Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe
Resource
win10v2004-20230703-en
General
-
Target
2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe
-
Size
829KB
-
MD5
6bebc5fe020296ea13590e9dc549e14f
-
SHA1
7da48756262282edfa872d6b69b12a96e41909e6
-
SHA256
2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85
-
SHA512
7967bda309bf80e76da70c6db080719695d2cd5e01481af9724add20d9696e4e8a0d48725eb81f9c2ca6d84cd6d3d01b9062cb9611c99d69135850e7288bb3bf
-
SSDEEP
24576:xyzHBPeWkppXC80ze2DkAjhTFHyu89uJP:kzHBPrk6jnhFXL
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002322a-167.dat healer behavioral1/files/0x000800000002322a-166.dat healer behavioral1/memory/4248-168-0x0000000000170000-0x000000000017A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1379871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1379871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1379871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1379871.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1379871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1379871.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2860 v0215415.exe 1656 v8762767.exe 1736 v2389784.exe 1664 v5089979.exe 4248 a1379871.exe 980 b2004640.exe 2540 c3014458.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1379871.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0215415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8762767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2389784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5089979.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 a1379871.exe 4248 a1379871.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4248 a1379871.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2860 2080 2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe 80 PID 2080 wrote to memory of 2860 2080 2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe 80 PID 2080 wrote to memory of 2860 2080 2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe 80 PID 2860 wrote to memory of 1656 2860 v0215415.exe 81 PID 2860 wrote to memory of 1656 2860 v0215415.exe 81 PID 2860 wrote to memory of 1656 2860 v0215415.exe 81 PID 1656 wrote to memory of 1736 1656 v8762767.exe 82 PID 1656 wrote to memory of 1736 1656 v8762767.exe 82 PID 1656 wrote to memory of 1736 1656 v8762767.exe 82 PID 1736 wrote to memory of 1664 1736 v2389784.exe 83 PID 1736 wrote to memory of 1664 1736 v2389784.exe 83 PID 1736 wrote to memory of 1664 1736 v2389784.exe 83 PID 1664 wrote to memory of 4248 1664 v5089979.exe 84 PID 1664 wrote to memory of 4248 1664 v5089979.exe 84 PID 1664 wrote to memory of 980 1664 v5089979.exe 90 PID 1664 wrote to memory of 980 1664 v5089979.exe 90 PID 1664 wrote to memory of 980 1664 v5089979.exe 90 PID 1736 wrote to memory of 2540 1736 v2389784.exe 91 PID 1736 wrote to memory of 2540 1736 v2389784.exe 91 PID 1736 wrote to memory of 2540 1736 v2389784.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe"C:\Users\Admin\AppData\Local\Temp\2577c052789bce3a5d72d4e9cea33b945f99b20000ea1f1cbb1b61e72f687c85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0215415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0215415.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8762767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8762767.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2389784.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2389784.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5089979.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5089979.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1379871.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1379871.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2004640.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2004640.exe6⤵
- Executes dropped EXE
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3014458.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3014458.exe5⤵
- Executes dropped EXE
PID:2540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD54ae241917047316274dc8d1152979579
SHA120656d8c22565677c487022d51519776aa0b0678
SHA2568db7636d08ad5c393d60b8e38a675314c863f96bf99897061a475d54b6431c81
SHA512dae76e613ff464ae292bff498e023968d2d4333cf789bc5a8bb3e4e0d1c1128ff13d3cd2c32f5e2bdb8a931c83ae27e3214f566b5f6f15161a93d88bd9befb7e
-
Filesize
723KB
MD54ae241917047316274dc8d1152979579
SHA120656d8c22565677c487022d51519776aa0b0678
SHA2568db7636d08ad5c393d60b8e38a675314c863f96bf99897061a475d54b6431c81
SHA512dae76e613ff464ae292bff498e023968d2d4333cf789bc5a8bb3e4e0d1c1128ff13d3cd2c32f5e2bdb8a931c83ae27e3214f566b5f6f15161a93d88bd9befb7e
-
Filesize
497KB
MD55f9a4c9971c0ef49d5a2c4b4bcc14f8a
SHA171b284952a02937434f3a4803eca882360b429ea
SHA25697d318c03b11878610bb84655bb321a814cd10ae6c948504cb1570e939dffeb4
SHA512deae6e42bbf00d8199b4e08d926d5de70eff305ec0e92d4e37d56ca230786d86109c4f2bb1b82bcab28339ebd863adaafd909fafee704068edf5d279a3ba3ce5
-
Filesize
497KB
MD55f9a4c9971c0ef49d5a2c4b4bcc14f8a
SHA171b284952a02937434f3a4803eca882360b429ea
SHA25697d318c03b11878610bb84655bb321a814cd10ae6c948504cb1570e939dffeb4
SHA512deae6e42bbf00d8199b4e08d926d5de70eff305ec0e92d4e37d56ca230786d86109c4f2bb1b82bcab28339ebd863adaafd909fafee704068edf5d279a3ba3ce5
-
Filesize
372KB
MD5ea99de04a591693db1dd7c6f70d25287
SHA1038b69d65e4623cafa69531cba8948d98a5752dd
SHA256badcdf1258fd8740fce5bf1f3577d493aa9f36acb692364c4396566d6ab4502b
SHA5129e0a6a38fc3d07e111530dd49a06afff50965ab5f48c07636956e35fd52b60795d48c5e1cb934b603a8f55a3995debcf4df0190617351ef0cde02d1bb7095de2
-
Filesize
372KB
MD5ea99de04a591693db1dd7c6f70d25287
SHA1038b69d65e4623cafa69531cba8948d98a5752dd
SHA256badcdf1258fd8740fce5bf1f3577d493aa9f36acb692364c4396566d6ab4502b
SHA5129e0a6a38fc3d07e111530dd49a06afff50965ab5f48c07636956e35fd52b60795d48c5e1cb934b603a8f55a3995debcf4df0190617351ef0cde02d1bb7095de2
-
Filesize
174KB
MD5b64e513de7cca244458d794b12c49374
SHA1ca7c5393de85ab8e8bbdb2e9c7475a628391c30a
SHA2567477e62530c788878e92f1441896ab9023f45a247a302fbee06dee1676fea880
SHA5126e2a2ce08599b3853aa0eb376b359cccd3ac4d04d4b077b3f7a26532480c2e38020f52ac2a94bf499fcb9258ae86dfd7d3e595e9ffccb72c6eff62e286360327
-
Filesize
174KB
MD5b64e513de7cca244458d794b12c49374
SHA1ca7c5393de85ab8e8bbdb2e9c7475a628391c30a
SHA2567477e62530c788878e92f1441896ab9023f45a247a302fbee06dee1676fea880
SHA5126e2a2ce08599b3853aa0eb376b359cccd3ac4d04d4b077b3f7a26532480c2e38020f52ac2a94bf499fcb9258ae86dfd7d3e595e9ffccb72c6eff62e286360327
-
Filesize
216KB
MD54f6adee351b89f7ce61890588ffabe03
SHA1066258083c258cf6fe8a0048659a1e199ba0fd6f
SHA25667e0b8a0db582f81d9a1f5a4159f8e479f9fee0fd5610dc436338b350068bca4
SHA512d8c5ca817eadb2e176d240e90c6e165169ddec761c7fa960e2c00dcf16fbf59a78dc3cb2f7b0ad8201c5bec92ca0db0cbcab876790faa15a515da16a3bfb3b89
-
Filesize
216KB
MD54f6adee351b89f7ce61890588ffabe03
SHA1066258083c258cf6fe8a0048659a1e199ba0fd6f
SHA25667e0b8a0db582f81d9a1f5a4159f8e479f9fee0fd5610dc436338b350068bca4
SHA512d8c5ca817eadb2e176d240e90c6e165169ddec761c7fa960e2c00dcf16fbf59a78dc3cb2f7b0ad8201c5bec92ca0db0cbcab876790faa15a515da16a3bfb3b89
-
Filesize
11KB
MD579e4d8d3c0a43fe16ba8c7c1fac1e1dc
SHA1a3171339ad7f4fb382363e6faa1593341821909e
SHA256e7d51007282866e3cb4efb9aad2df131e21a915f448e3eb5213a1a3052e8ab94
SHA512fcac778177ff9425edca0d458bd4f720213fc8a0de119a1f1d4600517b875b0fe8478acc23c066adc32bae907571e9d67cd0322e59f39eb60798a06a669dde08
-
Filesize
11KB
MD579e4d8d3c0a43fe16ba8c7c1fac1e1dc
SHA1a3171339ad7f4fb382363e6faa1593341821909e
SHA256e7d51007282866e3cb4efb9aad2df131e21a915f448e3eb5213a1a3052e8ab94
SHA512fcac778177ff9425edca0d458bd4f720213fc8a0de119a1f1d4600517b875b0fe8478acc23c066adc32bae907571e9d67cd0322e59f39eb60798a06a669dde08
-
Filesize
140KB
MD5cc3cf969dbc3176cee04153b9ce5d713
SHA1365c419e5ba0dd8674012ea7109d1d20c99bd417
SHA25658dcedb0824f71315e38f509dab84cad5c7c6d404bb2f1167ec3716080547e9a
SHA512e60316342b26b8cd75be91f237c52ffa748908f788221baeb02f1ac495f0bc3fbc73be9b110434d1f0d978a7485690aa27d383aa285709ce26ecd3affe7333dd
-
Filesize
140KB
MD5cc3cf969dbc3176cee04153b9ce5d713
SHA1365c419e5ba0dd8674012ea7109d1d20c99bd417
SHA25658dcedb0824f71315e38f509dab84cad5c7c6d404bb2f1167ec3716080547e9a
SHA512e60316342b26b8cd75be91f237c52ffa748908f788221baeb02f1ac495f0bc3fbc73be9b110434d1f0d978a7485690aa27d383aa285709ce26ecd3affe7333dd