ec6c08b7
SHA1ccaa3ba66e7ad5ca3b3a763c1b69452aa9860239
SHA25675d4ec311d9494f52d7e6959c8bb0fdb0021011bf18d659ba73cd3691acf6464
SHA512e8c60aac941ea7f3a03c6f68be592be591b0c243e62d75bc884690f779f41c72926e634f4dc53c49eb305df1129e424b71c71e3efa4a50076e684c1f27a2ca3f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
174KB
MD5d6697deb3ae5b7fb32f56cbe43452459
SHA18e580e96222a22c2b5016be25a034f6e011c5e78
SHA256fb2fd350a95db5d37f97c78da3386e8d7d31d4ce43122f9f030a3c3d20542a53
SHA512020c9c9e9e5ac912d42d982871df494cce3d550b860da2eccf6e25ab5e4c7a8d77a924394a94f76a6cbc05ed506b91738832788804d06b7033e4cd49258c3ed1
-
Filesize
174KB
MD5d6697deb3ae5b7fb32f56cbe43452459
SHA18e580e96222a22c2b5016be25a034f6e011c5e78
SHA256fb2fd350a95db5d37f97c78da3386e8d7d31d4ce43122f9f030a3c3d20542a53
SHA512020c9c9e9e5ac912d42d982871df494cce3d550b860da2eccf6e25ab5e4c7a8d77a924394a94f76a6cbc05ed506b91738832788804d06b7033e4cd49258c3ed1