Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 02:51
Static task
static1
Behavioral task
behavioral1
Sample
0dfdd06da8b1a443bc595c621b61644d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0dfdd06da8b1a443bc595c621b61644d.exe
Resource
win10v2004-20230703-en
General
-
Target
0dfdd06da8b1a443bc595c621b61644d.exe
-
Size
723KB
-
MD5
0dfdd06da8b1a443bc595c621b61644d
-
SHA1
1b2594023cccd55c6b1dad2946264d2101c8e0e7
-
SHA256
1eb609b1e89c9cba77e8a51d40875c45fbf31c08ccb3024b631fc2d4f41418de
-
SHA512
d216c3b4d115263962179f2062ff57aa5ed7d9cacc7170b0c483abda34b80ecd46a2de9359ae97aabf0275fec8c44d360a83c83eea95b24cc38ea42d32e27593
-
SSDEEP
12288:VMrDy90vYPszEjj8xtA7H4y2/xNa0uhimHvYpMYINecxhqmRUfjIQFsB3LvcykD:myNPwE836H4yKsi6xMmafjIQFsB7I
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x0007000000018bba-34.dat healer behavioral1/files/0x0007000000018bba-36.dat healer behavioral1/files/0x0007000000018bba-37.dat healer behavioral1/memory/2080-38-0x0000000000BD0000-0x0000000000BDA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2579660.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2036 v8518439.exe 3036 v8563012.exe 2588 v0332881.exe 2080 a2579660.exe 1492 b1264765.exe 2828 c9231331.exe -
Loads dropped DLL 11 IoCs
pid Process 2260 0dfdd06da8b1a443bc595c621b61644d.exe 2036 v8518439.exe 2036 v8518439.exe 3036 v8563012.exe 3036 v8563012.exe 2588 v0332881.exe 2588 v0332881.exe 2588 v0332881.exe 1492 b1264765.exe 3036 v8563012.exe 2828 c9231331.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features a2579660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2579660.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0dfdd06da8b1a443bc595c621b61644d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8518439.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8563012.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0332881.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 a2579660.exe 2080 a2579660.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 a2579660.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2260 wrote to memory of 2036 2260 0dfdd06da8b1a443bc595c621b61644d.exe 28 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 2036 wrote to memory of 3036 2036 v8518439.exe 29 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 3036 wrote to memory of 2588 3036 v8563012.exe 30 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 2080 2588 v0332881.exe 31 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 2588 wrote to memory of 1492 2588 v0332881.exe 32 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34 PID 3036 wrote to memory of 2828 3036 v8563012.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfdd06da8b1a443bc595c621b61644d.exe"C:\Users\Admin\AppData\Local\Temp\0dfdd06da8b1a443bc595c621b61644d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8518439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8518439.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8563012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8563012.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0332881.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0332881.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2579660.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2579660.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1264765.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1264765.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9231331.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9231331.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD57ff821777efda968a8444c912a813103
SHA1f965eb2a9b2ab75a52e076c34b585da50ef793a7
SHA256336be1d073f3ce60c18d807b7957591aa57a3087ba3c32a7e6f7399c0cfc937e
SHA51274ab3466c97c17e00d07777f8a96a38f79fe9e25bc567cd945bdc8150e6789ac6ff62d3d8d1527aa5352b6e82f2d86e9dc3b3fc50783ca1672349f8ee58406a4
-
Filesize
497KB
MD57ff821777efda968a8444c912a813103
SHA1f965eb2a9b2ab75a52e076c34b585da50ef793a7
SHA256336be1d073f3ce60c18d807b7957591aa57a3087ba3c32a7e6f7399c0cfc937e
SHA51274ab3466c97c17e00d07777f8a96a38f79fe9e25bc567cd945bdc8150e6789ac6ff62d3d8d1527aa5352b6e82f2d86e9dc3b3fc50783ca1672349f8ee58406a4
-
Filesize
373KB
MD59fa477f516cd28d9acd141ababd81b31
SHA14b88c7178a4afe0d147aa3f4d0ff100f74716f1b
SHA2562e938c3cdbea1ceb6c6d4047f262f1e6d008b4ce52f27c1f6df96d9c3752157c
SHA5128fff863b9f9a9beba20cf2a4399ae0b29bcd128d693161621cab29d86144926c5cf2630f064d285d1a6a1d64160f4165c0d9023232cf31ccd6354b1efa062e7b
-
Filesize
373KB
MD59fa477f516cd28d9acd141ababd81b31
SHA14b88c7178a4afe0d147aa3f4d0ff100f74716f1b
SHA2562e938c3cdbea1ceb6c6d4047f262f1e6d008b4ce52f27c1f6df96d9c3752157c
SHA5128fff863b9f9a9beba20cf2a4399ae0b29bcd128d693161621cab29d86144926c5cf2630f064d285d1a6a1d64160f4165c0d9023232cf31ccd6354b1efa062e7b
-
Filesize
174KB
MD5c441675eed01c44c12dfe9e5b08bc8a7
SHA1005d8f31245d3edcce60a2e0902a3adf4683ab40
SHA2565b86c4995ec05480db49c015abb70e86d97e97fc0a02f31920c62ab22156c99d
SHA512352e06328217619a954506f22cdf730141107580526a35b2a10ace59d18e1ae478c38fbb1aa0b6c7a24610151704494ddb8ecec3d53644f87405993e5842f5da
-
Filesize
174KB
MD5c441675eed01c44c12dfe9e5b08bc8a7
SHA1005d8f31245d3edcce60a2e0902a3adf4683ab40
SHA2565b86c4995ec05480db49c015abb70e86d97e97fc0a02f31920c62ab22156c99d
SHA512352e06328217619a954506f22cdf730141107580526a35b2a10ace59d18e1ae478c38fbb1aa0b6c7a24610151704494ddb8ecec3d53644f87405993e5842f5da
-
Filesize
217KB
MD5c918ac97379e4b33f1a798f002a77615
SHA11f55cb8ce680169e1d051546fdad104928030949
SHA25673f81f0e9ccc128411480229135fde60042cffc2522d5327ab621921760c83a0
SHA5120d23447f7a79fe6eeff25a725cb3583140db8bc5996bcb590b9c4cd5db3a5e720ede561a002fedb0858eb358600875ec68f6fd2b32fcf223234629c0934bbb53
-
Filesize
217KB
MD5c918ac97379e4b33f1a798f002a77615
SHA11f55cb8ce680169e1d051546fdad104928030949
SHA25673f81f0e9ccc128411480229135fde60042cffc2522d5327ab621921760c83a0
SHA5120d23447f7a79fe6eeff25a725cb3583140db8bc5996bcb590b9c4cd5db3a5e720ede561a002fedb0858eb358600875ec68f6fd2b32fcf223234629c0934bbb53
-
Filesize
12KB
MD5d68ad8358a830ba6ff0404074548f3ac
SHA10e234fcbfef29b629699f8c330cc05b9a4c421b5
SHA25610d565430bf866f5c9837d2c716d05b33aa318afa8dfd8a3a42b755df208db1e
SHA512bd2f56f9b43ebeb32a73f525b26dbc4d8b953d0a478dd772814bd65cff91e234d6bf067933c19bda8f7f8ef47ccb18649fc7253e1edb389f0c598eb10c14435a
-
Filesize
12KB
MD5d68ad8358a830ba6ff0404074548f3ac
SHA10e234fcbfef29b629699f8c330cc05b9a4c421b5
SHA25610d565430bf866f5c9837d2c716d05b33aa318afa8dfd8a3a42b755df208db1e
SHA512bd2f56f9b43ebeb32a73f525b26dbc4d8b953d0a478dd772814bd65cff91e234d6bf067933c19bda8f7f8ef47ccb18649fc7253e1edb389f0c598eb10c14435a
-
Filesize
140KB
MD5c7138634f88944c4c5679b69de6b8a52
SHA163cb356fe0587ad282b86e4449c9d1feb3116607
SHA25686eabf77653304d01a79839ed3750ae1c1449c322ec67360ae4bf38d0922cba0
SHA512cce04453f05075ccb3a3c1d067c66e8ae359fd795f0166f7a5b00f270b2541b6fab539664eb18a21a57d13a5269587911a081769a95bff12a8933dc7a9f4381e
-
Filesize
140KB
MD5c7138634f88944c4c5679b69de6b8a52
SHA163cb356fe0587ad282b86e4449c9d1feb3116607
SHA25686eabf77653304d01a79839ed3750ae1c1449c322ec67360ae4bf38d0922cba0
SHA512cce04453f05075ccb3a3c1d067c66e8ae359fd795f0166f7a5b00f270b2541b6fab539664eb18a21a57d13a5269587911a081769a95bff12a8933dc7a9f4381e
-
Filesize
497KB
MD57ff821777efda968a8444c912a813103
SHA1f965eb2a9b2ab75a52e076c34b585da50ef793a7
SHA256336be1d073f3ce60c18d807b7957591aa57a3087ba3c32a7e6f7399c0cfc937e
SHA51274ab3466c97c17e00d07777f8a96a38f79fe9e25bc567cd945bdc8150e6789ac6ff62d3d8d1527aa5352b6e82f2d86e9dc3b3fc50783ca1672349f8ee58406a4
-
Filesize
497KB
MD57ff821777efda968a8444c912a813103
SHA1f965eb2a9b2ab75a52e076c34b585da50ef793a7
SHA256336be1d073f3ce60c18d807b7957591aa57a3087ba3c32a7e6f7399c0cfc937e
SHA51274ab3466c97c17e00d07777f8a96a38f79fe9e25bc567cd945bdc8150e6789ac6ff62d3d8d1527aa5352b6e82f2d86e9dc3b3fc50783ca1672349f8ee58406a4
-
Filesize
373KB
MD59fa477f516cd28d9acd141ababd81b31
SHA14b88c7178a4afe0d147aa3f4d0ff100f74716f1b
SHA2562e938c3cdbea1ceb6c6d4047f262f1e6d008b4ce52f27c1f6df96d9c3752157c
SHA5128fff863b9f9a9beba20cf2a4399ae0b29bcd128d693161621cab29d86144926c5cf2630f064d285d1a6a1d64160f4165c0d9023232cf31ccd6354b1efa062e7b
-
Filesize
373KB
MD59fa477f516cd28d9acd141ababd81b31
SHA14b88c7178a4afe0d147aa3f4d0ff100f74716f1b
SHA2562e938c3cdbea1ceb6c6d4047f262f1e6d008b4ce52f27c1f6df96d9c3752157c
SHA5128fff863b9f9a9beba20cf2a4399ae0b29bcd128d693161621cab29d86144926c5cf2630f064d285d1a6a1d64160f4165c0d9023232cf31ccd6354b1efa062e7b
-
Filesize
174KB
MD5c441675eed01c44c12dfe9e5b08bc8a7
SHA1005d8f31245d3edcce60a2e0902a3adf4683ab40
SHA2565b86c4995ec05480db49c015abb70e86d97e97fc0a02f31920c62ab22156c99d
SHA512352e06328217619a954506f22cdf730141107580526a35b2a10ace59d18e1ae478c38fbb1aa0b6c7a24610151704494ddb8ecec3d53644f87405993e5842f5da
-
Filesize
174KB
MD5c441675eed01c44c12dfe9e5b08bc8a7
SHA1005d8f31245d3edcce60a2e0902a3adf4683ab40
SHA2565b86c4995ec05480db49c015abb70e86d97e97fc0a02f31920c62ab22156c99d
SHA512352e06328217619a954506f22cdf730141107580526a35b2a10ace59d18e1ae478c38fbb1aa0b6c7a24610151704494ddb8ecec3d53644f87405993e5842f5da
-
Filesize
217KB
MD5c918ac97379e4b33f1a798f002a77615
SHA11f55cb8ce680169e1d051546fdad104928030949
SHA25673f81f0e9ccc128411480229135fde60042cffc2522d5327ab621921760c83a0
SHA5120d23447f7a79fe6eeff25a725cb3583140db8bc5996bcb590b9c4cd5db3a5e720ede561a002fedb0858eb358600875ec68f6fd2b32fcf223234629c0934bbb53
-
Filesize
217KB
MD5c918ac97379e4b33f1a798f002a77615
SHA11f55cb8ce680169e1d051546fdad104928030949
SHA25673f81f0e9ccc128411480229135fde60042cffc2522d5327ab621921760c83a0
SHA5120d23447f7a79fe6eeff25a725cb3583140db8bc5996bcb590b9c4cd5db3a5e720ede561a002fedb0858eb358600875ec68f6fd2b32fcf223234629c0934bbb53
-
Filesize
12KB
MD5d68ad8358a830ba6ff0404074548f3ac
SHA10e234fcbfef29b629699f8c330cc05b9a4c421b5
SHA25610d565430bf866f5c9837d2c716d05b33aa318afa8dfd8a3a42b755df208db1e
SHA512bd2f56f9b43ebeb32a73f525b26dbc4d8b953d0a478dd772814bd65cff91e234d6bf067933c19bda8f7f8ef47ccb18649fc7253e1edb389f0c598eb10c14435a
-
Filesize
140KB
MD5c7138634f88944c4c5679b69de6b8a52
SHA163cb356fe0587ad282b86e4449c9d1feb3116607
SHA25686eabf77653304d01a79839ed3750ae1c1449c322ec67360ae4bf38d0922cba0
SHA512cce04453f05075ccb3a3c1d067c66e8ae359fd795f0166f7a5b00f270b2541b6fab539664eb18a21a57d13a5269587911a081769a95bff12a8933dc7a9f4381e
-
Filesize
140KB
MD5c7138634f88944c4c5679b69de6b8a52
SHA163cb356fe0587ad282b86e4449c9d1feb3116607
SHA25686eabf77653304d01a79839ed3750ae1c1449c322ec67360ae4bf38d0922cba0
SHA512cce04453f05075ccb3a3c1d067c66e8ae359fd795f0166f7a5b00f270b2541b6fab539664eb18a21a57d13a5269587911a081769a95bff12a8933dc7a9f4381e