Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe
Resource
win10v2004-20230824-en
General
-
Target
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe
-
Size
930KB
-
MD5
69d4b134b45ae8c32164982f0a0a0250
-
SHA1
a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa
-
SHA256
f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9
-
SHA512
da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24
-
SSDEEP
24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw
Malware Config
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023035-40.dat healer behavioral1/files/0x0007000000023035-41.dat healer behavioral1/memory/2524-42-0x0000000000500000-0x000000000050A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q4633353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q4633353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q4633353.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q4633353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q4633353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q4633353.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023033-50.dat family_redline behavioral1/files/0x0006000000023033-51.dat family_redline behavioral1/memory/5092-53-0x00000000009E0000-0x0000000000A10000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 1960 z6468234.exe 1988 z9662450.exe 1964 z6126497.exe 1824 z1703867.exe 2524 q4633353.exe 2424 r8501792.exe 5092 s6769305.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q4633353.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6126497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1703867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6468234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9662450.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7F713788-5259-47C8-A72E-A82C85242A60}.catalogItem svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2524 q4633353.exe 2524 q4633353.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 q4633353.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1960 1064 f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe 87 PID 1064 wrote to memory of 1960 1064 f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe 87 PID 1064 wrote to memory of 1960 1064 f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe 87 PID 1960 wrote to memory of 1988 1960 z6468234.exe 88 PID 1960 wrote to memory of 1988 1960 z6468234.exe 88 PID 1960 wrote to memory of 1988 1960 z6468234.exe 88 PID 1988 wrote to memory of 1964 1988 z9662450.exe 89 PID 1988 wrote to memory of 1964 1988 z9662450.exe 89 PID 1988 wrote to memory of 1964 1988 z9662450.exe 89 PID 1964 wrote to memory of 1824 1964 z6126497.exe 90 PID 1964 wrote to memory of 1824 1964 z6126497.exe 90 PID 1964 wrote to memory of 1824 1964 z6126497.exe 90 PID 1824 wrote to memory of 2524 1824 z1703867.exe 91 PID 1824 wrote to memory of 2524 1824 z1703867.exe 91 PID 1824 wrote to memory of 2424 1824 z1703867.exe 92 PID 1824 wrote to memory of 2424 1824 z1703867.exe 92 PID 1824 wrote to memory of 2424 1824 z1703867.exe 92 PID 1964 wrote to memory of 5092 1964 z6126497.exe 93 PID 1964 wrote to memory of 5092 1964 z6126497.exe 93 PID 1964 wrote to memory of 5092 1964 z6126497.exe 93
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:4368
-
C:\Users\Admin\AppData\Local\Temp\f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe"C:\Users\Admin\AppData\Local\Temp\f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exe6⤵
- Executes dropped EXE
PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exe5⤵
- Executes dropped EXE
PID:5092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD5d37f800b32300edf877b6fcc0408ce22
SHA12e835a866def53bb01c3bf4406f00bd7655322f2
SHA2568ae7635664e410f39666f717e55c62cbe37efdd39d962bdc8412041b54b84058
SHA512776e63d0ab7d57348a488810020388b9b4b753842de1defd4f891ae3cdc4b50bcb15b472119ea984f400daece9d029d2bab243dd7b2e501e721547472d122d0a
-
Filesize
824KB
MD5d37f800b32300edf877b6fcc0408ce22
SHA12e835a866def53bb01c3bf4406f00bd7655322f2
SHA2568ae7635664e410f39666f717e55c62cbe37efdd39d962bdc8412041b54b84058
SHA512776e63d0ab7d57348a488810020388b9b4b753842de1defd4f891ae3cdc4b50bcb15b472119ea984f400daece9d029d2bab243dd7b2e501e721547472d122d0a
-
Filesize
599KB
MD5430fe3b7964e72062f1594f6169f5996
SHA1f447b07e8fec806ee5d1ba1a22882f67bb546aa2
SHA256705f1b68af2796a6aa691c7f277853b60d949b9fdfd2c7d3f973743dab4951ef
SHA5120e2843ad3525b1da727d33131ab14ab17ea199dbdd694c985fda4c045e77e4156eb7c2b4fe57a6bab18087994d26d0c070984dbdada8779e3d7e9b4daeb29f1c
-
Filesize
599KB
MD5430fe3b7964e72062f1594f6169f5996
SHA1f447b07e8fec806ee5d1ba1a22882f67bb546aa2
SHA256705f1b68af2796a6aa691c7f277853b60d949b9fdfd2c7d3f973743dab4951ef
SHA5120e2843ad3525b1da727d33131ab14ab17ea199dbdd694c985fda4c045e77e4156eb7c2b4fe57a6bab18087994d26d0c070984dbdada8779e3d7e9b4daeb29f1c
-
Filesize
373KB
MD532972610848d7a00ce1515c51cb9cecb
SHA11a20b3acfd815062c90077f0386fa5066fd8867f
SHA2564e9d3521223d0f12dbe68f514ffee86257f75cecac990e2cf05bd92668b1bd1d
SHA5124d22d1edbec1932975970849caea7eb79c1f2fa6e42f75ab9a6c44643e9730a27ce09a772eb6fc066501155e1a2086b5c3117af0ecb75306970edfa597983ced
-
Filesize
373KB
MD532972610848d7a00ce1515c51cb9cecb
SHA11a20b3acfd815062c90077f0386fa5066fd8867f
SHA2564e9d3521223d0f12dbe68f514ffee86257f75cecac990e2cf05bd92668b1bd1d
SHA5124d22d1edbec1932975970849caea7eb79c1f2fa6e42f75ab9a6c44643e9730a27ce09a772eb6fc066501155e1a2086b5c3117af0ecb75306970edfa597983ced
-
Filesize
173KB
MD59cd4c778e89290f473d51c11947d97c9
SHA160b7f2759cf01a0042684040adc5b232013fe6c8
SHA256a2944bc5de67986dca5d3f114b57d89ade306e1947a0840241ed6d9d756e6969
SHA51295a695f4d8c6e7a58b37f2a2ec123439a9d9854f956b4f934c92d6ceacc6e00608a7e4d60fef1d7769dfa88d2126df4d0e736e47e0d48bff667764da47313cee
-
Filesize
173KB
MD59cd4c778e89290f473d51c11947d97c9
SHA160b7f2759cf01a0042684040adc5b232013fe6c8
SHA256a2944bc5de67986dca5d3f114b57d89ade306e1947a0840241ed6d9d756e6969
SHA51295a695f4d8c6e7a58b37f2a2ec123439a9d9854f956b4f934c92d6ceacc6e00608a7e4d60fef1d7769dfa88d2126df4d0e736e47e0d48bff667764da47313cee
-
Filesize
217KB
MD585518164760ba147a4dd09b4c4011fd7
SHA1e5e08e2ed28e7966931d4c069e0e73b830244a23
SHA256772797bc05db3a299e407d6944dc481b565c97088e5fe2320e90f5b333159287
SHA512f0623e2f1b06aed180972304c0388a568459cbc95806790bae77a4c12b1f0b1f21a688d7fd6ca19ac011eec544a5beb89d5cf22f836e3385b502e33c199b40dd
-
Filesize
217KB
MD585518164760ba147a4dd09b4c4011fd7
SHA1e5e08e2ed28e7966931d4c069e0e73b830244a23
SHA256772797bc05db3a299e407d6944dc481b565c97088e5fe2320e90f5b333159287
SHA512f0623e2f1b06aed180972304c0388a568459cbc95806790bae77a4c12b1f0b1f21a688d7fd6ca19ac011eec544a5beb89d5cf22f836e3385b502e33c199b40dd
-
Filesize
15KB
MD524ef40c91bcac69546c630b0f2326b85
SHA1deaea8f10a57eec9b0bacc40502f568ef2a78463
SHA256615294e14994d620b91c73870bc3e08d500b1beeca8a8e7265da4656e728ce16
SHA5122aca6ed6754d4c9b4df6accce2f0129d043359e752ac578d549becb69a7ca82be0392a2b9eab071bcaf518fb480d046cf3e0a5f40c768b4be18ee112b0343c98
-
Filesize
15KB
MD524ef40c91bcac69546c630b0f2326b85
SHA1deaea8f10a57eec9b0bacc40502f568ef2a78463
SHA256615294e14994d620b91c73870bc3e08d500b1beeca8a8e7265da4656e728ce16
SHA5122aca6ed6754d4c9b4df6accce2f0129d043359e752ac578d549becb69a7ca82be0392a2b9eab071bcaf518fb480d046cf3e0a5f40c768b4be18ee112b0343c98
-
Filesize
140KB
MD5da1525d8beb1918972eac5008d878415
SHA1dc3078bd3d358fc73d7f40d4ec5c6e24a47b700e
SHA256e707a5f88b54f3f55a4c7c150143d2d62846607b11c0660b75108ffdaa9b69fe
SHA5128f4850631ef586863d146d6d63ee17eaed23497e352d1837ecdb8b66b6bd5ff6c94431614f9f1e500d65f3d60def0d0fa3909e082d9ca31898c5b06065d32398
-
Filesize
140KB
MD5da1525d8beb1918972eac5008d878415
SHA1dc3078bd3d358fc73d7f40d4ec5c6e24a47b700e
SHA256e707a5f88b54f3f55a4c7c150143d2d62846607b11c0660b75108ffdaa9b69fe
SHA5128f4850631ef586863d146d6d63ee17eaed23497e352d1837ecdb8b66b6bd5ff6c94431614f9f1e500d65f3d60def0d0fa3909e082d9ca31898c5b06065d32398