Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe
Resource
win10v2004-20230703-en
General
-
Target
642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe
-
Size
828KB
-
MD5
a20055d2c026f44b066145c0aa071fb0
-
SHA1
ea566bf4a19946e23ea9772985885e52a420ffa6
-
SHA256
642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d
-
SHA512
0e587e913bebcc0d8d6c90683e8dcd3a91b5f77b8cee515010551f39c45cd9eeb6570b23f7f100c2859d0b59867a9f8bcbd9af83fcbee901501cb123dc6b8468
-
SSDEEP
24576:tyIjGnM8VgDPoH7QaREK2xIL2T/w7x6yc7:IVMDORf8A4
Malware Config
Extracted
redline
gogi
77.91.124.73:19071
-
auth_value
c7dbabcf1eff128a595c7532cb5489a8
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023237-33.dat healer behavioral1/files/0x0007000000023237-34.dat healer behavioral1/memory/3884-35-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9122562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9122562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9122562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9122562.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9122562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9122562.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4876 v8158188.exe 1336 v1918618.exe 400 v3847809.exe 2084 v7844641.exe 3884 a9122562.exe 4428 b7950752.exe 540 c4920468.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9122562.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8158188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1918618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3847809.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7844641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3884 a9122562.exe 3884 a9122562.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3884 a9122562.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4876 1508 642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe 82 PID 1508 wrote to memory of 4876 1508 642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe 82 PID 1508 wrote to memory of 4876 1508 642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe 82 PID 4876 wrote to memory of 1336 4876 v8158188.exe 83 PID 4876 wrote to memory of 1336 4876 v8158188.exe 83 PID 4876 wrote to memory of 1336 4876 v8158188.exe 83 PID 1336 wrote to memory of 400 1336 v1918618.exe 84 PID 1336 wrote to memory of 400 1336 v1918618.exe 84 PID 1336 wrote to memory of 400 1336 v1918618.exe 84 PID 400 wrote to memory of 2084 400 v3847809.exe 85 PID 400 wrote to memory of 2084 400 v3847809.exe 85 PID 400 wrote to memory of 2084 400 v3847809.exe 85 PID 2084 wrote to memory of 3884 2084 v7844641.exe 86 PID 2084 wrote to memory of 3884 2084 v7844641.exe 86 PID 2084 wrote to memory of 4428 2084 v7844641.exe 94 PID 2084 wrote to memory of 4428 2084 v7844641.exe 94 PID 2084 wrote to memory of 4428 2084 v7844641.exe 94 PID 400 wrote to memory of 540 400 v3847809.exe 95 PID 400 wrote to memory of 540 400 v3847809.exe 95 PID 400 wrote to memory of 540 400 v3847809.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe"C:\Users\Admin\AppData\Local\Temp\642bbdfed1fe525de87228585d5191cff914b7a5b5d75b4f171bad570e90731d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8158188.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8158188.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1918618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1918618.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3847809.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3847809.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7844641.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7844641.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9122562.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9122562.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7950752.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7950752.exe6⤵
- Executes dropped EXE
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4920468.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4920468.exe5⤵
- Executes dropped EXE
PID:540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5313d49a1bb9311f43481ff417d31da92
SHA1961f173d21ea41eb40ab34d8399cd9ea42b5ac1c
SHA256e54a69e279d4ddccdde8cef6d7741c6e1b491449e8efe0f79d3fcaae856aeb64
SHA5123c626e3ce7c6e5829b05291ef90b0495af4f4bf89f3de7be32a738742da9d31aea041644ac7f73252a1ae0b7910bb2cb368e728a367124f7a31d055c8bac1401
-
Filesize
723KB
MD5313d49a1bb9311f43481ff417d31da92
SHA1961f173d21ea41eb40ab34d8399cd9ea42b5ac1c
SHA256e54a69e279d4ddccdde8cef6d7741c6e1b491449e8efe0f79d3fcaae856aeb64
SHA5123c626e3ce7c6e5829b05291ef90b0495af4f4bf89f3de7be32a738742da9d31aea041644ac7f73252a1ae0b7910bb2cb368e728a367124f7a31d055c8bac1401
-
Filesize
497KB
MD59f5924a2156ede4c58bbb022d5db83fc
SHA1a21cc42ae21449459e3841d87ae81cbc6ec10b85
SHA25605e3b2093349668e22e8f046387a15620b35c18cdfa3ba5096ada3cea158ec31
SHA5124bc858f852369338810e2eaca28499af3e89f71f2d8b5f92bb51d29cf6506a30a655863093a9d6fd264e0c29805ca18e138c8a928fea33fd7b9869abc7ec2697
-
Filesize
497KB
MD59f5924a2156ede4c58bbb022d5db83fc
SHA1a21cc42ae21449459e3841d87ae81cbc6ec10b85
SHA25605e3b2093349668e22e8f046387a15620b35c18cdfa3ba5096ada3cea158ec31
SHA5124bc858f852369338810e2eaca28499af3e89f71f2d8b5f92bb51d29cf6506a30a655863093a9d6fd264e0c29805ca18e138c8a928fea33fd7b9869abc7ec2697
-
Filesize
373KB
MD5a504b5389fc800f064149c872532d371
SHA19332905a3a3c015bfe62cadb0b802e65c2bc5090
SHA2568b2369aada64232975d48fd15a4bdb1da2c8d44ae3919982e0e0e0633fe8c18d
SHA5128af7457f20381273aa1f8af314d2a9159e825160d271fb3fe749201d3ca687c846dd1970190bff0ab5aa2cdd9108abe08dc96e2c131fcd0fe4c58557bfada475
-
Filesize
373KB
MD5a504b5389fc800f064149c872532d371
SHA19332905a3a3c015bfe62cadb0b802e65c2bc5090
SHA2568b2369aada64232975d48fd15a4bdb1da2c8d44ae3919982e0e0e0633fe8c18d
SHA5128af7457f20381273aa1f8af314d2a9159e825160d271fb3fe749201d3ca687c846dd1970190bff0ab5aa2cdd9108abe08dc96e2c131fcd0fe4c58557bfada475
-
Filesize
173KB
MD5f3c53290825d382c2b93eefadd5dc9fb
SHA11a10fd85b1342fc51ca3ccec3a8f1d15b71feeca
SHA256ab4244e68c80b6814c65b59d99e23812d9632cdad7ab12cee62ad9455f8a1d35
SHA51239fb1751b2d53b883075364ec79f72e828061741e729bcda0478611ce4e1f7d02dde721391958bd8adbc9bb24ab13574ad89bf22627ffc8e0a9fdfaf3af9bf0e
-
Filesize
173KB
MD5f3c53290825d382c2b93eefadd5dc9fb
SHA11a10fd85b1342fc51ca3ccec3a8f1d15b71feeca
SHA256ab4244e68c80b6814c65b59d99e23812d9632cdad7ab12cee62ad9455f8a1d35
SHA51239fb1751b2d53b883075364ec79f72e828061741e729bcda0478611ce4e1f7d02dde721391958bd8adbc9bb24ab13574ad89bf22627ffc8e0a9fdfaf3af9bf0e
-
Filesize
217KB
MD51e9489eab0eac141f68bf3b08a1fbe49
SHA1f7e784b4bcfe08f653a3d49e2c5a9d465dc834f8
SHA25683e9693b9147d58077dfead159b0091ab073cf07060ccfac799888fdedf9f689
SHA512d415de087ec4734a7ad14dbbf2ff49985322c6d8cbd0272911f248c992913408d10a05922f369912e57a2fc0b81969a435f529892733340055454f3968b94f10
-
Filesize
217KB
MD51e9489eab0eac141f68bf3b08a1fbe49
SHA1f7e784b4bcfe08f653a3d49e2c5a9d465dc834f8
SHA25683e9693b9147d58077dfead159b0091ab073cf07060ccfac799888fdedf9f689
SHA512d415de087ec4734a7ad14dbbf2ff49985322c6d8cbd0272911f248c992913408d10a05922f369912e57a2fc0b81969a435f529892733340055454f3968b94f10
-
Filesize
12KB
MD58c350a8ab78f7aef75078687ceab5711
SHA1858a03c16af22c8dcb887ad2016d6f999f7e0d14
SHA256fa5bdf03302727e2417cfe4d824b753cf3243c5066694b82073f101198c3bd0f
SHA512deff1900e0e9f0158e6b48863aa689ce3b282de939fde8bacb676aaa41f4121e3dd5bd04483d592cc8a6ea28612f5f9762a908505cd5f16e433835df55a1bc8b
-
Filesize
12KB
MD58c350a8ab78f7aef75078687ceab5711
SHA1858a03c16af22c8dcb887ad2016d6f999f7e0d14
SHA256fa5bdf03302727e2417cfe4d824b753cf3243c5066694b82073f101198c3bd0f
SHA512deff1900e0e9f0158e6b48863aa689ce3b282de939fde8bacb676aaa41f4121e3dd5bd04483d592cc8a6ea28612f5f9762a908505cd5f16e433835df55a1bc8b
-
Filesize
140KB
MD523b2e69a10ee5011fdf256893ac11aed
SHA15945daac54ba4aa82e54ce0c6cd7215087686449
SHA256abe89318d4a6e30624ab55d1a298e4388e39b48b37b5b562eb8f4b9c9711f3cb
SHA5126abbb89b44a9e258fc8ceb2beb4408de7e97feb2113da8dc80df624195963e62a92ce12988974fc0d9cd60e82b28271356d5eb1f2e47ee1284c8180808dce9da
-
Filesize
140KB
MD523b2e69a10ee5011fdf256893ac11aed
SHA15945daac54ba4aa82e54ce0c6cd7215087686449
SHA256abe89318d4a6e30624ab55d1a298e4388e39b48b37b5b562eb8f4b9c9711f3cb
SHA5126abbb89b44a9e258fc8ceb2beb4408de7e97feb2113da8dc80df624195963e62a92ce12988974fc0d9cd60e82b28271356d5eb1f2e47ee1284c8180808dce9da