Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe
Resource
win10v2004-20230703-en
General
-
Target
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe
-
Size
829KB
-
MD5
a82a8ffef07b6ba5fcb6e278febe13ab
-
SHA1
d7dfc78d760b93114550deb4b1f142bcace6bf23
-
SHA256
00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5
-
SHA512
b86fbf1cbf0ca6b3abd2ed9bd3db4b55bd9486484a82aa71e71d023d8675378b559eecb0ae6845a2cdc1c21b77086d56a163dcd535f145f17ea57eab2258c6a6
-
SSDEEP
12288:2MrWy90R8g7RMrzXq5HKlEPwo+ia6iAjgLDnV6V2JKEILGy9fhsD1T2bBi:kyA8+ISHYEPA6ifnVK1RDs5T2b0
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0009000000023223-33.dat healer behavioral1/files/0x0009000000023223-34.dat healer behavioral1/memory/3284-35-0x0000000000160000-0x000000000016A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5350953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5350953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5350953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5350953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5350953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5350953.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023220-43.dat family_redline behavioral1/files/0x0007000000023220-44.dat family_redline behavioral1/memory/4352-45-0x00000000001E0000-0x0000000000210000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4828 v4734304.exe 1468 v7976179.exe 4896 v5755344.exe 4472 v8686218.exe 3284 a5350953.exe 1432 b8967596.exe 4352 c6220824.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5350953.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8686218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4734304.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7976179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5755344.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3284 a5350953.exe 3284 a5350953.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3284 a5350953.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4828 1520 00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe 82 PID 1520 wrote to memory of 4828 1520 00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe 82 PID 1520 wrote to memory of 4828 1520 00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe 82 PID 4828 wrote to memory of 1468 4828 v4734304.exe 83 PID 4828 wrote to memory of 1468 4828 v4734304.exe 83 PID 4828 wrote to memory of 1468 4828 v4734304.exe 83 PID 1468 wrote to memory of 4896 1468 v7976179.exe 84 PID 1468 wrote to memory of 4896 1468 v7976179.exe 84 PID 1468 wrote to memory of 4896 1468 v7976179.exe 84 PID 4896 wrote to memory of 4472 4896 v5755344.exe 85 PID 4896 wrote to memory of 4472 4896 v5755344.exe 85 PID 4896 wrote to memory of 4472 4896 v5755344.exe 85 PID 4472 wrote to memory of 3284 4472 v8686218.exe 86 PID 4472 wrote to memory of 3284 4472 v8686218.exe 86 PID 4472 wrote to memory of 1432 4472 v8686218.exe 95 PID 4472 wrote to memory of 1432 4472 v8686218.exe 95 PID 4472 wrote to memory of 1432 4472 v8686218.exe 95 PID 4896 wrote to memory of 4352 4896 v5755344.exe 96 PID 4896 wrote to memory of 4352 4896 v5755344.exe 96 PID 4896 wrote to memory of 4352 4896 v5755344.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe"C:\Users\Admin\AppData\Local\Temp\00ae6f70be288d72545360b749c0b7496aba245886d8c4e4b8993a923a82d2e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4734304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4734304.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7976179.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7976179.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5755344.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5755344.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8686218.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8686218.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5350953.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5350953.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8967596.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8967596.exe6⤵
- Executes dropped EXE
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6220824.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6220824.exe5⤵
- Executes dropped EXE
PID:4352
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD594b2ee67d00de5f5470f7b83ec0107e6
SHA13f6358060abb32f8cf10cc2b6a4773d77c1828d2
SHA2563783f83f4a3be94d8d2e228cbf3a5565d31edc01b96df3edaa71b1886bca421c
SHA51275c18531b09659d2bdd19d1bf60768c536fa9bed9efb48e5b23e09bfc4905418ca2afd9ce6857d6e8aba45b62503104eff43285b29e339330ab9407418502a1c
-
Filesize
723KB
MD594b2ee67d00de5f5470f7b83ec0107e6
SHA13f6358060abb32f8cf10cc2b6a4773d77c1828d2
SHA2563783f83f4a3be94d8d2e228cbf3a5565d31edc01b96df3edaa71b1886bca421c
SHA51275c18531b09659d2bdd19d1bf60768c536fa9bed9efb48e5b23e09bfc4905418ca2afd9ce6857d6e8aba45b62503104eff43285b29e339330ab9407418502a1c
-
Filesize
497KB
MD54e18d2f0c2b7d2992071d11c28c35c10
SHA197bdb02a93efcecdf49b8764d1eb7f297b834d4e
SHA25657ff470a9b0d1d7ab71afee5be4eb5dedf4bc3f7ee9090864db21004676b741a
SHA512a22d85c90b72d964cc34672d0691d4f8e7931287d0c87296247b3ce0551fb63c7e2eb0e8bd0035bbaa5625a284b10c574efef96825db43bdc972d4ca008afc74
-
Filesize
497KB
MD54e18d2f0c2b7d2992071d11c28c35c10
SHA197bdb02a93efcecdf49b8764d1eb7f297b834d4e
SHA25657ff470a9b0d1d7ab71afee5be4eb5dedf4bc3f7ee9090864db21004676b741a
SHA512a22d85c90b72d964cc34672d0691d4f8e7931287d0c87296247b3ce0551fb63c7e2eb0e8bd0035bbaa5625a284b10c574efef96825db43bdc972d4ca008afc74
-
Filesize
372KB
MD552c143695dd0b8fac6fe0d125a83796f
SHA11f30cd539a330144c897845b7143cec457b58bd2
SHA256437aa8152047c44b2a45535bceebaa4c889454d8eadc7464e8c6b911fc9a8e6b
SHA5125579066acbca5492c0b10d347ff6ec6f0a21bfbf9ccaefe690f8e529c61c374867f45a9d4e6cefd7265848b8f187194e8783df4a35cdec360b50e47a20e7c2fc
-
Filesize
372KB
MD552c143695dd0b8fac6fe0d125a83796f
SHA11f30cd539a330144c897845b7143cec457b58bd2
SHA256437aa8152047c44b2a45535bceebaa4c889454d8eadc7464e8c6b911fc9a8e6b
SHA5125579066acbca5492c0b10d347ff6ec6f0a21bfbf9ccaefe690f8e529c61c374867f45a9d4e6cefd7265848b8f187194e8783df4a35cdec360b50e47a20e7c2fc
-
Filesize
173KB
MD5e78c834502aa3e5fdc6ac9a9c3e99ba8
SHA1713e67aea1e3748bcbddc45a57474511113106a7
SHA256bb0ef1004a57eba48a6a5304f3130db9a92381a4df501cfb2c8a7436dbcfbfbd
SHA512993e8e2058e3172551e54eb542e6e624d272b7f6842086033106a45afbe2d0a3842a23aec9278a63f29f9a1788204ffe27a77b6c00cd338399c0a23b63638eda
-
Filesize
173KB
MD5e78c834502aa3e5fdc6ac9a9c3e99ba8
SHA1713e67aea1e3748bcbddc45a57474511113106a7
SHA256bb0ef1004a57eba48a6a5304f3130db9a92381a4df501cfb2c8a7436dbcfbfbd
SHA512993e8e2058e3172551e54eb542e6e624d272b7f6842086033106a45afbe2d0a3842a23aec9278a63f29f9a1788204ffe27a77b6c00cd338399c0a23b63638eda
-
Filesize
217KB
MD5461c91a1f850f6da632991f260120552
SHA1c5090cd11c29e7811d01935e6749cce70f8a2c3c
SHA25661b31b0132b67c0463b66311041d1e3b41b55017b5630b2b92793449c7a9333e
SHA51282d2814a3a3fe5c81cce4a451e5f104783c7a311a285d044af4689531c3b0eb4c6abb6251709943052eb8b64913bdfb4caee8396821cfc97789b62da53c0bccb
-
Filesize
217KB
MD5461c91a1f850f6da632991f260120552
SHA1c5090cd11c29e7811d01935e6749cce70f8a2c3c
SHA25661b31b0132b67c0463b66311041d1e3b41b55017b5630b2b92793449c7a9333e
SHA51282d2814a3a3fe5c81cce4a451e5f104783c7a311a285d044af4689531c3b0eb4c6abb6251709943052eb8b64913bdfb4caee8396821cfc97789b62da53c0bccb
-
Filesize
15KB
MD53e0b1463577175c8223d513b595e4e48
SHA11272b3d3eeb5564986bc4ca908ef51d4406d0849
SHA2564b0a53914b6377ab5fa070228e99a1a07806e32626cc018121efb854ef2ddc05
SHA5120777b408290ca7d6b6d2bbde23fa32d32dbdf13a4c98266f922ab0a9bc25206d586cb25e65c0bc33d685881d7e11c45de81e803dc221bc73518124a524fcf2ea
-
Filesize
15KB
MD53e0b1463577175c8223d513b595e4e48
SHA11272b3d3eeb5564986bc4ca908ef51d4406d0849
SHA2564b0a53914b6377ab5fa070228e99a1a07806e32626cc018121efb854ef2ddc05
SHA5120777b408290ca7d6b6d2bbde23fa32d32dbdf13a4c98266f922ab0a9bc25206d586cb25e65c0bc33d685881d7e11c45de81e803dc221bc73518124a524fcf2ea
-
Filesize
140KB
MD5a235645655f2fa7efe6b421c605ebb24
SHA1c39063abbc2136fe966f463862b354729382aeac
SHA2566f603066644e6415d605f7feb983dbec1d4d0b5aa523df945c6cacc8265640ba
SHA512cd3c6c3ecaba4564159ed12048489f588be2495397a9aa7c6169822651bc1e7770639e42a6e9da7e50d1819177155b9de05e919177fcdd2c4130aee4e2d4e830
-
Filesize
140KB
MD5a235645655f2fa7efe6b421c605ebb24
SHA1c39063abbc2136fe966f463862b354729382aeac
SHA2566f603066644e6415d605f7feb983dbec1d4d0b5aa523df945c6cacc8265640ba
SHA512cd3c6c3ecaba4564159ed12048489f588be2495397a9aa7c6169822651bc1e7770639e42a6e9da7e50d1819177155b9de05e919177fcdd2c4130aee4e2d4e830