Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
817KB
-
MD5
60395b7aeabc1c51da5e995a18095f27
-
SHA1
d7e1f3681becffdd4a8262d112459fc0c8e82d33
-
SHA256
7f17bcf36912f93161771f2ef5ccb5450890f2732e972ac7a3086fdc13538742
-
SHA512
0f062d69040f0d229305e397e8ef95bbf77316f9a53aeafaf72268c155e91ab5aa20b1d862cc6c58a3342de7748f03abd86bc707b7b5c07aaa8885825d95c65a
-
SSDEEP
24576:gyn0dvL90SHl5ZqzG23fJTmmJTtfST3tY:navvHhWhmd
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023215-33.dat healer behavioral2/files/0x0008000000023215-34.dat healer behavioral2/memory/224-35-0x0000000000820000-0x000000000082A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7084077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7084077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7084077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7084077.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7084077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7084077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4404 v2908346.exe 3772 v9079479.exe 3244 v1954258.exe 1708 v5899896.exe 224 a7084077.exe 1160 b3443784.exe 312 c3511737.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7084077.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1954258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5899896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2908346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9079479.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 a7084077.exe 224 a7084077.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 a7084077.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4404 1712 file.exe 80 PID 1712 wrote to memory of 4404 1712 file.exe 80 PID 1712 wrote to memory of 4404 1712 file.exe 80 PID 4404 wrote to memory of 3772 4404 v2908346.exe 81 PID 4404 wrote to memory of 3772 4404 v2908346.exe 81 PID 4404 wrote to memory of 3772 4404 v2908346.exe 81 PID 3772 wrote to memory of 3244 3772 v9079479.exe 82 PID 3772 wrote to memory of 3244 3772 v9079479.exe 82 PID 3772 wrote to memory of 3244 3772 v9079479.exe 82 PID 3244 wrote to memory of 1708 3244 v1954258.exe 83 PID 3244 wrote to memory of 1708 3244 v1954258.exe 83 PID 3244 wrote to memory of 1708 3244 v1954258.exe 83 PID 1708 wrote to memory of 224 1708 v5899896.exe 84 PID 1708 wrote to memory of 224 1708 v5899896.exe 84 PID 1708 wrote to memory of 1160 1708 v5899896.exe 90 PID 1708 wrote to memory of 1160 1708 v5899896.exe 90 PID 1708 wrote to memory of 1160 1708 v5899896.exe 90 PID 3244 wrote to memory of 312 3244 v1954258.exe 91 PID 3244 wrote to memory of 312 3244 v1954258.exe 91 PID 3244 wrote to memory of 312 3244 v1954258.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2908346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2908346.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9079479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9079479.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1954258.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1954258.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5899896.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5899896.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7084077.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7084077.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3443784.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3443784.exe6⤵
- Executes dropped EXE
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3511737.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3511737.exe5⤵
- Executes dropped EXE
PID:312
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5a9cab043d81eed1ad9636a521e0f1acd
SHA1cb69f269a5ac003201b6dbd91a3fcbd2192e72f0
SHA25670ac8a98b8a0c4e82f66f9ff65330e238aac0109c6cd245f06ad0b3a0e0b9a34
SHA51220af9e138e2693aac3b60152291d0c5c67b6fa070ee91f5059ae0bb4660abde77c09a672b10754f6b1bf5c17ef9fda7b8d9eb5448f7974aeaea2a0e5d04bce19
-
Filesize
723KB
MD5a9cab043d81eed1ad9636a521e0f1acd
SHA1cb69f269a5ac003201b6dbd91a3fcbd2192e72f0
SHA25670ac8a98b8a0c4e82f66f9ff65330e238aac0109c6cd245f06ad0b3a0e0b9a34
SHA51220af9e138e2693aac3b60152291d0c5c67b6fa070ee91f5059ae0bb4660abde77c09a672b10754f6b1bf5c17ef9fda7b8d9eb5448f7974aeaea2a0e5d04bce19
-
Filesize
496KB
MD5dad2e1b6bd7aadc8291bbb84217021d0
SHA17efc0cc9b5c30c22d263632dedc479d2d9b5aea0
SHA2567c63fe704de3ef87b7ad4b467a0355392d9857c65f5b4e8d3e9cae0c1c12613a
SHA512f661c94205b51603d441e1505db788262c272c473391e7f75797a53883a20d04d5208e4b7bf7787a4e38f2032506ec41e981f8f49fbff9fa87098c1e679bd354
-
Filesize
496KB
MD5dad2e1b6bd7aadc8291bbb84217021d0
SHA17efc0cc9b5c30c22d263632dedc479d2d9b5aea0
SHA2567c63fe704de3ef87b7ad4b467a0355392d9857c65f5b4e8d3e9cae0c1c12613a
SHA512f661c94205b51603d441e1505db788262c272c473391e7f75797a53883a20d04d5208e4b7bf7787a4e38f2032506ec41e981f8f49fbff9fa87098c1e679bd354
-
Filesize
372KB
MD50ce59f653450e0407ef3c8990539ba1d
SHA1d7d4407b5507042daa082c2e607009fe5f029320
SHA256de403150d65fd12234a4e08ff34828ea0a74679459e33bf8be0f0e01cca0035b
SHA5123140c9ead6196bc834f069f43375fa1962718629a161d544d7d1dc22bfca7f55e8d0e1af5cc8657dafc1805c61b088bafd2c7df2a192c2cd17bd3d126d727c90
-
Filesize
372KB
MD50ce59f653450e0407ef3c8990539ba1d
SHA1d7d4407b5507042daa082c2e607009fe5f029320
SHA256de403150d65fd12234a4e08ff34828ea0a74679459e33bf8be0f0e01cca0035b
SHA5123140c9ead6196bc834f069f43375fa1962718629a161d544d7d1dc22bfca7f55e8d0e1af5cc8657dafc1805c61b088bafd2c7df2a192c2cd17bd3d126d727c90
-
Filesize
174KB
MD5ba6fe4b9eff89123e880a95148fb240f
SHA16c3a0897b279c87093d92c3f1731317de787ae20
SHA256c02fc64447a318819276baf6138d4d363b8565039bf1fd3dd994e4e4241d00ee
SHA512770c1439e8349ec93f40ea4786b3d509c5f035ae174f48220fa0db502543ab600593bdd85f10fe14fde22b43b9a3692255cd1e7dc7c26affcd40a8f1ac1619ae
-
Filesize
174KB
MD5ba6fe4b9eff89123e880a95148fb240f
SHA16c3a0897b279c87093d92c3f1731317de787ae20
SHA256c02fc64447a318819276baf6138d4d363b8565039bf1fd3dd994e4e4241d00ee
SHA512770c1439e8349ec93f40ea4786b3d509c5f035ae174f48220fa0db502543ab600593bdd85f10fe14fde22b43b9a3692255cd1e7dc7c26affcd40a8f1ac1619ae
-
Filesize
217KB
MD5b4f7b4a050fca6ce5eb9c7ca731444c9
SHA164e0efba5392b23a382b9fc6e763e0515ac8baae
SHA256e0481730bbb23f5a89bc22c21c46622a5c11a4f019480bd412034d3c04704041
SHA512ca46de75828323068c0117fd4a9dce773edd50096065a8319bd4043bd061a12f01d696157155105cbffe9281111b0ad2f5d10ec3dc6a4e055ba201a2fed8d261
-
Filesize
217KB
MD5b4f7b4a050fca6ce5eb9c7ca731444c9
SHA164e0efba5392b23a382b9fc6e763e0515ac8baae
SHA256e0481730bbb23f5a89bc22c21c46622a5c11a4f019480bd412034d3c04704041
SHA512ca46de75828323068c0117fd4a9dce773edd50096065a8319bd4043bd061a12f01d696157155105cbffe9281111b0ad2f5d10ec3dc6a4e055ba201a2fed8d261
-
Filesize
13KB
MD516aeba740104d15e9aa3d483f6a58a80
SHA1a96fd07b168f7ff4a54a6059211a4985ec15b229
SHA2562c44bb787cc2babad339e611d650bdd4b92f6809d26ba9b704b6e6459e3bb078
SHA5122c00466336d8ab6e406e0f72d60c2180637fa657ea3b511657edf0cac531fb9a8300b7cb5705ddbfe61194c76cbcfab7dfba8af3c8fe087e13fdbdb14f538261
-
Filesize
13KB
MD516aeba740104d15e9aa3d483f6a58a80
SHA1a96fd07b168f7ff4a54a6059211a4985ec15b229
SHA2562c44bb787cc2babad339e611d650bdd4b92f6809d26ba9b704b6e6459e3bb078
SHA5122c00466336d8ab6e406e0f72d60c2180637fa657ea3b511657edf0cac531fb9a8300b7cb5705ddbfe61194c76cbcfab7dfba8af3c8fe087e13fdbdb14f538261
-
Filesize
140KB
MD5b4254e3c35035ddc26f2fb7c99c61146
SHA1f36eb6e0229d0f94555770ee570be927bae4e5fe
SHA256a26a843e984de710a3347cc31994393b335b3777f9f56b5754fb4f909b7ba843
SHA512aae0eee0a36fbab65a8e26e0ce252d72ab75120bfa41be92995dfb36ef88daca4a78da950df7b2eab665471948f0246ed5aae4225bceb7653a044eb44018d071
-
Filesize
140KB
MD5b4254e3c35035ddc26f2fb7c99c61146
SHA1f36eb6e0229d0f94555770ee570be927bae4e5fe
SHA256a26a843e984de710a3347cc31994393b335b3777f9f56b5754fb4f909b7ba843
SHA512aae0eee0a36fbab65a8e26e0ce252d72ab75120bfa41be92995dfb36ef88daca4a78da950df7b2eab665471948f0246ed5aae4225bceb7653a044eb44018d071