Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe
Resource
win10v2004-20230824-en
General
-
Target
332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe
-
Size
827KB
-
MD5
72da958183bd9b3679c5a0b9f4f8a73a
-
SHA1
3bf8a60694c8307e06ea1e8c847d4a6e587e0641
-
SHA256
332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93
-
SHA512
f99be6dbd54ee676a5f515804f5869bc5b565106bbb0e68fa84d2065197bb0f53295c5a791d206f0b0c620cdb7ba71c7876d7e56fca9eb4b0842edc1d23b88a3
-
SSDEEP
12288:QMr6y900NiEIxog5CDALPdtzO0On2VQvDBqVIhohG/tNcNJJneQ7hX142D9Ggsej:6yZmBCDAL/rOZxiOcpbR1JcgS5m
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0009000000023023-39.dat healer behavioral1/files/0x0009000000023023-40.dat healer behavioral1/memory/1656-41-0x0000000000E20000-0x0000000000E2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6322156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6322156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6322156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6322156.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6322156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6322156.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 912 v3638493.exe 568 v2595192.exe 2284 v8799536.exe 312 v0157484.exe 1656 a6322156.exe 5036 b9934605.exe 1028 c8372364.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6322156.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3638493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2595192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8799536.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0157484.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 a6322156.exe 1656 a6322156.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 a6322156.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2824 wrote to memory of 912 2824 332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe 85 PID 2824 wrote to memory of 912 2824 332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe 85 PID 2824 wrote to memory of 912 2824 332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe 85 PID 912 wrote to memory of 568 912 v3638493.exe 87 PID 912 wrote to memory of 568 912 v3638493.exe 87 PID 912 wrote to memory of 568 912 v3638493.exe 87 PID 568 wrote to memory of 2284 568 v2595192.exe 88 PID 568 wrote to memory of 2284 568 v2595192.exe 88 PID 568 wrote to memory of 2284 568 v2595192.exe 88 PID 2284 wrote to memory of 312 2284 v8799536.exe 89 PID 2284 wrote to memory of 312 2284 v8799536.exe 89 PID 2284 wrote to memory of 312 2284 v8799536.exe 89 PID 312 wrote to memory of 1656 312 v0157484.exe 90 PID 312 wrote to memory of 1656 312 v0157484.exe 90 PID 312 wrote to memory of 5036 312 v0157484.exe 91 PID 312 wrote to memory of 5036 312 v0157484.exe 91 PID 312 wrote to memory of 5036 312 v0157484.exe 91 PID 2284 wrote to memory of 1028 2284 v8799536.exe 92 PID 2284 wrote to memory of 1028 2284 v8799536.exe 92 PID 2284 wrote to memory of 1028 2284 v8799536.exe 92
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe"C:\Users\Admin\AppData\Local\Temp\332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exe6⤵
- Executes dropped EXE
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exe5⤵
- Executes dropped EXE
PID:1028
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD59783a38a6eae214753b7a553787e87e0
SHA14f6e8ead7398844ac6280738824218c908970595
SHA25605a2a3ff546a97fc20873b89c91b67ec4ea5a9a7d32f960a9a192e6918be4083
SHA512f5cb2b3abb9a0e2af53dc583684b1b9ce6843c76326387975a9ff2f88bff2db1e9bff9725829757c40f1c445c6c45ee8597aaba77dcabe69c94a43c8449df5b9
-
Filesize
723KB
MD59783a38a6eae214753b7a553787e87e0
SHA14f6e8ead7398844ac6280738824218c908970595
SHA25605a2a3ff546a97fc20873b89c91b67ec4ea5a9a7d32f960a9a192e6918be4083
SHA512f5cb2b3abb9a0e2af53dc583684b1b9ce6843c76326387975a9ff2f88bff2db1e9bff9725829757c40f1c445c6c45ee8597aaba77dcabe69c94a43c8449df5b9
-
Filesize
497KB
MD5f07fb372dee5d85a426774695d146196
SHA1e67b04829903babaf0e5052068cf725acfefc477
SHA256d9e5211db80efd95c732cdc4606dffcac57a7dd872dbbdbe25214183b2e4afff
SHA512ba6cca879cc1d545dff16af0250e3cf61e4ffbcc56f413c82f7b9330273cbddcb27d872ef387b823017735976bf9c5f4898ad794a195a68c0a0e57d4072370f1
-
Filesize
497KB
MD5f07fb372dee5d85a426774695d146196
SHA1e67b04829903babaf0e5052068cf725acfefc477
SHA256d9e5211db80efd95c732cdc4606dffcac57a7dd872dbbdbe25214183b2e4afff
SHA512ba6cca879cc1d545dff16af0250e3cf61e4ffbcc56f413c82f7b9330273cbddcb27d872ef387b823017735976bf9c5f4898ad794a195a68c0a0e57d4072370f1
-
Filesize
372KB
MD504f7baf5992b56154b6499f4228a318c
SHA18e383f91c86639d5c2530614846a15bf4e1b9531
SHA256bbc9b5a958def976e8c22a224412e2506bdfcbfb0dc8dd6585d37bbeb761e8f7
SHA51263b227bdf857d4253a41f873ef57a5a2cf6a6c260069cceb59f927086e5537d7db1045e835ea29d2832d4bb08f3ef8c7b77e041a939e926c7d0670d8b538736e
-
Filesize
372KB
MD504f7baf5992b56154b6499f4228a318c
SHA18e383f91c86639d5c2530614846a15bf4e1b9531
SHA256bbc9b5a958def976e8c22a224412e2506bdfcbfb0dc8dd6585d37bbeb761e8f7
SHA51263b227bdf857d4253a41f873ef57a5a2cf6a6c260069cceb59f927086e5537d7db1045e835ea29d2832d4bb08f3ef8c7b77e041a939e926c7d0670d8b538736e
-
Filesize
174KB
MD5b5a1bc8c1db9111f2e9f7667b625d35b
SHA10d1a663863cdd774effbc14995f789ec32e73fd5
SHA256f3b8b800d939f895c1f4d2e8df739a1d935e4dbcfc38746161285d010c02d1d6
SHA512999a66a7398c2c7531984f85d705b320a9f82df287a4ef4db6e0ffa349758e58ef55989334a1dba95b2e28d7d2eebff86be4d6f0d9cb82a92e089a84509391a2
-
Filesize
174KB
MD5b5a1bc8c1db9111f2e9f7667b625d35b
SHA10d1a663863cdd774effbc14995f789ec32e73fd5
SHA256f3b8b800d939f895c1f4d2e8df739a1d935e4dbcfc38746161285d010c02d1d6
SHA512999a66a7398c2c7531984f85d705b320a9f82df287a4ef4db6e0ffa349758e58ef55989334a1dba95b2e28d7d2eebff86be4d6f0d9cb82a92e089a84509391a2
-
Filesize
217KB
MD5d00fd2fcf182fe5c849ac3531b1cb982
SHA1b305b8e7cf534a11055fe9ebdba67a81c90d0805
SHA2566c0c663dc0211baab7362e7ce9b34816bcc8f9f539fbfdca0aa989defb55f30e
SHA5125ac6d1a2778a4539363e77bf6b19af13b8a9ecd9a34bb235fa45796550ebd5873daf50f3c2276ad1e68505c8b9d464a148e32decfb0afd26d7052adae48df547
-
Filesize
217KB
MD5d00fd2fcf182fe5c849ac3531b1cb982
SHA1b305b8e7cf534a11055fe9ebdba67a81c90d0805
SHA2566c0c663dc0211baab7362e7ce9b34816bcc8f9f539fbfdca0aa989defb55f30e
SHA5125ac6d1a2778a4539363e77bf6b19af13b8a9ecd9a34bb235fa45796550ebd5873daf50f3c2276ad1e68505c8b9d464a148e32decfb0afd26d7052adae48df547
-
Filesize
13KB
MD5f98487dee6cf7670315b6b28be6b2569
SHA178bd3f5158012d74ee522ce08b776da83a4e8b16
SHA2561358714c5b601268cbd85105a0769af0da33c5cd1e0e293b724841b6ff74e021
SHA512c21a58196b6e6f2927bb4fa71d279ec32216148a39e7c75d1d3bbcbca61702a462078d98a3f8da38e7765c752ab61636af9502d65647fa30507a48014935c4ae
-
Filesize
13KB
MD5f98487dee6cf7670315b6b28be6b2569
SHA178bd3f5158012d74ee522ce08b776da83a4e8b16
SHA2561358714c5b601268cbd85105a0769af0da33c5cd1e0e293b724841b6ff74e021
SHA512c21a58196b6e6f2927bb4fa71d279ec32216148a39e7c75d1d3bbcbca61702a462078d98a3f8da38e7765c752ab61636af9502d65647fa30507a48014935c4ae
-
Filesize
140KB
MD5274ee844f3f0d06509ba702fb8b10aef
SHA103afb16b6513f498beae7e3bf5536d59d35441ba
SHA256752291f14408e3aca55a076786955dafa977178355687c58b3fe0bc2d9e618e0
SHA51249774e352f8b523686bb8691cf23471d7ba2de8e6a92ffa2561d60ca9ad054811b2b83a61f7481e1bb5e322a7bc2853d684919d2e15728cbca5fac2402a17e49
-
Filesize
140KB
MD5274ee844f3f0d06509ba702fb8b10aef
SHA103afb16b6513f498beae7e3bf5536d59d35441ba
SHA256752291f14408e3aca55a076786955dafa977178355687c58b3fe0bc2d9e618e0
SHA51249774e352f8b523686bb8691cf23471d7ba2de8e6a92ffa2561d60ca9ad054811b2b83a61f7481e1bb5e322a7bc2853d684919d2e15728cbca5fac2402a17e49