Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe
Resource
win10v2004-20230703-en
General
-
Target
8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe
-
Size
829KB
-
MD5
448bd3cde5dc78d1569fccd49ac6641a
-
SHA1
6966d702004302a5bd73e7da3bc7a18648714c8e
-
SHA256
8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5
-
SHA512
b7ef60c1d02c9c956ffb9ea2c31867ca41f7b538e2fb7940c018c3a4ae13d62206109c9120ca6189d9ead9f6f3efbb81b8bc2b5e67dc9344b4f23c79d2454d9a
-
SSDEEP
12288:rMrAy90Zd4sxIlrJfl0oFsCWsVHxOhuCoFh9kaIKzTHUq0gsZxl157/GeT6ph9VZ:HyKxIlrJ6o/WSHPSGUVgs7hDoJ+SV
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002323b-33.dat healer behavioral1/files/0x000800000002323b-34.dat healer behavioral1/memory/1532-35-0x0000000000730000-0x000000000073A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5776152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5776152.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5776152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5776152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5776152.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5776152.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2296 v4037703.exe 4232 v6871489.exe 4700 v2843231.exe 2408 v1553867.exe 1532 a5776152.exe 3744 b3917197.exe 1860 c0484744.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5776152.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1553867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4037703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6871489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2843231.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1532 a5776152.exe 1532 a5776152.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1532 a5776152.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2296 1956 8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe 82 PID 1956 wrote to memory of 2296 1956 8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe 82 PID 1956 wrote to memory of 2296 1956 8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe 82 PID 2296 wrote to memory of 4232 2296 v4037703.exe 83 PID 2296 wrote to memory of 4232 2296 v4037703.exe 83 PID 2296 wrote to memory of 4232 2296 v4037703.exe 83 PID 4232 wrote to memory of 4700 4232 v6871489.exe 84 PID 4232 wrote to memory of 4700 4232 v6871489.exe 84 PID 4232 wrote to memory of 4700 4232 v6871489.exe 84 PID 4700 wrote to memory of 2408 4700 v2843231.exe 85 PID 4700 wrote to memory of 2408 4700 v2843231.exe 85 PID 4700 wrote to memory of 2408 4700 v2843231.exe 85 PID 2408 wrote to memory of 1532 2408 v1553867.exe 86 PID 2408 wrote to memory of 1532 2408 v1553867.exe 86 PID 2408 wrote to memory of 3744 2408 v1553867.exe 95 PID 2408 wrote to memory of 3744 2408 v1553867.exe 95 PID 2408 wrote to memory of 3744 2408 v1553867.exe 95 PID 4700 wrote to memory of 1860 4700 v2843231.exe 96 PID 4700 wrote to memory of 1860 4700 v2843231.exe 96 PID 4700 wrote to memory of 1860 4700 v2843231.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe"C:\Users\Admin\AppData\Local\Temp\8ecdd7b54d0e160eb62b6a46c7faaf330b2ce88a030d7ff4fbe3822ab878aad5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4037703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4037703.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6871489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6871489.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2843231.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2843231.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1553867.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1553867.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5776152.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5776152.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3917197.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3917197.exe6⤵
- Executes dropped EXE
PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0484744.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0484744.exe5⤵
- Executes dropped EXE
PID:1860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5989124074b7a9a598e11e06426e199ef
SHA1ddd0ef6a5d20988075439af9baad1ad1de2416aa
SHA2562217608e2e12fd20cc7cefa93fb9810ee16bb63a49c6a2ddb0424851668e1285
SHA512a2c63387015abb54ed220e541e51374222951151f47f1ccc10a62f0ff680c1d5029930d713528ee6e8d5aa987cba0d701a9006729cd4421905bde5f5ae90e26c
-
Filesize
723KB
MD5989124074b7a9a598e11e06426e199ef
SHA1ddd0ef6a5d20988075439af9baad1ad1de2416aa
SHA2562217608e2e12fd20cc7cefa93fb9810ee16bb63a49c6a2ddb0424851668e1285
SHA512a2c63387015abb54ed220e541e51374222951151f47f1ccc10a62f0ff680c1d5029930d713528ee6e8d5aa987cba0d701a9006729cd4421905bde5f5ae90e26c
-
Filesize
497KB
MD52cc98882c35ff0839854d14ce31eb423
SHA17a39a9951dfcc00cbbdaedb499dfaec75daea1c4
SHA2563781e6d75e4d4df8e6d7fb3e89ed1dbd5af01b137dc47d5c8b220df49c38c939
SHA5126fd684efd7a090922d8f02128bb7f5f38f70cd317d97e852aeb5e476c24e069f1fe638ff4efb96ebd42461f1aa5723d18b7d649f5f183d029628d208faa6dd1a
-
Filesize
497KB
MD52cc98882c35ff0839854d14ce31eb423
SHA17a39a9951dfcc00cbbdaedb499dfaec75daea1c4
SHA2563781e6d75e4d4df8e6d7fb3e89ed1dbd5af01b137dc47d5c8b220df49c38c939
SHA5126fd684efd7a090922d8f02128bb7f5f38f70cd317d97e852aeb5e476c24e069f1fe638ff4efb96ebd42461f1aa5723d18b7d649f5f183d029628d208faa6dd1a
-
Filesize
372KB
MD503846776c68cb9ad5f05f21aac67f2e1
SHA1849a5de23f988ffc8789a082c80dbc8e89b50b6b
SHA25665a7951f109616860f5dd83bf3112e18df9a48ef9e2fcbd53be64ba3fb946f14
SHA5124c6e9cd525a23156b33008d73c1138048f348b023dd6ea8031ef6018533b18f2ec4ba0070715b9628cd70aee6412a6d618beeccf273ac3540ea3638b2eb10922
-
Filesize
372KB
MD503846776c68cb9ad5f05f21aac67f2e1
SHA1849a5de23f988ffc8789a082c80dbc8e89b50b6b
SHA25665a7951f109616860f5dd83bf3112e18df9a48ef9e2fcbd53be64ba3fb946f14
SHA5124c6e9cd525a23156b33008d73c1138048f348b023dd6ea8031ef6018533b18f2ec4ba0070715b9628cd70aee6412a6d618beeccf273ac3540ea3638b2eb10922
-
Filesize
174KB
MD527fd991f631faa6d8e5aa16c7c95959f
SHA1470d9c05fcee1e64bd9777ad473c07a07d98aaf4
SHA2568f3cfcbf98c8c27ddb305f86f705100656c4e9e09b25a91ed4e631fb7d6de7c8
SHA51236312910e0fc2a5d5198c10c6b70376524fef35c17abeca6941c560173150b7b3339a2048b492095f842d7ee06e425c4fab2328ef83250ba6a5c803eaeb12715
-
Filesize
174KB
MD527fd991f631faa6d8e5aa16c7c95959f
SHA1470d9c05fcee1e64bd9777ad473c07a07d98aaf4
SHA2568f3cfcbf98c8c27ddb305f86f705100656c4e9e09b25a91ed4e631fb7d6de7c8
SHA51236312910e0fc2a5d5198c10c6b70376524fef35c17abeca6941c560173150b7b3339a2048b492095f842d7ee06e425c4fab2328ef83250ba6a5c803eaeb12715
-
Filesize
217KB
MD5132e1d77862c069ee6269a3158996a13
SHA1a9705716b26379fe72507f04b5dd643caba96afb
SHA25644e9ac665f6b4fa176e0d45c6ed2af370ded6ded875b095428a9f903c7a5ae06
SHA512832a0c91b1aa5ac1f594d8eb0344410af2788d5573651d09fad7ea465e084d039ecc7106421783179706ea61688f3693486c84bbe41e27ab8442483d6d4556fc
-
Filesize
217KB
MD5132e1d77862c069ee6269a3158996a13
SHA1a9705716b26379fe72507f04b5dd643caba96afb
SHA25644e9ac665f6b4fa176e0d45c6ed2af370ded6ded875b095428a9f903c7a5ae06
SHA512832a0c91b1aa5ac1f594d8eb0344410af2788d5573651d09fad7ea465e084d039ecc7106421783179706ea61688f3693486c84bbe41e27ab8442483d6d4556fc
-
Filesize
15KB
MD5065625637034f37eed1adc2c5136227b
SHA1d61085bb622ed1c98e0621c12ce1a447b19878e2
SHA256d09bc8cec64a04a407c4ed400b5c33d6e4069924c6babc127878a117807204ec
SHA512a48724ef51624f54d7aa69f451418795713ae8e51895f5bd1495396bdc637f779417368260315b8c35e9444494bd4ae21dbcfa6f492e790444e322039a52d13d
-
Filesize
15KB
MD5065625637034f37eed1adc2c5136227b
SHA1d61085bb622ed1c98e0621c12ce1a447b19878e2
SHA256d09bc8cec64a04a407c4ed400b5c33d6e4069924c6babc127878a117807204ec
SHA512a48724ef51624f54d7aa69f451418795713ae8e51895f5bd1495396bdc637f779417368260315b8c35e9444494bd4ae21dbcfa6f492e790444e322039a52d13d
-
Filesize
140KB
MD5a2acfb5c07f5600178cb84e7ffc8f35e
SHA1d006f91b6c0561a20ac1dcf364efded07f9dffda
SHA2563a753df3ec68a522fa70b86557e5d754704f88ff72477643b22b1eecb892175f
SHA5124442f066a5a25f3dae9d0985efda494d8d331482a2028a8c62ffe104be05e8b7dba5d362e15c05990020b04df4d9841dc8b1ba1e09334a598953ba43dae75d2c
-
Filesize
140KB
MD5a2acfb5c07f5600178cb84e7ffc8f35e
SHA1d006f91b6c0561a20ac1dcf364efded07f9dffda
SHA2563a753df3ec68a522fa70b86557e5d754704f88ff72477643b22b1eecb892175f
SHA5124442f066a5a25f3dae9d0985efda494d8d331482a2028a8c62ffe104be05e8b7dba5d362e15c05990020b04df4d9841dc8b1ba1e09334a598953ba43dae75d2c