Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/08/2023, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe
Resource
win10-20230703-en
General
-
Target
3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe
-
Size
839KB
-
MD5
4d45a0728ea3a3125f52cf07ef2cdd94
-
SHA1
7283fa26bdf8295e9de7c0ff07e6def61184b32d
-
SHA256
3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3
-
SHA512
b207bf53a6e5f7dd66e54dd1c368990eddef3b04a84688b5d952506d7d7d7bc64fb1c1813201a5d9843e74df2d68ddc2b2bcdb52de2e02af551d452eaf0b58e4
-
SSDEEP
24576:LyuwYkrTkXmQiLtceW1yFqGEfU9qP724:+DYkPkYeeW1K6U9M2
Malware Config
Extracted
redline
lang
77.91.124.73:19071
-
auth_value
92c0fc2b7a8b3fc5a01baa1abf31c42a
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afbc-153.dat healer behavioral1/files/0x000700000001afbc-154.dat healer behavioral1/memory/2520-155-0x0000000000990000-0x000000000099A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9181675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9181675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9181675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9181675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9181675.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4900 v2186984.exe 4612 v4518413.exe 3116 v0573103.exe 4520 v3460062.exe 2520 a9181675.exe 3904 b0636441.exe 4484 c5566122.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9181675.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2186984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4518413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0573103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3460062.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2520 a9181675.exe 2520 a9181675.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 a9181675.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4900 4456 3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe 69 PID 4456 wrote to memory of 4900 4456 3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe 69 PID 4456 wrote to memory of 4900 4456 3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe 69 PID 4900 wrote to memory of 4612 4900 v2186984.exe 70 PID 4900 wrote to memory of 4612 4900 v2186984.exe 70 PID 4900 wrote to memory of 4612 4900 v2186984.exe 70 PID 4612 wrote to memory of 3116 4612 v4518413.exe 71 PID 4612 wrote to memory of 3116 4612 v4518413.exe 71 PID 4612 wrote to memory of 3116 4612 v4518413.exe 71 PID 3116 wrote to memory of 4520 3116 v0573103.exe 72 PID 3116 wrote to memory of 4520 3116 v0573103.exe 72 PID 3116 wrote to memory of 4520 3116 v0573103.exe 72 PID 4520 wrote to memory of 2520 4520 v3460062.exe 73 PID 4520 wrote to memory of 2520 4520 v3460062.exe 73 PID 4520 wrote to memory of 3904 4520 v3460062.exe 74 PID 4520 wrote to memory of 3904 4520 v3460062.exe 74 PID 4520 wrote to memory of 3904 4520 v3460062.exe 74 PID 3116 wrote to memory of 4484 3116 v0573103.exe 75 PID 3116 wrote to memory of 4484 3116 v0573103.exe 75 PID 3116 wrote to memory of 4484 3116 v0573103.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe"C:\Users\Admin\AppData\Local\Temp\3a3a580cf9e8fc5f4b0baf33facb039a4d5aba11c7e5e20c795690c84d91eba3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2186984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2186984.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4518413.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4518413.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0573103.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0573103.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3460062.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3460062.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9181675.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9181675.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0636441.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0636441.exe6⤵
- Executes dropped EXE
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5566122.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5566122.exe5⤵
- Executes dropped EXE
PID:4484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD52626c0fa417625013bf25b9ab469f7b5
SHA1f10f5c6709bd2c37ad06f0682f9b24fd7ce88c52
SHA256d50656cbf596b72e8fbb3e08cf2e7e7a73779555a01d09f07af98c6f29961d1d
SHA5120dc1478cb91e2d003836dc4143332dae82215d4d76841122ea5a40b39d6dcaeaba60bbe27f29b4d8162ae20a650edb87c5241bf81a83021f8ad2c7eb10f354fb
-
Filesize
723KB
MD52626c0fa417625013bf25b9ab469f7b5
SHA1f10f5c6709bd2c37ad06f0682f9b24fd7ce88c52
SHA256d50656cbf596b72e8fbb3e08cf2e7e7a73779555a01d09f07af98c6f29961d1d
SHA5120dc1478cb91e2d003836dc4143332dae82215d4d76841122ea5a40b39d6dcaeaba60bbe27f29b4d8162ae20a650edb87c5241bf81a83021f8ad2c7eb10f354fb
-
Filesize
497KB
MD526a3ef6759559d544ea36854d334cb0a
SHA1b8c84e9c53d4637447a90a352529a354eb0aaaa6
SHA2561ac65e95c08a0041656c0b2d26d40bfdd69629d242008a867d585474971b5fae
SHA512ee7e952e556a77ccb67ea0cdd98a5957a56a8ae0fc7a0209fd3b920050ca5bde4cb26c2c9edd1ce2eb60446c34e957535666b51da5afc8e9b5cabbd707acc11f
-
Filesize
497KB
MD526a3ef6759559d544ea36854d334cb0a
SHA1b8c84e9c53d4637447a90a352529a354eb0aaaa6
SHA2561ac65e95c08a0041656c0b2d26d40bfdd69629d242008a867d585474971b5fae
SHA512ee7e952e556a77ccb67ea0cdd98a5957a56a8ae0fc7a0209fd3b920050ca5bde4cb26c2c9edd1ce2eb60446c34e957535666b51da5afc8e9b5cabbd707acc11f
-
Filesize
373KB
MD59bdffaa6c53c851e1dc3332fd541ee7b
SHA188ace8cca1c20a7051883e901b4ea0c4bbeb63e0
SHA256304ce0cae209ba07ea1f656b11e9b56db65ef90f206bd22172cbc8e7a55ea3a4
SHA512f49ec701b7f67f58b3b230c998bb226fb6973bc453ac4218c02bb986f787f8b92567a193825cd5e05052eaf7aefe414571df84b742d4fbe5678a8151bc5125ea
-
Filesize
373KB
MD59bdffaa6c53c851e1dc3332fd541ee7b
SHA188ace8cca1c20a7051883e901b4ea0c4bbeb63e0
SHA256304ce0cae209ba07ea1f656b11e9b56db65ef90f206bd22172cbc8e7a55ea3a4
SHA512f49ec701b7f67f58b3b230c998bb226fb6973bc453ac4218c02bb986f787f8b92567a193825cd5e05052eaf7aefe414571df84b742d4fbe5678a8151bc5125ea
-
Filesize
174KB
MD5329c7b3c86a3b6259bc281e1502a866f
SHA19a2b1f996e458d70bb9fe8246e3c7cb6e00bcb82
SHA256027b3ea03e7c661e97f29da036a05b9819030027999d4bc38eca7935a579f2de
SHA51269e7578ccd594bd97e2406fb1a93d332d3bfef9a8554c633c9894b0664cbb4e889e33f1506961088ee81d6cbb8e2827c6287badf6989f00a3b3d240eb1fa55e0
-
Filesize
174KB
MD5329c7b3c86a3b6259bc281e1502a866f
SHA19a2b1f996e458d70bb9fe8246e3c7cb6e00bcb82
SHA256027b3ea03e7c661e97f29da036a05b9819030027999d4bc38eca7935a579f2de
SHA51269e7578ccd594bd97e2406fb1a93d332d3bfef9a8554c633c9894b0664cbb4e889e33f1506961088ee81d6cbb8e2827c6287badf6989f00a3b3d240eb1fa55e0
-
Filesize
217KB
MD5f86945bd6e1e7ec4dcff5738d9f7f690
SHA141a3993984fe994a98e2a1e2c27f6ae2f3379de0
SHA2561ae282fb83176b7f188e3637c75bb0f56e62c014cbd6628ef5703b72a6b483eb
SHA512398d68ff29c84e0695d794d2fec9e45a3d73ef0c7e743d118e8c2b8a67b626347a58be0e855e00a8b29f64a4e547c9bbcb04fa53b5b7b09afd2f9d8d7efa278f
-
Filesize
217KB
MD5f86945bd6e1e7ec4dcff5738d9f7f690
SHA141a3993984fe994a98e2a1e2c27f6ae2f3379de0
SHA2561ae282fb83176b7f188e3637c75bb0f56e62c014cbd6628ef5703b72a6b483eb
SHA512398d68ff29c84e0695d794d2fec9e45a3d73ef0c7e743d118e8c2b8a67b626347a58be0e855e00a8b29f64a4e547c9bbcb04fa53b5b7b09afd2f9d8d7efa278f
-
Filesize
11KB
MD505b282d5b4815a8e2c88576138f1824c
SHA1e49c98cc0964dccc1380da194cf082913cd8ea70
SHA2569bbcf4ff67e303ab189b0b53120b79c6d1c891ebc1f8c2bf98b5f9ea560777cd
SHA512398f9483c287f02bf91a17374cb00bfbfb3cce7a8a5cda2827e75f1f94b9fb0afc1cdc845323a43134e5f7d2d4f33952aa73767ac82a2313242913d07fcf769d
-
Filesize
11KB
MD505b282d5b4815a8e2c88576138f1824c
SHA1e49c98cc0964dccc1380da194cf082913cd8ea70
SHA2569bbcf4ff67e303ab189b0b53120b79c6d1c891ebc1f8c2bf98b5f9ea560777cd
SHA512398f9483c287f02bf91a17374cb00bfbfb3cce7a8a5cda2827e75f1f94b9fb0afc1cdc845323a43134e5f7d2d4f33952aa73767ac82a2313242913d07fcf769d
-
Filesize
140KB
MD52ba0d37803f2d312ab6bc4c92c8caf2c
SHA1ac929c3fe0c1eede8b4a92eafc3663e1c2faedbd
SHA256ec56f4a8faea7d7d04ad73c2c41afdb335fee06638604eb1b34426459fe694d1
SHA512e54e1fbb602dc3eb2d942f274122e722633e94a1f47eb80118da71f0e9ad3d501764fb78998f0b92c867cf3827eb0c79e4b88606a7f873923840a9708844a68e
-
Filesize
140KB
MD52ba0d37803f2d312ab6bc4c92c8caf2c
SHA1ac929c3fe0c1eede8b4a92eafc3663e1c2faedbd
SHA256ec56f4a8faea7d7d04ad73c2c41afdb335fee06638604eb1b34426459fe694d1
SHA512e54e1fbb602dc3eb2d942f274122e722633e94a1f47eb80118da71f0e9ad3d501764fb78998f0b92c867cf3827eb0c79e4b88606a7f873923840a9708844a68e