Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26-08-2023 11:47
Static task
static1
Behavioral task
behavioral1
Sample
1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe
Resource
win10-20230703-en
General
-
Target
1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe
-
Size
930KB
-
MD5
b2b9241d65f9d2b78ac5a6dc8c2a41be
-
SHA1
3517f0df77a613b3147520788a0fa5d82eef67fa
-
SHA256
1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e
-
SHA512
c9156e2f8fcab54a9d79b1a4ef9696ed1dc89b8e210d77a872b93e130c49e5ccd2266aeb21f2e3d6632d687a286e30f6fe8ac35db8cb05db3eb107d3a578c408
-
SSDEEP
12288:DMrCy90AzOJvIBlayCMnBkdfkDNSCXZGEiFud5GIg+sVDokgQ8dzmtducS2jXxu9:dy3mksM+REiFudtkgkd3Dxkb
Malware Config
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afc6-33.dat healer behavioral1/files/0x000700000001afc6-34.dat healer behavioral1/memory/2940-35-0x0000000000680000-0x000000000068A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q9014702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q9014702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q9014702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q9014702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q9014702.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4532 z0642581.exe 1504 z0542606.exe 4628 z7243327.exe 2272 z9667488.exe 2940 q9014702.exe 3288 r9858423.exe 5060 s1900260.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q9014702.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0642581.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0542606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7243327.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9667488.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2940 q9014702.exe 2940 q9014702.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 q9014702.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4532 4796 1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe 70 PID 4796 wrote to memory of 4532 4796 1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe 70 PID 4796 wrote to memory of 4532 4796 1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe 70 PID 4532 wrote to memory of 1504 4532 z0642581.exe 71 PID 4532 wrote to memory of 1504 4532 z0642581.exe 71 PID 4532 wrote to memory of 1504 4532 z0642581.exe 71 PID 1504 wrote to memory of 4628 1504 z0542606.exe 72 PID 1504 wrote to memory of 4628 1504 z0542606.exe 72 PID 1504 wrote to memory of 4628 1504 z0542606.exe 72 PID 4628 wrote to memory of 2272 4628 z7243327.exe 73 PID 4628 wrote to memory of 2272 4628 z7243327.exe 73 PID 4628 wrote to memory of 2272 4628 z7243327.exe 73 PID 2272 wrote to memory of 2940 2272 z9667488.exe 74 PID 2272 wrote to memory of 2940 2272 z9667488.exe 74 PID 2272 wrote to memory of 3288 2272 z9667488.exe 75 PID 2272 wrote to memory of 3288 2272 z9667488.exe 75 PID 2272 wrote to memory of 3288 2272 z9667488.exe 75 PID 4628 wrote to memory of 5060 4628 z7243327.exe 76 PID 4628 wrote to memory of 5060 4628 z7243327.exe 76 PID 4628 wrote to memory of 5060 4628 z7243327.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe"C:\Users\Admin\AppData\Local\Temp\1cfcc46aa3d0e9b0c1581d73dd119bfefe2a06f4eeee43527cffcb0b08282f9e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0642581.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0642581.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0542606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0542606.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7243327.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7243327.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9667488.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9667488.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9014702.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9014702.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9858423.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9858423.exe6⤵
- Executes dropped EXE
PID:3288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1900260.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1900260.exe5⤵
- Executes dropped EXE
PID:5060
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
825KB
MD58380a06981c94fbf597f71334a82a643
SHA1b1753c23e1ae99c04f75b4e9acbaf8e15ab34426
SHA256fc61716b3b0b461f195496d67f3bfdc4e050a387d1cd2d62b5b86a76a808be6c
SHA51279177d68134b144e04e64f3f6fdeb6d919873b2caf212fa73be78cedb824ac2fb3114120c75b067f55ea352fa73dc12714e7de0004baa22779250205146418b9
-
Filesize
825KB
MD58380a06981c94fbf597f71334a82a643
SHA1b1753c23e1ae99c04f75b4e9acbaf8e15ab34426
SHA256fc61716b3b0b461f195496d67f3bfdc4e050a387d1cd2d62b5b86a76a808be6c
SHA51279177d68134b144e04e64f3f6fdeb6d919873b2caf212fa73be78cedb824ac2fb3114120c75b067f55ea352fa73dc12714e7de0004baa22779250205146418b9
-
Filesize
599KB
MD5fd130261d24a44329279bb7a65d3ff03
SHA1dfe8097530346f257fe5558dd5fd61e3d78c0761
SHA256fb7eb4331dfd2db0dc00315f87632466fab1d1e1cc2b1c0cd3553521f8f4d72c
SHA51238083ef04f4823712f4c3b4ea9d7d9af3c9292888d8033b6626b8c9c6c6407b887bafae203d0746a31b20991a33915c7ed71e32feb06abd86c74c03dff2eb8dc
-
Filesize
599KB
MD5fd130261d24a44329279bb7a65d3ff03
SHA1dfe8097530346f257fe5558dd5fd61e3d78c0761
SHA256fb7eb4331dfd2db0dc00315f87632466fab1d1e1cc2b1c0cd3553521f8f4d72c
SHA51238083ef04f4823712f4c3b4ea9d7d9af3c9292888d8033b6626b8c9c6c6407b887bafae203d0746a31b20991a33915c7ed71e32feb06abd86c74c03dff2eb8dc
-
Filesize
373KB
MD5ed4a9113f61329cb58704dece69d1348
SHA1a68dd5e0631191af67bb7dd4a8c47e2cc11d9582
SHA2568820759abb22e2dc0c37e0766541fbdc064ff5577a987c47287c3004ff76c4fd
SHA5126f6fea600e8ccc554e1f94fb206118637693c7b44ff4b36d9ad4a3ab1d6b9807cf93d45ad0ece5a18043bdb076f7c8b87bdaeced680a90250c257c3e07177c0c
-
Filesize
373KB
MD5ed4a9113f61329cb58704dece69d1348
SHA1a68dd5e0631191af67bb7dd4a8c47e2cc11d9582
SHA2568820759abb22e2dc0c37e0766541fbdc064ff5577a987c47287c3004ff76c4fd
SHA5126f6fea600e8ccc554e1f94fb206118637693c7b44ff4b36d9ad4a3ab1d6b9807cf93d45ad0ece5a18043bdb076f7c8b87bdaeced680a90250c257c3e07177c0c
-
Filesize
174KB
MD5abb1d86768df1e2a269224df9e3696b9
SHA19912dff3625ebc742405701e13e32bc69dec9073
SHA256d4c96814e6253a3070ea1602d013f6110a2cd9b21454307f253f1d8833e04bb1
SHA51200bd0dbff130ef4817b7038f31c073c84d41ef19c496a77ea377ffe75206539fdea923fca08cc7342457bd58bc9225c55ae2674643d735c4359aab3c1222242f
-
Filesize
174KB
MD5abb1d86768df1e2a269224df9e3696b9
SHA19912dff3625ebc742405701e13e32bc69dec9073
SHA256d4c96814e6253a3070ea1602d013f6110a2cd9b21454307f253f1d8833e04bb1
SHA51200bd0dbff130ef4817b7038f31c073c84d41ef19c496a77ea377ffe75206539fdea923fca08cc7342457bd58bc9225c55ae2674643d735c4359aab3c1222242f
-
Filesize
217KB
MD5dd24cb11685b9ef2c3c05cc4fbb627e2
SHA14a6244d261a3f13bf6b9c3adf200a3e88b6c5e33
SHA2569ec1a24569d6082dabddb53ea98b5e05709f1f4185ee19594499f7a1a92c0c76
SHA512637d2d128cd0861feece7be4c61b08bc3e9e20091d3a226dba4c2ec9c99dfeedb28b3bbd4558e81f2d8b043fef1a62728c9f1908cd32b71c01691df32447fedc
-
Filesize
217KB
MD5dd24cb11685b9ef2c3c05cc4fbb627e2
SHA14a6244d261a3f13bf6b9c3adf200a3e88b6c5e33
SHA2569ec1a24569d6082dabddb53ea98b5e05709f1f4185ee19594499f7a1a92c0c76
SHA512637d2d128cd0861feece7be4c61b08bc3e9e20091d3a226dba4c2ec9c99dfeedb28b3bbd4558e81f2d8b043fef1a62728c9f1908cd32b71c01691df32447fedc
-
Filesize
14KB
MD54db0d7e2dc0421230ca375d55cf1ba2e
SHA1874ebf98e6d99df6be36499acd07c42058ebf6bb
SHA256e228fa0375b00c7c6495d76cd64fd3fb235472a0eef3f668ef4d44d9bf98e407
SHA512dfd5479bfcc25155a55bece60a90a17e8ad2cab8d045d4061ca7d99c1e3f762ab571246cb69c3fd7b5e1b6269405adc963dc54a79e7e83d79d55cef43acdff76
-
Filesize
14KB
MD54db0d7e2dc0421230ca375d55cf1ba2e
SHA1874ebf98e6d99df6be36499acd07c42058ebf6bb
SHA256e228fa0375b00c7c6495d76cd64fd3fb235472a0eef3f668ef4d44d9bf98e407
SHA512dfd5479bfcc25155a55bece60a90a17e8ad2cab8d045d4061ca7d99c1e3f762ab571246cb69c3fd7b5e1b6269405adc963dc54a79e7e83d79d55cef43acdff76
-
Filesize
141KB
MD5a668202aed88c6086e93e71e5db95910
SHA1ad84242c03c8f16bdbd9179e01514c8663eb61d3
SHA25668a317790750e5ca05d879496fba7ba1b02581a2d283f10494c1d97cca98b2e7
SHA512c868a7c1df4a0a0b07fa13481f263ded9e39e1aeb7a7f75e4025dab6ba8f3983977dd83bb52ae0a2ffa9457b84340f1d035ae86941f13d315c56cfa928eb5aae
-
Filesize
141KB
MD5a668202aed88c6086e93e71e5db95910
SHA1ad84242c03c8f16bdbd9179e01514c8663eb61d3
SHA25668a317790750e5ca05d879496fba7ba1b02581a2d283f10494c1d97cca98b2e7
SHA512c868a7c1df4a0a0b07fa13481f263ded9e39e1aeb7a7f75e4025dab6ba8f3983977dd83bb52ae0a2ffa9457b84340f1d035ae86941f13d315c56cfa928eb5aae