Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27-08-2023 09:41
Static task
static1
Behavioral task
behavioral1
Sample
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe
Resource
win10-20230703-en
General
-
Target
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe
-
Size
825KB
-
MD5
2b7c2817d7034f340bc53372b7664f3d
-
SHA1
fcd32b289fb7307df1a21ded630d46974e6430e3
-
SHA256
0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37
-
SHA512
5dc1a9ca4fbb0c1f6b4ffb9bcd8e0874cd1760f067542b1df9044387a1454302c7cd46816dd7b9fc3f84febe9601053d73af822f59ec298db88f7b37eadc13ba
-
SSDEEP
12288:jMrMy90EpVroyDEOkBDVIyRJ55ECb/qJETRaydkBKH/LE59lgKTqJG7:7yjpuyDEO6DlUe/qedkUqso
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afd6-33.dat healer behavioral1/files/0x000700000001afd6-34.dat healer behavioral1/memory/2500-35-0x00000000009E0000-0x00000000009EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5512686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5512686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5512686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5512686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5512686.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001afd4-43.dat family_redline behavioral1/files/0x000600000001afd4-44.dat family_redline behavioral1/memory/2104-45-0x0000000000BC0000-0x0000000000BF0000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 3676 v0095841.exe 4164 v8523941.exe 4152 v5446918.exe 3096 v0622857.exe 2500 a5512686.exe 2452 b1579028.exe 2104 c7730462.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5512686.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0095841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8523941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5446918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0622857.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 a5512686.exe 2500 a5512686.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2500 a5512686.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3676 4936 0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe 70 PID 4936 wrote to memory of 3676 4936 0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe 70 PID 4936 wrote to memory of 3676 4936 0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe 70 PID 3676 wrote to memory of 4164 3676 v0095841.exe 71 PID 3676 wrote to memory of 4164 3676 v0095841.exe 71 PID 3676 wrote to memory of 4164 3676 v0095841.exe 71 PID 4164 wrote to memory of 4152 4164 v8523941.exe 72 PID 4164 wrote to memory of 4152 4164 v8523941.exe 72 PID 4164 wrote to memory of 4152 4164 v8523941.exe 72 PID 4152 wrote to memory of 3096 4152 v5446918.exe 73 PID 4152 wrote to memory of 3096 4152 v5446918.exe 73 PID 4152 wrote to memory of 3096 4152 v5446918.exe 73 PID 3096 wrote to memory of 2500 3096 v0622857.exe 74 PID 3096 wrote to memory of 2500 3096 v0622857.exe 74 PID 3096 wrote to memory of 2452 3096 v0622857.exe 75 PID 3096 wrote to memory of 2452 3096 v0622857.exe 75 PID 3096 wrote to memory of 2452 3096 v0622857.exe 75 PID 4152 wrote to memory of 2104 4152 v5446918.exe 76 PID 4152 wrote to memory of 2104 4152 v5446918.exe 76 PID 4152 wrote to memory of 2104 4152 v5446918.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe"C:\Users\Admin\AppData\Local\Temp\0f11340789ea01aef686a3c03f6a1760c0ee7c4871ee4a18e8aa9873181e5b37.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0095841.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0095841.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8523941.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8523941.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5446918.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5446918.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0622857.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0622857.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5512686.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5512686.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1579028.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1579028.exe6⤵
- Executes dropped EXE
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7730462.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7730462.exe5⤵
- Executes dropped EXE
PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD5380527ef11f9a991e0785063305de45b
SHA19d71e4c10e1e50ccbe43574017e3f1ac1bf400ad
SHA256c96a1c98b289b7eac4443d95fc00416424575d4c578f923dd6052960b77e0167
SHA51256cd83be8df0c31dce9d8363f60a0c588fbc29254a4256cfa03bc52fd2c6015531aaf5c43eafdf0322ae2e6ce768f198f92f32c91e7629055d77fe4d99eed02d
-
Filesize
720KB
MD5380527ef11f9a991e0785063305de45b
SHA19d71e4c10e1e50ccbe43574017e3f1ac1bf400ad
SHA256c96a1c98b289b7eac4443d95fc00416424575d4c578f923dd6052960b77e0167
SHA51256cd83be8df0c31dce9d8363f60a0c588fbc29254a4256cfa03bc52fd2c6015531aaf5c43eafdf0322ae2e6ce768f198f92f32c91e7629055d77fe4d99eed02d
-
Filesize
497KB
MD55d665b86b4f16611d44a80597682cf29
SHA1a378787b8a8ec8a0529222cfa014ba907e0128b1
SHA256ff64d87c99d979762dcf9dc6dc630b53c1c0f8e2e5fa37133dd60f50f55014a9
SHA5123f45abbff46c6b89b7d67a92a57e7ec4447d587d3562b7efde2eccb874f3fa41ac6212bfee03337b35997109b80905f3423693e211f32007ba04534ca7187dfe
-
Filesize
497KB
MD55d665b86b4f16611d44a80597682cf29
SHA1a378787b8a8ec8a0529222cfa014ba907e0128b1
SHA256ff64d87c99d979762dcf9dc6dc630b53c1c0f8e2e5fa37133dd60f50f55014a9
SHA5123f45abbff46c6b89b7d67a92a57e7ec4447d587d3562b7efde2eccb874f3fa41ac6212bfee03337b35997109b80905f3423693e211f32007ba04534ca7187dfe
-
Filesize
372KB
MD58dafb63512c7961736783b79ee017d67
SHA1c8da94c8075d68f6207ddbb69d92ead458fadeaf
SHA25607005cc59012f59b334e101d556d4adcc55f885c4feb5c26319574057c2c6b67
SHA512395ee7df22dca90a2ce24999fd5cc65f2e7d4c4bec026c658940000d520aae0a6233dbaedb176b5a6d9c21fc4124af1b4c9a86d8acf3c39538900cd30d784ee9
-
Filesize
372KB
MD58dafb63512c7961736783b79ee017d67
SHA1c8da94c8075d68f6207ddbb69d92ead458fadeaf
SHA25607005cc59012f59b334e101d556d4adcc55f885c4feb5c26319574057c2c6b67
SHA512395ee7df22dca90a2ce24999fd5cc65f2e7d4c4bec026c658940000d520aae0a6233dbaedb176b5a6d9c21fc4124af1b4c9a86d8acf3c39538900cd30d784ee9
-
Filesize
173KB
MD53b2fc6c0ae4552d60fed423d208f09fc
SHA15490af3c6ef5fb2fcbf44c6649458837180be32f
SHA2566f35fb24b416016e2e036cde81ec758974918386f53c81874ce1086e14a3315b
SHA5128905af33804fb62c30c856b6e49f51877937c5fa1239a565803092e4377973070e53e31d32856369dafa517fbb0469887c9129f09e3ee529395951a1dd407949
-
Filesize
173KB
MD53b2fc6c0ae4552d60fed423d208f09fc
SHA15490af3c6ef5fb2fcbf44c6649458837180be32f
SHA2566f35fb24b416016e2e036cde81ec758974918386f53c81874ce1086e14a3315b
SHA5128905af33804fb62c30c856b6e49f51877937c5fa1239a565803092e4377973070e53e31d32856369dafa517fbb0469887c9129f09e3ee529395951a1dd407949
-
Filesize
217KB
MD55172c5b08b2cc986083a50600e624c32
SHA166a473e908dbfebeb841cac56fe1f79716d753b3
SHA25620d796ffd9b87af241021e346863a5eceb0eac8053e368584cd6bc1017e117b8
SHA5125061bff876d3a95745e690a81028fce56c18b6551cc24214c10a51855a3c7d909ead889ffe9aae5bbd9d8d31da21b54f221838bf46136144cfcdd0f59abd6fe1
-
Filesize
217KB
MD55172c5b08b2cc986083a50600e624c32
SHA166a473e908dbfebeb841cac56fe1f79716d753b3
SHA25620d796ffd9b87af241021e346863a5eceb0eac8053e368584cd6bc1017e117b8
SHA5125061bff876d3a95745e690a81028fce56c18b6551cc24214c10a51855a3c7d909ead889ffe9aae5bbd9d8d31da21b54f221838bf46136144cfcdd0f59abd6fe1
-
Filesize
15KB
MD544b823d259663278cd7f040ff89d76d4
SHA1270208ff7e0ab6d988ceb0a83aa8306124f970cf
SHA256ca44f43058fe6042684cef04fd066e50f9e97ec8124e3ffc63180d3603362045
SHA512c9d67dae3f2aaa555739e0b88dc4c15b12a6adf763e4b25800e54699b1bf643e4000e56cad4717e5e21c11c749016cfd14add1837a6d51e50a5564a616dfd649
-
Filesize
15KB
MD544b823d259663278cd7f040ff89d76d4
SHA1270208ff7e0ab6d988ceb0a83aa8306124f970cf
SHA256ca44f43058fe6042684cef04fd066e50f9e97ec8124e3ffc63180d3603362045
SHA512c9d67dae3f2aaa555739e0b88dc4c15b12a6adf763e4b25800e54699b1bf643e4000e56cad4717e5e21c11c749016cfd14add1837a6d51e50a5564a616dfd649
-
Filesize
140KB
MD5b0cd89f095f570751764f9fe7dd86ae3
SHA1101125d951640d8f08f5e380b7b8c3ce8030a7f5
SHA2566f7738f0e315d6ae38dc852f5258bf6e656bfbb9f01c6c0a0b9836e6356a5371
SHA512705181acd062028cc1d772f4448872e3c6af824244aed400715b5892efa4a282ee1ba17874ff736e0419fff76d8025c5e00036968fc3b355f1021000006315ac
-
Filesize
140KB
MD5b0cd89f095f570751764f9fe7dd86ae3
SHA1101125d951640d8f08f5e380b7b8c3ce8030a7f5
SHA2566f7738f0e315d6ae38dc852f5258bf6e656bfbb9f01c6c0a0b9836e6356a5371
SHA512705181acd062028cc1d772f4448872e3c6af824244aed400715b5892efa4a282ee1ba17874ff736e0419fff76d8025c5e00036968fc3b355f1021000006315ac