Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe
Resource
win10v2004-20230703-en
General
-
Target
2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe
-
Size
930KB
-
MD5
4400bee0bcfbe06a676769701f5dd8bc
-
SHA1
5ad061ab5ab3daef886cf82fdfad290e31d69ea6
-
SHA256
2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126
-
SHA512
01ae0e9a325b6263c0cfc038ea2773669a35716d624b8750b784dc719f3e9b0ee166b56049c0e12e9d606f774fcfb7f73ba5ee104cd183251f428f9256b20a6c
-
SSDEEP
24576:WyL2Mm7jnnGy8IlD1Nr/pLMShNbt3COO1:lLReLGy/l5l/yQjy1
Malware Config
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023245-33.dat healer behavioral1/files/0x0007000000023245-34.dat healer behavioral1/memory/1552-35-0x0000000000030000-0x000000000003A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8764209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8764209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8764209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8764209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8764209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8764209.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 372 z2142130.exe 3840 z0024363.exe 4960 z2079933.exe 4288 z1853669.exe 1552 q8764209.exe 1936 r6945936.exe 4992 s9128096.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8764209.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2142130.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0024363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2079933.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1853669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 q8764209.exe 1552 q8764209.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1552 q8764209.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1372 wrote to memory of 372 1372 2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe 83 PID 1372 wrote to memory of 372 1372 2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe 83 PID 1372 wrote to memory of 372 1372 2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe 83 PID 372 wrote to memory of 3840 372 z2142130.exe 84 PID 372 wrote to memory of 3840 372 z2142130.exe 84 PID 372 wrote to memory of 3840 372 z2142130.exe 84 PID 3840 wrote to memory of 4960 3840 z0024363.exe 85 PID 3840 wrote to memory of 4960 3840 z0024363.exe 85 PID 3840 wrote to memory of 4960 3840 z0024363.exe 85 PID 4960 wrote to memory of 4288 4960 z2079933.exe 86 PID 4960 wrote to memory of 4288 4960 z2079933.exe 86 PID 4960 wrote to memory of 4288 4960 z2079933.exe 86 PID 4288 wrote to memory of 1552 4288 z1853669.exe 87 PID 4288 wrote to memory of 1552 4288 z1853669.exe 87 PID 4288 wrote to memory of 1936 4288 z1853669.exe 93 PID 4288 wrote to memory of 1936 4288 z1853669.exe 93 PID 4288 wrote to memory of 1936 4288 z1853669.exe 93 PID 4960 wrote to memory of 4992 4960 z2079933.exe 94 PID 4960 wrote to memory of 4992 4960 z2079933.exe 94 PID 4960 wrote to memory of 4992 4960 z2079933.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe"C:\Users\Admin\AppData\Local\Temp\2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exe6⤵
- Executes dropped EXE
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exe5⤵
- Executes dropped EXE
PID:4992
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
825KB
MD5d28007e2472806bd234c2d5c65949023
SHA133cba6a87d645ea7095b67906cb6ee5d990f87ab
SHA2568db36d20cc038bed3c925ed6980d02751e8cd7c40b0964eed753f91a7af38ae3
SHA512ac85cadf0f27d7f16bdd6b7b243c7275acf83e289b530c835972d95ffafa31a31bc2d7b55173de434f40f87a8e55bcc38727dda1413ba9bf7a238c023551b118
-
Filesize
825KB
MD5d28007e2472806bd234c2d5c65949023
SHA133cba6a87d645ea7095b67906cb6ee5d990f87ab
SHA2568db36d20cc038bed3c925ed6980d02751e8cd7c40b0964eed753f91a7af38ae3
SHA512ac85cadf0f27d7f16bdd6b7b243c7275acf83e289b530c835972d95ffafa31a31bc2d7b55173de434f40f87a8e55bcc38727dda1413ba9bf7a238c023551b118
-
Filesize
599KB
MD5aba307fe7a8f894b1b40d0074fa229ee
SHA10014cb12bf8b6b369f1077962cfdecac29b61da0
SHA256a8c1c0225696bdcd396ffbff29a994bef4cf433f7ccfbfe3b4ae2e5094ec3510
SHA512523695c5ffd7fe4bb674d857d6243a17f901f03bf2dbf96f6c0bf6c4e47d673af20ef66ce2315854eee300bdfdb29b6cb94a69a855e96d1882f3c02ac9a4cc79
-
Filesize
599KB
MD5aba307fe7a8f894b1b40d0074fa229ee
SHA10014cb12bf8b6b369f1077962cfdecac29b61da0
SHA256a8c1c0225696bdcd396ffbff29a994bef4cf433f7ccfbfe3b4ae2e5094ec3510
SHA512523695c5ffd7fe4bb674d857d6243a17f901f03bf2dbf96f6c0bf6c4e47d673af20ef66ce2315854eee300bdfdb29b6cb94a69a855e96d1882f3c02ac9a4cc79
-
Filesize
373KB
MD5fcd29086bd134b943ee3d2585a0cf653
SHA16d85cfb5208fd222b05cac29263985e01484a688
SHA256667aff170a5c341853d28dc3e922197cca01e42f4f5ff5cddd97e982e1461858
SHA51287a7da9ee2abed5f3556e97e5f87378998b1d262354983c4f102512d86101363294605e1003e9b367ea9fcab9c99ab68c88fad65d4b3b8633995bdcaa12f064c
-
Filesize
373KB
MD5fcd29086bd134b943ee3d2585a0cf653
SHA16d85cfb5208fd222b05cac29263985e01484a688
SHA256667aff170a5c341853d28dc3e922197cca01e42f4f5ff5cddd97e982e1461858
SHA51287a7da9ee2abed5f3556e97e5f87378998b1d262354983c4f102512d86101363294605e1003e9b367ea9fcab9c99ab68c88fad65d4b3b8633995bdcaa12f064c
-
Filesize
174KB
MD56b582303829cd9bdf10b0cb6250e6fc5
SHA10b29fb373bfe6cfdc0300b2dd19b4b268723dee1
SHA256c92c20e9367f46f42237f6e52ff07177f03698517715943bc198b9f4a48d9884
SHA5120b343de067fc5bf2075f9c4728955d2ffcd93394753b27dce8c4b7d5978890c27baa7f73b872a3dce8b08d8fbb5d625908bdf9fce32a9b5023bb125726693f3f
-
Filesize
174KB
MD56b582303829cd9bdf10b0cb6250e6fc5
SHA10b29fb373bfe6cfdc0300b2dd19b4b268723dee1
SHA256c92c20e9367f46f42237f6e52ff07177f03698517715943bc198b9f4a48d9884
SHA5120b343de067fc5bf2075f9c4728955d2ffcd93394753b27dce8c4b7d5978890c27baa7f73b872a3dce8b08d8fbb5d625908bdf9fce32a9b5023bb125726693f3f
-
Filesize
217KB
MD5ae1bcb477e961c63952b64fb3c0bafd1
SHA182c2391d3e80e98fb75dfd6552ecfb1928e9a6a9
SHA2562eae6b34e0e0466a955f775c080528d01252277a9d08443be9c8df0dda22a515
SHA51255ee60c4ff5e96882541e1f8a706dd40f50554d4e67cb250d30a809757ce4d85959bf410e41a0e03c83f1ceec64f09c5cebcaec3245c7429d3ae9c69d0a86bbd
-
Filesize
217KB
MD5ae1bcb477e961c63952b64fb3c0bafd1
SHA182c2391d3e80e98fb75dfd6552ecfb1928e9a6a9
SHA2562eae6b34e0e0466a955f775c080528d01252277a9d08443be9c8df0dda22a515
SHA51255ee60c4ff5e96882541e1f8a706dd40f50554d4e67cb250d30a809757ce4d85959bf410e41a0e03c83f1ceec64f09c5cebcaec3245c7429d3ae9c69d0a86bbd
-
Filesize
14KB
MD5807b2f628e383e31edc7d7425aaed076
SHA1f51b4a42331eb92e44d71eb67ccd3a98469a0e43
SHA256d13dd136d91f3eaa2e2799c2ced36d43048290285ecb3a3e31301fbcee7adb8c
SHA51288cacb4af6d205a37f01e536a1c864f942b0f462a30c64cf601e3442dffda16fb9e0ba0c54549f4cc5b75ca55d4c90e1a8f2e93e41ca2ff96cff49241c2197dc
-
Filesize
14KB
MD5807b2f628e383e31edc7d7425aaed076
SHA1f51b4a42331eb92e44d71eb67ccd3a98469a0e43
SHA256d13dd136d91f3eaa2e2799c2ced36d43048290285ecb3a3e31301fbcee7adb8c
SHA51288cacb4af6d205a37f01e536a1c864f942b0f462a30c64cf601e3442dffda16fb9e0ba0c54549f4cc5b75ca55d4c90e1a8f2e93e41ca2ff96cff49241c2197dc
-
Filesize
141KB
MD56f4463617d8d91a1865adc08a46a4c69
SHA16f8f09825b5cb43c39e78be73b339c70c2c7c23c
SHA256eb43910d5a4ca88192763fd4dbfa4e0ac023398f62f5463a6fc55c602545d2ff
SHA512b1e45490cfeec4471b7d6b4c0960ff8e0f2569c740869962cfcca830fc595137d7c9088a987a6220d2c7779dfa8a4576d756b51cd7f5476e8b9a8111b842d324
-
Filesize
141KB
MD56f4463617d8d91a1865adc08a46a4c69
SHA16f8f09825b5cb43c39e78be73b339c70c2c7c23c
SHA256eb43910d5a4ca88192763fd4dbfa4e0ac023398f62f5463a6fc55c602545d2ff
SHA512b1e45490cfeec4471b7d6b4c0960ff8e0f2569c740869962cfcca830fc595137d7c9088a987a6220d2c7779dfa8a4576d756b51cd7f5476e8b9a8111b842d324