Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-08-2023 18:33
Static task
static1
Behavioral task
behavioral1
Sample
fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe
Resource
win10-20230703-en
General
-
Target
fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe
-
Size
838KB
-
MD5
db200f58235f96860d8f3bb501670bd8
-
SHA1
6a599c7e20d0d7d0256b080cd492285556d88ea8
-
SHA256
fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42
-
SHA512
90d730bf9c7ab1204c3368e7dcd861cc627ec66c07f3141e2b0fe37d15a989e84b0f1f27d5b47bf4821f856f4e422bd25abf46192b3f64c307fd904914070ec4
-
SSDEEP
12288:JMrey90j4B28IOlUjQQJf7t7ayHts7Ng5LUr8ocAh3weibhdR0kbFUue/3bn:3yw4BtlqjBTNeQocr9tdqkPqb
Malware Config
Extracted
redline
lang
77.91.124.73:19071
-
auth_value
92c0fc2b7a8b3fc5a01baa1abf31c42a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b03d-155.dat healer behavioral1/files/0x000700000001b03d-156.dat healer behavioral1/memory/1436-157-0x0000000000E60000-0x0000000000E6A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8318047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8318047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8318047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8318047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8318047.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1212 v2407731.exe 1112 v9329002.exe 2916 v5208295.exe 4444 v6312186.exe 1436 a8318047.exe 1440 b5398049.exe 4508 c6103708.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8318047.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2407731.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9329002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5208295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6312186.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 a8318047.exe 1436 a8318047.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 a8318047.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3736 wrote to memory of 1212 3736 fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe 70 PID 3736 wrote to memory of 1212 3736 fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe 70 PID 3736 wrote to memory of 1212 3736 fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe 70 PID 1212 wrote to memory of 1112 1212 v2407731.exe 71 PID 1212 wrote to memory of 1112 1212 v2407731.exe 71 PID 1212 wrote to memory of 1112 1212 v2407731.exe 71 PID 1112 wrote to memory of 2916 1112 v9329002.exe 72 PID 1112 wrote to memory of 2916 1112 v9329002.exe 72 PID 1112 wrote to memory of 2916 1112 v9329002.exe 72 PID 2916 wrote to memory of 4444 2916 v5208295.exe 73 PID 2916 wrote to memory of 4444 2916 v5208295.exe 73 PID 2916 wrote to memory of 4444 2916 v5208295.exe 73 PID 4444 wrote to memory of 1436 4444 v6312186.exe 74 PID 4444 wrote to memory of 1436 4444 v6312186.exe 74 PID 4444 wrote to memory of 1440 4444 v6312186.exe 75 PID 4444 wrote to memory of 1440 4444 v6312186.exe 75 PID 4444 wrote to memory of 1440 4444 v6312186.exe 75 PID 2916 wrote to memory of 4508 2916 v5208295.exe 76 PID 2916 wrote to memory of 4508 2916 v5208295.exe 76 PID 2916 wrote to memory of 4508 2916 v5208295.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe"C:\Users\Admin\AppData\Local\Temp\fa8e408f51176c1f789b74992968eb838bc9ced07dd8887158c7dbb3df389d42.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2407731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2407731.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9329002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9329002.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5208295.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5208295.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6312186.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6312186.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8318047.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8318047.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5398049.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5398049.exe6⤵
- Executes dropped EXE
PID:1440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6103708.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6103708.exe5⤵
- Executes dropped EXE
PID:4508
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5648149a4a984b8e38a25f48a0a80fe06
SHA1c68e07750f267473fbbf06909c410888f26b5b66
SHA2566fe8ef894ca6666b59360f4ed4e064ef377bc510c5a32251cec264ee89a349d7
SHA51277eb44c46b745222931f803c30d31848bb99eea6e3eff192555cd386cc38fe60728080798a23e4d88093e5be5dd0d218da6d1b6a608e6d00a04dae6d9bd08fb8
-
Filesize
722KB
MD5648149a4a984b8e38a25f48a0a80fe06
SHA1c68e07750f267473fbbf06909c410888f26b5b66
SHA2566fe8ef894ca6666b59360f4ed4e064ef377bc510c5a32251cec264ee89a349d7
SHA51277eb44c46b745222931f803c30d31848bb99eea6e3eff192555cd386cc38fe60728080798a23e4d88093e5be5dd0d218da6d1b6a608e6d00a04dae6d9bd08fb8
-
Filesize
497KB
MD545ba4448138f354b6778175575bf0721
SHA1410f8cfbf92f672de0aa8a7377f47925efa0dbe8
SHA256b3ad77ed002eda0452b98ec45a3a4629f3a00265cff53bc0140bb428546662e9
SHA51235a86967eeef4187cf7150a4a06cd4ffec9844c1573b18341d8d3afaaf6824e813634bf9d218a0d8f73f7c6d9105c3475e91c0ebf090acb94af304ebecef1a7a
-
Filesize
497KB
MD545ba4448138f354b6778175575bf0721
SHA1410f8cfbf92f672de0aa8a7377f47925efa0dbe8
SHA256b3ad77ed002eda0452b98ec45a3a4629f3a00265cff53bc0140bb428546662e9
SHA51235a86967eeef4187cf7150a4a06cd4ffec9844c1573b18341d8d3afaaf6824e813634bf9d218a0d8f73f7c6d9105c3475e91c0ebf090acb94af304ebecef1a7a
-
Filesize
372KB
MD5c51baf3457789a9273b544f90c439647
SHA152081e7379e80ed5b12d9be49efa962b2e32b2b6
SHA2568256bea99b2b4fabe4a59894bd58bb24ae21c66a70fc42747100966f87364bd3
SHA512210886cffab720984408347c0c86ac593636443e177cd15f1a66557ba50d653ed037580cd6f17f74e380db85274d0e1c855ffdf66183f1f7db17fa53cc1ad10f
-
Filesize
372KB
MD5c51baf3457789a9273b544f90c439647
SHA152081e7379e80ed5b12d9be49efa962b2e32b2b6
SHA2568256bea99b2b4fabe4a59894bd58bb24ae21c66a70fc42747100966f87364bd3
SHA512210886cffab720984408347c0c86ac593636443e177cd15f1a66557ba50d653ed037580cd6f17f74e380db85274d0e1c855ffdf66183f1f7db17fa53cc1ad10f
-
Filesize
174KB
MD53c6da4b8666ff89a31bba255a9bc2219
SHA122217f5ae18a92ff883a152f7b6a9ffb789b0bdb
SHA256a301cb4bf08494ca22979f6a79824452b31e5d54b56e3756a5d33b961780b5da
SHA512208eaa9b3a15bc162e1488ed8a6cb8ea1cf0ca996b5a3ee25942f1c2c7ee1e64c3752fb82f2ac7fe36433587dd9de1509d874f6036d9c85a73090ab44670505e
-
Filesize
174KB
MD53c6da4b8666ff89a31bba255a9bc2219
SHA122217f5ae18a92ff883a152f7b6a9ffb789b0bdb
SHA256a301cb4bf08494ca22979f6a79824452b31e5d54b56e3756a5d33b961780b5da
SHA512208eaa9b3a15bc162e1488ed8a6cb8ea1cf0ca996b5a3ee25942f1c2c7ee1e64c3752fb82f2ac7fe36433587dd9de1509d874f6036d9c85a73090ab44670505e
-
Filesize
217KB
MD50ea4b8e91ecf9022dd54005470445703
SHA12c82084a8ea85901e47da882840361693016a651
SHA2560b1c898cf0fb126f64444937b7cc5be9a18f2fd90a3e89a184a62b1b946f2643
SHA5124141ee3a06024ec6294eeb8671f6148e275cc9ddabe4a6cfd7227dcf141f36b2edf18d91cf889cc6076b89e53e1652a43d4f7e333da8a4e641869f333927b3e2
-
Filesize
217KB
MD50ea4b8e91ecf9022dd54005470445703
SHA12c82084a8ea85901e47da882840361693016a651
SHA2560b1c898cf0fb126f64444937b7cc5be9a18f2fd90a3e89a184a62b1b946f2643
SHA5124141ee3a06024ec6294eeb8671f6148e275cc9ddabe4a6cfd7227dcf141f36b2edf18d91cf889cc6076b89e53e1652a43d4f7e333da8a4e641869f333927b3e2
-
Filesize
11KB
MD5ab494c8e359b9e9025d5b9fa7c5ae36e
SHA16450ee09d86e9be587e81532e161a6580653d30d
SHA2567528ad8d806765594efe5f3b5c4888ad7b473c6e3dce4f5c69c58724e573c038
SHA512148bc75170271de5cb49bc32d0a6ca6e61e662a69aea948709dc5c9329609f5d62810433691ce1859b0e7453ed1b36dcae124623b11d489b93c3f2680c0c4a64
-
Filesize
11KB
MD5ab494c8e359b9e9025d5b9fa7c5ae36e
SHA16450ee09d86e9be587e81532e161a6580653d30d
SHA2567528ad8d806765594efe5f3b5c4888ad7b473c6e3dce4f5c69c58724e573c038
SHA512148bc75170271de5cb49bc32d0a6ca6e61e662a69aea948709dc5c9329609f5d62810433691ce1859b0e7453ed1b36dcae124623b11d489b93c3f2680c0c4a64
-
Filesize
140KB
MD536456e7e482b23734b1978853d38a50c
SHA1fe5997d9cf0d602ec8727185a180dbf5abf860c1
SHA2562dd6f688eb4ec6a80b2d462c9db6ae7870442ade8ffbfb93da7938ab9b538c4d
SHA51238687b8642dbf0ca8c1b0557890189f67c7d4b2ad6db7f6cc14696ceb9251919bec328526ac8170f7350399fe39dc44a4ea65bb769491ccf151eb5af7fab1c52
-
Filesize
140KB
MD536456e7e482b23734b1978853d38a50c
SHA1fe5997d9cf0d602ec8727185a180dbf5abf860c1
SHA2562dd6f688eb4ec6a80b2d462c9db6ae7870442ade8ffbfb93da7938ab9b538c4d
SHA51238687b8642dbf0ca8c1b0557890189f67c7d4b2ad6db7f6cc14696ceb9251919bec328526ac8170f7350399fe39dc44a4ea65bb769491ccf151eb5af7fab1c52