Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
22-08-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe
Resource
win10-20230703-en
General
-
Target
a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe
-
Size
838KB
-
MD5
63889d20fa85cb24cf19f47ffefbe991
-
SHA1
c99e4ec9f2c9fd8b0f0c1c21aec1b79fe1e1a2b0
-
SHA256
a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e
-
SHA512
b21cbe8c576694165c92938b8f3f078aeb58ecd5c28a16519a0069a8a02e12adacaab8497e45e53faf648c1e696eda74a45e05fe107241ec2249da53769578d5
-
SSDEEP
24576:0yd9GjQKQwjm4+WqEsibOmZ3CBboUg6/:Dd0jQKLm4j4AOme
Malware Config
Extracted
redline
piter
77.91.124.73:19071
-
auth_value
7f92ff466423bb35edbfbc22f78b0bb9
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afb5-150.dat healer behavioral1/files/0x000700000001afb5-151.dat healer behavioral1/memory/4788-152-0x00000000005E0000-0x00000000005EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9705618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9705618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9705618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9705618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9705618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4300 v7908739.exe 4148 v4234303.exe 2836 v7638665.exe 2592 v5076470.exe 4788 a9705618.exe 2400 b0396363.exe 5116 c3024943.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9705618.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5076470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7908739.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4234303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7638665.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4788 a9705618.exe 4788 a9705618.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4788 a9705618.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4300 2748 a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe 70 PID 2748 wrote to memory of 4300 2748 a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe 70 PID 2748 wrote to memory of 4300 2748 a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe 70 PID 4300 wrote to memory of 4148 4300 v7908739.exe 71 PID 4300 wrote to memory of 4148 4300 v7908739.exe 71 PID 4300 wrote to memory of 4148 4300 v7908739.exe 71 PID 4148 wrote to memory of 2836 4148 v4234303.exe 72 PID 4148 wrote to memory of 2836 4148 v4234303.exe 72 PID 4148 wrote to memory of 2836 4148 v4234303.exe 72 PID 2836 wrote to memory of 2592 2836 v7638665.exe 73 PID 2836 wrote to memory of 2592 2836 v7638665.exe 73 PID 2836 wrote to memory of 2592 2836 v7638665.exe 73 PID 2592 wrote to memory of 4788 2592 v5076470.exe 74 PID 2592 wrote to memory of 4788 2592 v5076470.exe 74 PID 2592 wrote to memory of 2400 2592 v5076470.exe 75 PID 2592 wrote to memory of 2400 2592 v5076470.exe 75 PID 2592 wrote to memory of 2400 2592 v5076470.exe 75 PID 2836 wrote to memory of 5116 2836 v7638665.exe 76 PID 2836 wrote to memory of 5116 2836 v7638665.exe 76 PID 2836 wrote to memory of 5116 2836 v7638665.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe"C:\Users\Admin\AppData\Local\Temp\a7e9830a55797aa72f21e55eab5babc79ddabd52e9d6be70a23fec8a8bc4e64e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7908739.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7908739.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4234303.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4234303.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7638665.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7638665.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5076470.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5076470.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9705618.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9705618.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0396363.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0396363.exe6⤵
- Executes dropped EXE
PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3024943.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3024943.exe5⤵
- Executes dropped EXE
PID:5116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD50dad8d2acfd0c5af8c63f117773afa51
SHA1440b4be04e33f6aa9058653bb1c13908578ee8a6
SHA256a3574415dde9b9e8d6664d144fce33214e81f23edb1f63c8b033aff8499a860c
SHA5128ff33b89ef299c5059268aaae521b3eea7f6183876f986cfb134ac0307bc58662d3c7c461a454069d78abcad12dfc699528de6d3311c62d574e3d7f1f41d11a8
-
Filesize
722KB
MD50dad8d2acfd0c5af8c63f117773afa51
SHA1440b4be04e33f6aa9058653bb1c13908578ee8a6
SHA256a3574415dde9b9e8d6664d144fce33214e81f23edb1f63c8b033aff8499a860c
SHA5128ff33b89ef299c5059268aaae521b3eea7f6183876f986cfb134ac0307bc58662d3c7c461a454069d78abcad12dfc699528de6d3311c62d574e3d7f1f41d11a8
-
Filesize
497KB
MD538dc1e5c64c4090dda19ba26e21bb032
SHA1202ee306dc4bd8252f01537cc3ce3a6a3e047cab
SHA256ddfff9f17051861e88af38e5c611516aa75f5b989c352d078554cb80347dbe73
SHA51222a8c5c6abcecda16e0d7db81c5a74cda65a3669a1b373c6a8a558e2fd2243338507173a212fdc36525d71621c2baded6f01a5c1bb4146bf6b54437fbb382d2f
-
Filesize
497KB
MD538dc1e5c64c4090dda19ba26e21bb032
SHA1202ee306dc4bd8252f01537cc3ce3a6a3e047cab
SHA256ddfff9f17051861e88af38e5c611516aa75f5b989c352d078554cb80347dbe73
SHA51222a8c5c6abcecda16e0d7db81c5a74cda65a3669a1b373c6a8a558e2fd2243338507173a212fdc36525d71621c2baded6f01a5c1bb4146bf6b54437fbb382d2f
-
Filesize
372KB
MD59c406845287e4b56334e72fe8d5e01ef
SHA1b096c154e53eb52b9cf6a39b040ffa9201698cba
SHA25628f22aef5af25dd8f7304a6481c17d0b2c14d5f6c6ccc16cce34bf8349929832
SHA512b6074020d943c8579254c93086c655d3713f3613c771749cac7de7679d3b2d0b653a10009885b3fa72ca29f4479cae3db635103e3a2bc8af92729133ebaa3a15
-
Filesize
372KB
MD59c406845287e4b56334e72fe8d5e01ef
SHA1b096c154e53eb52b9cf6a39b040ffa9201698cba
SHA25628f22aef5af25dd8f7304a6481c17d0b2c14d5f6c6ccc16cce34bf8349929832
SHA512b6074020d943c8579254c93086c655d3713f3613c771749cac7de7679d3b2d0b653a10009885b3fa72ca29f4479cae3db635103e3a2bc8af92729133ebaa3a15
-
Filesize
174KB
MD5fadd6ab56f3ab0c5dc9d4b35e43d0935
SHA182028f368dc20df2bf6d6a9a27f2bab7dbd33965
SHA256d5e6be41c26bc69ff18a6e561c236765e46f67cbaaa74d3f5434432d8459650b
SHA51220ae19499da3d5534495e66ebcd51946b710fdd581b49dff1a9462b9cc9f9a9260aefd492046783f8c23cff9329fab86f337d81eff45a74b6ead8e839ed90281
-
Filesize
174KB
MD5fadd6ab56f3ab0c5dc9d4b35e43d0935
SHA182028f368dc20df2bf6d6a9a27f2bab7dbd33965
SHA256d5e6be41c26bc69ff18a6e561c236765e46f67cbaaa74d3f5434432d8459650b
SHA51220ae19499da3d5534495e66ebcd51946b710fdd581b49dff1a9462b9cc9f9a9260aefd492046783f8c23cff9329fab86f337d81eff45a74b6ead8e839ed90281
-
Filesize
216KB
MD5b5b232589cf05f6de1a4a520511ba187
SHA1bfe71d51bb1bae3784eb4d596d93ac5bbd734c03
SHA25684217da5e4ef398a55783af02d03e30457bc526985597cdf53ba05e2fc493b38
SHA51273fc0fa00ca8a2c1d4eb4342092c670a05c7f7d0fee1a16fa7ef3c78f5b3159d7e2226b5b35e582e894f97e57c54bbf6e3be55c33cebe9e877bfbe8189d65227
-
Filesize
216KB
MD5b5b232589cf05f6de1a4a520511ba187
SHA1bfe71d51bb1bae3784eb4d596d93ac5bbd734c03
SHA25684217da5e4ef398a55783af02d03e30457bc526985597cdf53ba05e2fc493b38
SHA51273fc0fa00ca8a2c1d4eb4342092c670a05c7f7d0fee1a16fa7ef3c78f5b3159d7e2226b5b35e582e894f97e57c54bbf6e3be55c33cebe9e877bfbe8189d65227
-
Filesize
11KB
MD503d86c92af21b48d916cd6b0ec486e59
SHA17c6d54181ace51e349a2ca5a888907fb9d3a7afe
SHA2567557c511062c30db37837aa2d3d1b24c36149bf2f24ed90d161b3799021caf14
SHA512951f96f48e620af0f22d59aa4348de1b47114c93a1d0a7d1add0f3c508bc9812f341e026ff0c91a7b2ca4482fe0c0ac6aa9fa4f2a4998f55e0f02f14dde4d818
-
Filesize
11KB
MD503d86c92af21b48d916cd6b0ec486e59
SHA17c6d54181ace51e349a2ca5a888907fb9d3a7afe
SHA2567557c511062c30db37837aa2d3d1b24c36149bf2f24ed90d161b3799021caf14
SHA512951f96f48e620af0f22d59aa4348de1b47114c93a1d0a7d1add0f3c508bc9812f341e026ff0c91a7b2ca4482fe0c0ac6aa9fa4f2a4998f55e0f02f14dde4d818
-
Filesize
140KB
MD510eeaf04c674d873e00bf51a23351003
SHA18a61c4a4bf9566d672d50fff72702d0921cca123
SHA256b5629abe1d83eaf4d5d55d3735ca5701a2b7c63ef6a2f5c0c1a51c237ad95197
SHA51228839387a8ef9e81c8f774c41dc3641474cb9a9bf87ac33488c24f3e80dc3777c37883bf77bbb76ce4c89b4f68269354d85cd0a4e866343361cd6a176945c096
-
Filesize
140KB
MD510eeaf04c674d873e00bf51a23351003
SHA18a61c4a4bf9566d672d50fff72702d0921cca123
SHA256b5629abe1d83eaf4d5d55d3735ca5701a2b7c63ef6a2f5c0c1a51c237ad95197
SHA51228839387a8ef9e81c8f774c41dc3641474cb9a9bf87ac33488c24f3e80dc3777c37883bf77bbb76ce4c89b4f68269354d85cd0a4e866343361cd6a176945c096