Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe
Resource
win10v2004-20230703-en
General
-
Target
22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe
-
Size
828KB
-
MD5
1c2c1c58775db71327a2bd657966d712
-
SHA1
f666dd4f37e2ec7c551aefe637adafc189745faa
-
SHA256
22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94
-
SHA512
693f8a3ebdc4f95e50dc2b1742904c2c2e893fbe474975baad7587263aa08889dfa85157b9c76c67313a59e84108965b1477110aa8c5986a593a35ec3c572e68
-
SSDEEP
12288:lMruy90ArJUKUsgCrqTNP3vKwQlUZ+ObHjB+IeFrz4HFsHQ0lPt/uzoV:HyjrJUZ1/Tp/EmMtvHQ2t/u0V
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231d0-166.dat healer behavioral1/files/0x00070000000231d0-167.dat healer behavioral1/memory/4108-168-0x0000000000790000-0x000000000079A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6861338.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6861338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6861338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6861338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6861338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6861338.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4400 v3645513.exe 2952 v3624780.exe 4864 v2031847.exe 2020 v8564586.exe 4108 a6861338.exe 1148 b0145093.exe 2844 c5959369.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6861338.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3645513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3624780.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2031847.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8564586.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4108 a6861338.exe 4108 a6861338.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4108 a6861338.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4400 1256 22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe 82 PID 1256 wrote to memory of 4400 1256 22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe 82 PID 1256 wrote to memory of 4400 1256 22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe 82 PID 4400 wrote to memory of 2952 4400 v3645513.exe 83 PID 4400 wrote to memory of 2952 4400 v3645513.exe 83 PID 4400 wrote to memory of 2952 4400 v3645513.exe 83 PID 2952 wrote to memory of 4864 2952 v3624780.exe 84 PID 2952 wrote to memory of 4864 2952 v3624780.exe 84 PID 2952 wrote to memory of 4864 2952 v3624780.exe 84 PID 4864 wrote to memory of 2020 4864 v2031847.exe 85 PID 4864 wrote to memory of 2020 4864 v2031847.exe 85 PID 4864 wrote to memory of 2020 4864 v2031847.exe 85 PID 2020 wrote to memory of 4108 2020 v8564586.exe 86 PID 2020 wrote to memory of 4108 2020 v8564586.exe 86 PID 2020 wrote to memory of 1148 2020 v8564586.exe 95 PID 2020 wrote to memory of 1148 2020 v8564586.exe 95 PID 2020 wrote to memory of 1148 2020 v8564586.exe 95 PID 4864 wrote to memory of 2844 4864 v2031847.exe 96 PID 4864 wrote to memory of 2844 4864 v2031847.exe 96 PID 4864 wrote to memory of 2844 4864 v2031847.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe"C:\Users\Admin\AppData\Local\Temp\22ee4d43a861d1f37e07ff4d4f66448dafcddb76123183abbb36f8df778c7e94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3645513.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3645513.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3624780.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3624780.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2031847.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2031847.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8564586.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8564586.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861338.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6861338.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0145093.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0145093.exe6⤵
- Executes dropped EXE
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5959369.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5959369.exe5⤵
- Executes dropped EXE
PID:2844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5401206c02832d48ef48f74db8b594800
SHA1efeaded91031108b319f38c586cee338383cd23a
SHA2564651747b120e62ed13368088f053b34e54c525a82a0eebf1efd8777c2119e1ee
SHA512ac545d34f2f4974ef5066161b1579a8eac0dfeb50470ac827aeab75827029b36487bb166f6e57db76d0dec9ab3796c1381e370125cec22c60b16aae5f9ded81b
-
Filesize
722KB
MD5401206c02832d48ef48f74db8b594800
SHA1efeaded91031108b319f38c586cee338383cd23a
SHA2564651747b120e62ed13368088f053b34e54c525a82a0eebf1efd8777c2119e1ee
SHA512ac545d34f2f4974ef5066161b1579a8eac0dfeb50470ac827aeab75827029b36487bb166f6e57db76d0dec9ab3796c1381e370125cec22c60b16aae5f9ded81b
-
Filesize
497KB
MD5e8e9b4644b6680666929d19949c3feab
SHA137139cad7ba76aa9bfdbde59f27db2a8ce152e87
SHA25611af4d6fb4cc59dd327bab39879a64bff5cf6ff8202594094de43d5cfe4d6d99
SHA512e6d9f6e50dcb57a29c5a50bb86b35c43f42b75e01a5309763bdb796b85c96f40b4d54d36f49d3fc07388e1ba48f937ceca5465ef41d394df6d1feca52c49f80e
-
Filesize
497KB
MD5e8e9b4644b6680666929d19949c3feab
SHA137139cad7ba76aa9bfdbde59f27db2a8ce152e87
SHA25611af4d6fb4cc59dd327bab39879a64bff5cf6ff8202594094de43d5cfe4d6d99
SHA512e6d9f6e50dcb57a29c5a50bb86b35c43f42b75e01a5309763bdb796b85c96f40b4d54d36f49d3fc07388e1ba48f937ceca5465ef41d394df6d1feca52c49f80e
-
Filesize
373KB
MD5a4fa2902829fcdf2a81de04a5f121815
SHA1623bb5148fed0cdc4d53a2814c4c4acddcbbb7ce
SHA2561cbbcbf7ea078c1f79f8d7208e3cc7dc92c1780e25c9a7f3256b88f7b31741c2
SHA512b648ff538daae68249f3c95bf0b411032f98bb6da762998e8c73b801d82b53c5cfe1d0a22761b9ec017fbb719b29e1dffca186d084d929a07c0fe97671b919d7
-
Filesize
373KB
MD5a4fa2902829fcdf2a81de04a5f121815
SHA1623bb5148fed0cdc4d53a2814c4c4acddcbbb7ce
SHA2561cbbcbf7ea078c1f79f8d7208e3cc7dc92c1780e25c9a7f3256b88f7b31741c2
SHA512b648ff538daae68249f3c95bf0b411032f98bb6da762998e8c73b801d82b53c5cfe1d0a22761b9ec017fbb719b29e1dffca186d084d929a07c0fe97671b919d7
-
Filesize
174KB
MD54d19af410622eb7ad9157496c058f16c
SHA1896cb8b091f990f378197ff98fe43d8ec15f4356
SHA256d503e0e2a87f11f31867e72727a12288fb0c57c01da16e9b7b6977a634bd1bf6
SHA512bbdfdacc40baffd2d8a7f5293697e1a84e98257e16e7c722b0b5931ff0914f7bc030ab35101cf30b61fd1e4e1e96366e10a959407a1ee520c148937cabb9a814
-
Filesize
174KB
MD54d19af410622eb7ad9157496c058f16c
SHA1896cb8b091f990f378197ff98fe43d8ec15f4356
SHA256d503e0e2a87f11f31867e72727a12288fb0c57c01da16e9b7b6977a634bd1bf6
SHA512bbdfdacc40baffd2d8a7f5293697e1a84e98257e16e7c722b0b5931ff0914f7bc030ab35101cf30b61fd1e4e1e96366e10a959407a1ee520c148937cabb9a814
-
Filesize
216KB
MD5eabd270bf3533d165bb21df9ec1dd5ca
SHA1918d900dcfdeeb6202f3fdf05662ca7cf0e29bfd
SHA256e34834e1a4b62155a1ee7171a5a1377c9a4498ed5139146186508cffd15bd3aa
SHA5126f369ff392cd376572f0931a0deffe4e7a2fa0b57bec39b1d927031b0acdca1c7024dfe1ff24f158605e88070197b298c8569bd6b6724925efa21f7758530ea3
-
Filesize
216KB
MD5eabd270bf3533d165bb21df9ec1dd5ca
SHA1918d900dcfdeeb6202f3fdf05662ca7cf0e29bfd
SHA256e34834e1a4b62155a1ee7171a5a1377c9a4498ed5139146186508cffd15bd3aa
SHA5126f369ff392cd376572f0931a0deffe4e7a2fa0b57bec39b1d927031b0acdca1c7024dfe1ff24f158605e88070197b298c8569bd6b6724925efa21f7758530ea3
-
Filesize
11KB
MD5fc0b19030e767567275c7c84665ad64e
SHA1c41590731a5ea1ee30016744c4dc940d7641e7a3
SHA25613eecfc7bba3be75188d5080cbd70b08f2cc204e96d67a463706d9b48ca8a2c5
SHA512e1e683305e4a2935c7c02c322cdbef55ed56b93859a5ed8dccc1132ee6a6bebd89df46fedd95b575930f1b2b3d3416359f5da3d73fcfdeaf3785a2ae3b415ff1
-
Filesize
11KB
MD5fc0b19030e767567275c7c84665ad64e
SHA1c41590731a5ea1ee30016744c4dc940d7641e7a3
SHA25613eecfc7bba3be75188d5080cbd70b08f2cc204e96d67a463706d9b48ca8a2c5
SHA512e1e683305e4a2935c7c02c322cdbef55ed56b93859a5ed8dccc1132ee6a6bebd89df46fedd95b575930f1b2b3d3416359f5da3d73fcfdeaf3785a2ae3b415ff1
-
Filesize
140KB
MD5b0103404f632828f421474ec100b304e
SHA1602f22ec6f79d52372f2c4bf92ca69f98d39d1be
SHA2561260b389fd62f6a991beffb7360e05f716fcb4bb93d27a03b3c93e4d0f07ff9e
SHA512a9426292f44f1c61f6d7c3fcab5c8a07ad6fe3995a4c86a2ddcb14bdd25deec8ed5f41801abf6563d1057d54f5f7791af42ffe4024f2c980401e3e47836d0e0c
-
Filesize
140KB
MD5b0103404f632828f421474ec100b304e
SHA1602f22ec6f79d52372f2c4bf92ca69f98d39d1be
SHA2561260b389fd62f6a991beffb7360e05f716fcb4bb93d27a03b3c93e4d0f07ff9e
SHA512a9426292f44f1c61f6d7c3fcab5c8a07ad6fe3995a4c86a2ddcb14bdd25deec8ed5f41801abf6563d1057d54f5f7791af42ffe4024f2c980401e3e47836d0e0c