Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe
Resource
win10-20230703-en
General
-
Target
c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe
-
Size
930KB
-
MD5
f89b08478ee62add2b68364838edd1d8
-
SHA1
afbc5c8201ce4ec95a5332b61e6058b36c7a3eac
-
SHA256
c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088
-
SHA512
8adbbdc2f1dfc31dc79e7c9a674cc10995e158e847656c687d218ec2a014a56bc9318b1dfefd85b62f49e6a1741a2b3dbf3e130fedfe8026d0c6f499b86ab956
-
SSDEEP
12288:OMrTy90w20/hfehqmvwNILdJObElTCmQR6k+Y57wvY8ApozWUGrc10vgqYgSFRrd:Ry3gEmEIm4TCmQRJjNafTgSFR07hsh
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afc1-33.dat healer behavioral1/files/0x000700000001afc1-34.dat healer behavioral1/memory/4460-35-0x0000000000570000-0x000000000057A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8679008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8679008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8679008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8679008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8679008.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4864 z5400785.exe 4892 z4314817.exe 168 z2587599.exe 4996 z9122793.exe 4460 q8679008.exe 2472 r6382774.exe 4044 s3303651.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8679008.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5400785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4314817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2587599.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9122793.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 q8679008.exe 4460 q8679008.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 q8679008.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4864 2160 c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe 69 PID 2160 wrote to memory of 4864 2160 c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe 69 PID 2160 wrote to memory of 4864 2160 c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe 69 PID 4864 wrote to memory of 4892 4864 z5400785.exe 70 PID 4864 wrote to memory of 4892 4864 z5400785.exe 70 PID 4864 wrote to memory of 4892 4864 z5400785.exe 70 PID 4892 wrote to memory of 168 4892 z4314817.exe 71 PID 4892 wrote to memory of 168 4892 z4314817.exe 71 PID 4892 wrote to memory of 168 4892 z4314817.exe 71 PID 168 wrote to memory of 4996 168 z2587599.exe 72 PID 168 wrote to memory of 4996 168 z2587599.exe 72 PID 168 wrote to memory of 4996 168 z2587599.exe 72 PID 4996 wrote to memory of 4460 4996 z9122793.exe 73 PID 4996 wrote to memory of 4460 4996 z9122793.exe 73 PID 4996 wrote to memory of 2472 4996 z9122793.exe 74 PID 4996 wrote to memory of 2472 4996 z9122793.exe 74 PID 4996 wrote to memory of 2472 4996 z9122793.exe 74 PID 168 wrote to memory of 4044 168 z2587599.exe 75 PID 168 wrote to memory of 4044 168 z2587599.exe 75 PID 168 wrote to memory of 4044 168 z2587599.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe"C:\Users\Admin\AppData\Local\Temp\c7bd256365e128658030f335b2109530424ba7faa9af637c3832de23560b6088.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5400785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5400785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4314817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4314817.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2587599.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2587599.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9122793.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9122793.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8679008.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8679008.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6382774.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6382774.exe6⤵
- Executes dropped EXE
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3303651.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3303651.exe5⤵
- Executes dropped EXE
PID:4044
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD58fc41df4102f3f40733cda52f1dc2d80
SHA1b7d5b61087d9d01a274bf3c312147395b4719b97
SHA25603dc4bf306c39270fb203099ba3e3b6e6bbd839bae80012696d3b04a31633ea0
SHA512432caebe9c0e414c20c0bdc8f8e4c74b2a1c10af6471beedeed6987ff212eca024d0703b8d23168bc19176baae73cb2b8d53dc118eb4ef23b99b6874aaf197cd
-
Filesize
824KB
MD58fc41df4102f3f40733cda52f1dc2d80
SHA1b7d5b61087d9d01a274bf3c312147395b4719b97
SHA25603dc4bf306c39270fb203099ba3e3b6e6bbd839bae80012696d3b04a31633ea0
SHA512432caebe9c0e414c20c0bdc8f8e4c74b2a1c10af6471beedeed6987ff212eca024d0703b8d23168bc19176baae73cb2b8d53dc118eb4ef23b99b6874aaf197cd
-
Filesize
598KB
MD5250c02b53d5200b47997b97ff4c71cb0
SHA192dea158d0aa5cdc3464180b13764b72ba9b0e54
SHA25664529595a39369e58ec9b6fa4d68386da1f38eee7475f63f476631f4248f63c2
SHA512659e2ff9c0899fd238ee6f1e7ab41db59f81ce5581440f468aa1bdb65080f05d30a44a6bba8c6ba607a1f011ab91a1a4b4de14f6619bbefdf37a4572a0bd8f20
-
Filesize
598KB
MD5250c02b53d5200b47997b97ff4c71cb0
SHA192dea158d0aa5cdc3464180b13764b72ba9b0e54
SHA25664529595a39369e58ec9b6fa4d68386da1f38eee7475f63f476631f4248f63c2
SHA512659e2ff9c0899fd238ee6f1e7ab41db59f81ce5581440f468aa1bdb65080f05d30a44a6bba8c6ba607a1f011ab91a1a4b4de14f6619bbefdf37a4572a0bd8f20
-
Filesize
372KB
MD55d3dcf7bbed518871148923cd8294168
SHA14af5e495bdc0abd2619632c70460fb1fc91a1c8a
SHA256785c13f581b565160cb03fd05c5a8f07bee0f8771b659bf5b321661ed730b385
SHA512c0d590eac3184ce7e3646a9a43911820ca67cbdcdacbd009b51d9ac6c138addaef0220b26ef0da071031d76bdc29e16615529dcdfbbe0c5a53272b8173099b7a
-
Filesize
372KB
MD55d3dcf7bbed518871148923cd8294168
SHA14af5e495bdc0abd2619632c70460fb1fc91a1c8a
SHA256785c13f581b565160cb03fd05c5a8f07bee0f8771b659bf5b321661ed730b385
SHA512c0d590eac3184ce7e3646a9a43911820ca67cbdcdacbd009b51d9ac6c138addaef0220b26ef0da071031d76bdc29e16615529dcdfbbe0c5a53272b8173099b7a
-
Filesize
174KB
MD542759d3a15a7d67c01aa0370d51b74d7
SHA1227f3cc69883745f5a56798cd5b6f659f64a1dc3
SHA2562a3e7030cafd441cc19bd8a351a0d6f63ba570aca7d53f0ea203a90ae763d5c0
SHA512ea33775fdc927be1e8a5acf4f23c9eb3dbb4a49ef74d582a300de800a6fee8cb15f420bac492e10c99f1b5c23251b42819ee39885efecaf89f265690397c4f67
-
Filesize
174KB
MD542759d3a15a7d67c01aa0370d51b74d7
SHA1227f3cc69883745f5a56798cd5b6f659f64a1dc3
SHA2562a3e7030cafd441cc19bd8a351a0d6f63ba570aca7d53f0ea203a90ae763d5c0
SHA512ea33775fdc927be1e8a5acf4f23c9eb3dbb4a49ef74d582a300de800a6fee8cb15f420bac492e10c99f1b5c23251b42819ee39885efecaf89f265690397c4f67
-
Filesize
216KB
MD5b0db94902d9b63ecef0ac33ac529329c
SHA180fbe41edb73ea3a5c684759e400bbceb0930557
SHA2562ea9fe98f7c46fe61907ebda02a6cbea46dfdd5ca2588fdde11155edfc2775b8
SHA5123b597a0ae509164eeda6eba1cff9b90e24f6c34ed4b3db5c99c859638c4ca718836ac870efd627caa93c0b60a4d7e6b776855a65d8c22755a091a9f184e900dc
-
Filesize
216KB
MD5b0db94902d9b63ecef0ac33ac529329c
SHA180fbe41edb73ea3a5c684759e400bbceb0930557
SHA2562ea9fe98f7c46fe61907ebda02a6cbea46dfdd5ca2588fdde11155edfc2775b8
SHA5123b597a0ae509164eeda6eba1cff9b90e24f6c34ed4b3db5c99c859638c4ca718836ac870efd627caa93c0b60a4d7e6b776855a65d8c22755a091a9f184e900dc
-
Filesize
14KB
MD5de6cc7eb84a81a0348cc037ff8d115b1
SHA1dec4f4e390386127518a51e4eb2fa060025640fe
SHA2561de0225476d83b858c19bfbf890f2b5c53279634b70cde6c18860fc52fb7f8ab
SHA5128e4600c5d036c404c249da24e833d0188d33417c7399702e16a22befeae394111ad05414f69164f57192f25cc47d5729e53a807448e8b238f2b2b194b5d861fb
-
Filesize
14KB
MD5de6cc7eb84a81a0348cc037ff8d115b1
SHA1dec4f4e390386127518a51e4eb2fa060025640fe
SHA2561de0225476d83b858c19bfbf890f2b5c53279634b70cde6c18860fc52fb7f8ab
SHA5128e4600c5d036c404c249da24e833d0188d33417c7399702e16a22befeae394111ad05414f69164f57192f25cc47d5729e53a807448e8b238f2b2b194b5d861fb
-
Filesize
140KB
MD50c9f07c05fa52a5533a901ce47f86cb2
SHA11f430747037c8ee90579491f9186ed5ca5e4c89a
SHA2569783bcb3e07ecae04911149795a1dc75265dc77238095e119067d02cccb652d7
SHA51210a9e36d31c0b091e527a50f1393622f169691ddcfd6b37015dce1d608c10b504f4f70322ad11d2cf3083a9bd798d9f14a759684fff4bb934f0634cb1fbfaff2
-
Filesize
140KB
MD50c9f07c05fa52a5533a901ce47f86cb2
SHA11f430747037c8ee90579491f9186ed5ca5e4c89a
SHA2569783bcb3e07ecae04911149795a1dc75265dc77238095e119067d02cccb652d7
SHA51210a9e36d31c0b091e527a50f1393622f169691ddcfd6b37015dce1d608c10b504f4f70322ad11d2cf3083a9bd798d9f14a759684fff4bb934f0634cb1fbfaff2