Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe
Resource
win10v2004-20230703-en
General
-
Target
19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe
-
Size
827KB
-
MD5
3700c868e24e15b4d2fb4fe4afcdd66a
-
SHA1
481b50a21e2b4319a4b159866d1ab536e75fac07
-
SHA256
19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755
-
SHA512
7a27788513ef44e2533460a11444bbe31ea66ce2f9930424e5e60d9d699c752acb717a9c04f8097237a7eb7c3b7e3a42e9be311c20f3b30431d5e977b42df6ef
-
SSDEEP
24576:8y3txcVb7D5zxVnWwubuiCWsomazd9Awa:r7cVnD3Yx4JaL
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023200-33.dat healer behavioral1/files/0x0008000000023200-34.dat healer behavioral1/memory/3788-35-0x0000000000690000-0x000000000069A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4543260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4543260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4543260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4543260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4543260.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4543260.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3228 v3718794.exe 1216 v8007264.exe 4848 v5036474.exe 2388 v8475337.exe 3788 a4543260.exe 4840 b8123870.exe 2256 c4946403.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4543260.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8475337.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3718794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8007264.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5036474.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3788 a4543260.exe 3788 a4543260.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3788 a4543260.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3228 4120 19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe 81 PID 4120 wrote to memory of 3228 4120 19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe 81 PID 4120 wrote to memory of 3228 4120 19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe 81 PID 3228 wrote to memory of 1216 3228 v3718794.exe 82 PID 3228 wrote to memory of 1216 3228 v3718794.exe 82 PID 3228 wrote to memory of 1216 3228 v3718794.exe 82 PID 1216 wrote to memory of 4848 1216 v8007264.exe 83 PID 1216 wrote to memory of 4848 1216 v8007264.exe 83 PID 1216 wrote to memory of 4848 1216 v8007264.exe 83 PID 4848 wrote to memory of 2388 4848 v5036474.exe 84 PID 4848 wrote to memory of 2388 4848 v5036474.exe 84 PID 4848 wrote to memory of 2388 4848 v5036474.exe 84 PID 2388 wrote to memory of 3788 2388 v8475337.exe 85 PID 2388 wrote to memory of 3788 2388 v8475337.exe 85 PID 2388 wrote to memory of 4840 2388 v8475337.exe 94 PID 2388 wrote to memory of 4840 2388 v8475337.exe 94 PID 2388 wrote to memory of 4840 2388 v8475337.exe 94 PID 4848 wrote to memory of 2256 4848 v5036474.exe 95 PID 4848 wrote to memory of 2256 4848 v5036474.exe 95 PID 4848 wrote to memory of 2256 4848 v5036474.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe"C:\Users\Admin\AppData\Local\Temp\19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exe6⤵
- Executes dropped EXE
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exe5⤵
- Executes dropped EXE
PID:2256
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD50978729b425be98377cf88a30fe108ae
SHA11acfa1720e1c6f3bd4aa34c438bfae07c2b54e17
SHA256a8c27fcbc218abf26a2c49aadde6e72feecd410cf3dbe78db4857a3682f285d8
SHA512d28df4508d0211b0d43e6c656e615923caca8f1e256b967d13c47559c327615ac77f0f65fedacf34e6a4650ea6887fa5e7377d0d86879dd95730ba5996179fbb
-
Filesize
723KB
MD50978729b425be98377cf88a30fe108ae
SHA11acfa1720e1c6f3bd4aa34c438bfae07c2b54e17
SHA256a8c27fcbc218abf26a2c49aadde6e72feecd410cf3dbe78db4857a3682f285d8
SHA512d28df4508d0211b0d43e6c656e615923caca8f1e256b967d13c47559c327615ac77f0f65fedacf34e6a4650ea6887fa5e7377d0d86879dd95730ba5996179fbb
-
Filesize
497KB
MD563f0b43f212fbf90142774434847af74
SHA110363f351d2bd755babefec499bb6b51d097b890
SHA256ddac4d0e04984cdbe4bea80fc8074e95e78ad3a45fb54c3d13e11d66bab03718
SHA5120e948f666fc641fbd591c2d25ecc5e0539f3f88bafbb5aa9623123db82a99df49f7654f3ce6fe5c39716c3bdcb7f2afe4b436c2df63d6961b7d8943b804874ff
-
Filesize
497KB
MD563f0b43f212fbf90142774434847af74
SHA110363f351d2bd755babefec499bb6b51d097b890
SHA256ddac4d0e04984cdbe4bea80fc8074e95e78ad3a45fb54c3d13e11d66bab03718
SHA5120e948f666fc641fbd591c2d25ecc5e0539f3f88bafbb5aa9623123db82a99df49f7654f3ce6fe5c39716c3bdcb7f2afe4b436c2df63d6961b7d8943b804874ff
-
Filesize
372KB
MD5e86fcbf16d8671fd67814122edd77837
SHA11d98dfdd6a3fc1486da007402de53ab809cb5f7e
SHA256ff4eeeffcc74a903874c7df76227effd0c0bdd7fd1a85d340749b086b583802b
SHA5124f5ef8248bac54ae4f6f809fc94e9a1fa617a4dbde06ed3144ccee68b53e9bdc9fbf33e63a2ca5ec59b9b0f2ef2df9d7a99e61062f5612ff41561eda4a93c46a
-
Filesize
372KB
MD5e86fcbf16d8671fd67814122edd77837
SHA11d98dfdd6a3fc1486da007402de53ab809cb5f7e
SHA256ff4eeeffcc74a903874c7df76227effd0c0bdd7fd1a85d340749b086b583802b
SHA5124f5ef8248bac54ae4f6f809fc94e9a1fa617a4dbde06ed3144ccee68b53e9bdc9fbf33e63a2ca5ec59b9b0f2ef2df9d7a99e61062f5612ff41561eda4a93c46a
-
Filesize
174KB
MD58cd788d57111c2a583c54bcaed30f56c
SHA11e68a2981dba7e60c7347f516c4a2c36be6a97ca
SHA25652fe8e18c31e9b2aa99e39e302f43af330ffbcef3de46cce645154cc72938703
SHA512c64ed6ae0346f0fb95dcc4db76306d37247e0281b1d9f3ea994501b87f0a43143a5ef0cfb7a6c946c34be8e2d39f5790c82719a595b9bd7a4ac6404f5986bf6d
-
Filesize
174KB
MD58cd788d57111c2a583c54bcaed30f56c
SHA11e68a2981dba7e60c7347f516c4a2c36be6a97ca
SHA25652fe8e18c31e9b2aa99e39e302f43af330ffbcef3de46cce645154cc72938703
SHA512c64ed6ae0346f0fb95dcc4db76306d37247e0281b1d9f3ea994501b87f0a43143a5ef0cfb7a6c946c34be8e2d39f5790c82719a595b9bd7a4ac6404f5986bf6d
-
Filesize
217KB
MD51cc6762b29686a885152f8717c0e9d72
SHA1735f88f21dfbb98e12202f81eff23e9ba706cd6d
SHA256fcf9bbd470580a489b2ab1fa301dde7fab5a9c0c0f99ad67e36d1454a6332b9f
SHA512c2ea32056ac2e45875afa7dcfc86c25e2a9510c59b7ca9ab050043c55f0692acc10855b7107309b62b8591276d19bed84e5a090b9a4c76d7c7fc7002b2fa8170
-
Filesize
217KB
MD51cc6762b29686a885152f8717c0e9d72
SHA1735f88f21dfbb98e12202f81eff23e9ba706cd6d
SHA256fcf9bbd470580a489b2ab1fa301dde7fab5a9c0c0f99ad67e36d1454a6332b9f
SHA512c2ea32056ac2e45875afa7dcfc86c25e2a9510c59b7ca9ab050043c55f0692acc10855b7107309b62b8591276d19bed84e5a090b9a4c76d7c7fc7002b2fa8170
-
Filesize
13KB
MD5e02a910c5a245d112bfb2294cb9b7d1e
SHA189876ad6aba4148b1d78c05b86402e8df5ae20a4
SHA25672b97fd95e8454ac5c870b2b5ce8625cb216cdb0813001e03f645c65fe3795af
SHA5129e7bce930acb70d81b9a8979295b93fbe49006ed808dae933614407729bc36e443dda8c221e751b599dee24fbb0a656a53ca60022ccf89412d54288ff773b4b4
-
Filesize
13KB
MD5e02a910c5a245d112bfb2294cb9b7d1e
SHA189876ad6aba4148b1d78c05b86402e8df5ae20a4
SHA25672b97fd95e8454ac5c870b2b5ce8625cb216cdb0813001e03f645c65fe3795af
SHA5129e7bce930acb70d81b9a8979295b93fbe49006ed808dae933614407729bc36e443dda8c221e751b599dee24fbb0a656a53ca60022ccf89412d54288ff773b4b4
-
Filesize
140KB
MD57f8b89757b716d68c6d9fb8df1d2e1d7
SHA1d9d96b77d83f98a6f7bd7b5e8478fa439d1314e8
SHA25636375064763445be94f6649fa621006966a24ca9e98a987afcad582c1f47c488
SHA512275f99e95005ba004e015d91b128f5a6593e8a82d3306bd71b6091e42393f26ca25317d6c42c04265321f6c580e67b2645be138164d745573502b7d57b38986a
-
Filesize
140KB
MD57f8b89757b716d68c6d9fb8df1d2e1d7
SHA1d9d96b77d83f98a6f7bd7b5e8478fa439d1314e8
SHA25636375064763445be94f6649fa621006966a24ca9e98a987afcad582c1f47c488
SHA512275f99e95005ba004e015d91b128f5a6593e8a82d3306bd71b6091e42393f26ca25317d6c42c04265321f6c580e67b2645be138164d745573502b7d57b38986a