Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 17:37
Static task
static1
Behavioral task
behavioral1
Sample
28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe
Resource
win10v2004-20230703-en
General
-
Target
28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe
-
Size
829KB
-
MD5
9fd32896fbef495ceed7f2b74ad5cf4e
-
SHA1
5ed5abb2b111be45b40dc8d22ff968ab437c9992
-
SHA256
28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7
-
SHA512
b864c665ae56a232a860bcfe7c8301938ed2b82b5543a66d031af0b1b9292923ecc14ce4adca20ebcc4ee736442b0406a1746054f5e2646bd68484caff98c1cb
-
SSDEEP
12288:IMrEy908dVlNB7rO0fNrkt+xToKIklyDrJ8LV7eqBIFvUxtNdj5:syjd1lOlfKlYyeobvND
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002323c-34.dat healer behavioral1/files/0x000700000002323c-33.dat healer behavioral1/memory/1656-35-0x0000000000A90000-0x0000000000A9A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6947859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6947859.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6947859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6947859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6947859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6947859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1268 v8786178.exe 3804 v6783511.exe 1500 v7294739.exe 4236 v8349415.exe 1656 a6947859.exe 1400 b7041466.exe 3388 c1967166.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6947859.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7294739.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8349415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8786178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6783511.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 a6947859.exe 1656 a6947859.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 a6947859.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1268 4104 28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe 82 PID 4104 wrote to memory of 1268 4104 28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe 82 PID 4104 wrote to memory of 1268 4104 28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe 82 PID 1268 wrote to memory of 3804 1268 v8786178.exe 83 PID 1268 wrote to memory of 3804 1268 v8786178.exe 83 PID 1268 wrote to memory of 3804 1268 v8786178.exe 83 PID 3804 wrote to memory of 1500 3804 v6783511.exe 84 PID 3804 wrote to memory of 1500 3804 v6783511.exe 84 PID 3804 wrote to memory of 1500 3804 v6783511.exe 84 PID 1500 wrote to memory of 4236 1500 v7294739.exe 85 PID 1500 wrote to memory of 4236 1500 v7294739.exe 85 PID 1500 wrote to memory of 4236 1500 v7294739.exe 85 PID 4236 wrote to memory of 1656 4236 v8349415.exe 86 PID 4236 wrote to memory of 1656 4236 v8349415.exe 86 PID 4236 wrote to memory of 1400 4236 v8349415.exe 89 PID 4236 wrote to memory of 1400 4236 v8349415.exe 89 PID 4236 wrote to memory of 1400 4236 v8349415.exe 89 PID 1500 wrote to memory of 3388 1500 v7294739.exe 90 PID 1500 wrote to memory of 3388 1500 v7294739.exe 90 PID 1500 wrote to memory of 3388 1500 v7294739.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe"C:\Users\Admin\AppData\Local\Temp\28fc66f58c00ac4d8c27f4ec094ac78365e85b3f20e28ab3fd5106a490ac61f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8786178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8786178.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6783511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6783511.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7294739.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7294739.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8349415.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8349415.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6947859.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6947859.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7041466.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7041466.exe6⤵
- Executes dropped EXE
PID:1400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1967166.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1967166.exe5⤵
- Executes dropped EXE
PID:3388
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD55ec48ac68c236e49e4670097d747543e
SHA101906ae69ecdee1d10c4e07f7c273861f285fdb6
SHA256c34b2bb8336a809ed8f71f9922fee0421ba6af67544c32e5f8d51cbe0533c044
SHA512aa35f9dc04ef3a9ed597a1526dffbfd05131a03825b882ee376b8fa051ee27c65785cdcbc504823b72a85b8f2d4ef9ea7e27d901bba91a530288c81d4fb3fe6b
-
Filesize
723KB
MD55ec48ac68c236e49e4670097d747543e
SHA101906ae69ecdee1d10c4e07f7c273861f285fdb6
SHA256c34b2bb8336a809ed8f71f9922fee0421ba6af67544c32e5f8d51cbe0533c044
SHA512aa35f9dc04ef3a9ed597a1526dffbfd05131a03825b882ee376b8fa051ee27c65785cdcbc504823b72a85b8f2d4ef9ea7e27d901bba91a530288c81d4fb3fe6b
-
Filesize
496KB
MD5d3701cb4c69cde652b29186154adb387
SHA1355e9d56616341a48dd156be30c942e02611ed68
SHA256b5909246033240b06e328623e6344094212fd04577d6ea7bcf2ca115d7f91f18
SHA5123ee4858299fafc32e1efbe3db40edaa711aa7bca5bc1793ea41a29b254c303f820956133da8e1b545303158a1f58385ed6c7983ec3dfec45b3d214902501de0d
-
Filesize
496KB
MD5d3701cb4c69cde652b29186154adb387
SHA1355e9d56616341a48dd156be30c942e02611ed68
SHA256b5909246033240b06e328623e6344094212fd04577d6ea7bcf2ca115d7f91f18
SHA5123ee4858299fafc32e1efbe3db40edaa711aa7bca5bc1793ea41a29b254c303f820956133da8e1b545303158a1f58385ed6c7983ec3dfec45b3d214902501de0d
-
Filesize
372KB
MD5e2b40de18dd379ffd32d6cf96b4ff702
SHA1c5546dbfbf2619f5c641b71f9ff48ad7e220e822
SHA256bf4f8213ea9fdddc379638f4587f4b634d5c76883f06cab21e5f0c17daf814c3
SHA512ce1a6cfdfedbbeb01c95884d90169c05993951180e4dbbfd123608c9e048dbcf9be1496c30ce82f99ae4b9ae11f5866c6a6975f5170450cc0a0dd1ba46a3d732
-
Filesize
372KB
MD5e2b40de18dd379ffd32d6cf96b4ff702
SHA1c5546dbfbf2619f5c641b71f9ff48ad7e220e822
SHA256bf4f8213ea9fdddc379638f4587f4b634d5c76883f06cab21e5f0c17daf814c3
SHA512ce1a6cfdfedbbeb01c95884d90169c05993951180e4dbbfd123608c9e048dbcf9be1496c30ce82f99ae4b9ae11f5866c6a6975f5170450cc0a0dd1ba46a3d732
-
Filesize
174KB
MD5b15dd2a8d13c1e49c5d531831b4cd620
SHA1d24450a9c66352a4079e79f1629ef7d35df7bf2d
SHA256d4569cafa57e89c8d359fa266526a82c33080321d55e909b60b2c83c6045225f
SHA51234146196cbaf1393af5feb78afc59bf81b4da36afe9ac923b5cbb0fa050dab2a6f64598030eeba28ef590426a5ae234821257be767ced504db1c2dd0e87a6788
-
Filesize
174KB
MD5b15dd2a8d13c1e49c5d531831b4cd620
SHA1d24450a9c66352a4079e79f1629ef7d35df7bf2d
SHA256d4569cafa57e89c8d359fa266526a82c33080321d55e909b60b2c83c6045225f
SHA51234146196cbaf1393af5feb78afc59bf81b4da36afe9ac923b5cbb0fa050dab2a6f64598030eeba28ef590426a5ae234821257be767ced504db1c2dd0e87a6788
-
Filesize
216KB
MD5e80a9d7b8f8df20d0bfcaaae727c5741
SHA1954e4c304ba9c590d4610b0b3062934acdbf9184
SHA256c1a4cec683cf652f937dfd094f8696cd57c52370688f96e2a34083b247903e16
SHA5120dd82ea6c2e470be95407bb78c1315ae0a5dee5fe600394887d80ec52daa3bf8cbbaa2236ba6a8231d0bd2e7e7c8118422a3873c1dd1ff37041687084cce00fb
-
Filesize
216KB
MD5e80a9d7b8f8df20d0bfcaaae727c5741
SHA1954e4c304ba9c590d4610b0b3062934acdbf9184
SHA256c1a4cec683cf652f937dfd094f8696cd57c52370688f96e2a34083b247903e16
SHA5120dd82ea6c2e470be95407bb78c1315ae0a5dee5fe600394887d80ec52daa3bf8cbbaa2236ba6a8231d0bd2e7e7c8118422a3873c1dd1ff37041687084cce00fb
-
Filesize
14KB
MD5a9a2f37b79c391fdb1d5dad795eb5f49
SHA1c5ff52898c10393574a9fc388306ced4289fe685
SHA2569f92c494f69ab99614b7f8f07ee61fd6942360c38fb116353bcdf1b523db0dad
SHA512e16163f8a1d51978274bbed5b81baa60034aea136d9eaf438b3874934859becfe95c244fa6920727b4890332b041aa0dc4d6188c2edbae04d6a68c053481c338
-
Filesize
14KB
MD5a9a2f37b79c391fdb1d5dad795eb5f49
SHA1c5ff52898c10393574a9fc388306ced4289fe685
SHA2569f92c494f69ab99614b7f8f07ee61fd6942360c38fb116353bcdf1b523db0dad
SHA512e16163f8a1d51978274bbed5b81baa60034aea136d9eaf438b3874934859becfe95c244fa6920727b4890332b041aa0dc4d6188c2edbae04d6a68c053481c338
-
Filesize
140KB
MD5ed3f921177c95104fadac3c0e2b53af7
SHA1f41f7102759416411b19b5156c0a8c971756ae0a
SHA256bb6ae9f190a058285ff7fee161d704548e635a6c0e00b4fba65b599c7a290908
SHA5122b8997628289ab43739841060a39f21a7bed406df897516eee1081725ac10225f10d434b4b53f636a1ece4eb2a97114a0967360c6280059879d0d6e3e6ecbe6d
-
Filesize
140KB
MD5ed3f921177c95104fadac3c0e2b53af7
SHA1f41f7102759416411b19b5156c0a8c971756ae0a
SHA256bb6ae9f190a058285ff7fee161d704548e635a6c0e00b4fba65b599c7a290908
SHA5122b8997628289ab43739841060a39f21a7bed406df897516eee1081725ac10225f10d434b4b53f636a1ece4eb2a97114a0967360c6280059879d0d6e3e6ecbe6d