Analysis
-
max time kernel
276s -
max time network
289s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
z2848072.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
z2848072.exe
Resource
win10-20230703-en
General
-
Target
z2848072.exe
-
Size
823KB
-
MD5
c89579e86bf769c30020b945ae869655
-
SHA1
19217e389889053badeabf86ee1a736cb19ad639
-
SHA256
80149ad920d25b8d0ada7da35e3d8b08c9b56e64b23e8cb5bf4539c31017800a
-
SHA512
3c0d01a3b673735906202d92cc74d0dacc3647642a37e3d8d4841b46f59730e25bdeb8ee5fbf42d1ed057c23b106bc73062b7af82d459feec58703001d9a07ac
-
SSDEEP
24576:gyhs6ofNJ9Zf0FqhhzUzThf1lXJR+4PK4HB037m6F:nniNJL8Fq1UjhJI34HB03t
Malware Config
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x0007000000016c9f-34.dat healer behavioral1/files/0x0007000000016c9f-36.dat healer behavioral1/files/0x0007000000016c9f-37.dat healer behavioral1/memory/2864-38-0x0000000000A70000-0x0000000000A7A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q1851358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q1851358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q1851358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q1851358.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q1851358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q1851358.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1928 z2912421.exe 2548 z6488620.exe 2980 z0256963.exe 2864 q1851358.exe 3032 r0291608.exe 2740 s9187945.exe -
Loads dropped DLL 11 IoCs
pid Process 3036 z2848072.exe 1928 z2912421.exe 1928 z2912421.exe 2548 z6488620.exe 2548 z6488620.exe 2980 z0256963.exe 2980 z0256963.exe 2980 z0256963.exe 3032 r0291608.exe 2548 z6488620.exe 2740 s9187945.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features q1851358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q1851358.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z2848072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2912421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6488620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0256963.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 q1851358.exe 2864 q1851358.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 q1851358.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 3036 wrote to memory of 1928 3036 z2848072.exe 28 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 1928 wrote to memory of 2548 1928 z2912421.exe 29 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2548 wrote to memory of 2980 2548 z6488620.exe 30 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 2864 2980 z0256963.exe 31 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2980 wrote to memory of 3032 2980 z0256963.exe 32 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34 PID 2548 wrote to memory of 2740 2548 z6488620.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\z2848072.exe"C:\Users\Admin\AppData\Local\Temp\z2848072.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2912421.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6488620.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0256963.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1851358.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0291608.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9187945.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597KB
MD5e1f43db045463b855af2a6dbc8b78590
SHA177fccecaef7be5f29c59271692e1a3c26d523fc5
SHA2566ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9
SHA51230f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2
-
Filesize
597KB
MD5e1f43db045463b855af2a6dbc8b78590
SHA177fccecaef7be5f29c59271692e1a3c26d523fc5
SHA2566ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9
SHA51230f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2
-
Filesize
372KB
MD572166ac91123af2e679e1ddbcbe0280c
SHA16bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7
SHA256ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7
SHA51274aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45
-
Filesize
372KB
MD572166ac91123af2e679e1ddbcbe0280c
SHA16bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7
SHA256ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7
SHA51274aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45
-
Filesize
174KB
MD50b720dcaf7800886484a5653ab3d3b0b
SHA171dc69bdf5904ddefdf7cfc4730969ed088ec126
SHA256d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61
SHA51205e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9
-
Filesize
174KB
MD50b720dcaf7800886484a5653ab3d3b0b
SHA171dc69bdf5904ddefdf7cfc4730969ed088ec126
SHA256d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61
SHA51205e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9
-
Filesize
217KB
MD5536fdd473974df3d4a0ca6e8d07ca08b
SHA1e59eb3a0b56ae4042576414d057de40ea8f67d94
SHA25670ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5
SHA5121ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc
-
Filesize
217KB
MD5536fdd473974df3d4a0ca6e8d07ca08b
SHA1e59eb3a0b56ae4042576414d057de40ea8f67d94
SHA25670ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5
SHA5121ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc
-
Filesize
14KB
MD52b33dc9f94f0ff1f1a2b4ec50ceddbf5
SHA12c154597c5696c4a493271eaeb6dcf714b256a79
SHA25632aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2
SHA5129e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189
-
Filesize
14KB
MD52b33dc9f94f0ff1f1a2b4ec50ceddbf5
SHA12c154597c5696c4a493271eaeb6dcf714b256a79
SHA25632aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2
SHA5129e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189
-
Filesize
140KB
MD593bdbd71164f3aba04fae02d98e7048a
SHA1c7ac3a250814491caa55108ec68f571008dd8a73
SHA2561c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d
SHA51253434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4
-
Filesize
140KB
MD593bdbd71164f3aba04fae02d98e7048a
SHA1c7ac3a250814491caa55108ec68f571008dd8a73
SHA2561c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d
SHA51253434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4
-
Filesize
597KB
MD5e1f43db045463b855af2a6dbc8b78590
SHA177fccecaef7be5f29c59271692e1a3c26d523fc5
SHA2566ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9
SHA51230f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2
-
Filesize
597KB
MD5e1f43db045463b855af2a6dbc8b78590
SHA177fccecaef7be5f29c59271692e1a3c26d523fc5
SHA2566ca12fd94eab02dd88f03c13408bf9eb57f576745079a3d17e3730808dc131f9
SHA51230f03a6c4c70d8af9c8c37ed40c707db75605efa3a82ace60c46e5a128379f50b1146e487f741fdd85061349585e4a603df46c0cfd71a329668e465f96ec38a2
-
Filesize
372KB
MD572166ac91123af2e679e1ddbcbe0280c
SHA16bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7
SHA256ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7
SHA51274aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45
-
Filesize
372KB
MD572166ac91123af2e679e1ddbcbe0280c
SHA16bc7f1d1b5d37ca9f5b6b51c37f87b2eca2e24f7
SHA256ed5cc0c3008877f9ddca890fb87f631c91fd6db69249c023fddf89e7a30a67e7
SHA51274aaf2f1d6121517ec1363796f8fd31b1ea81575789c3005c535784886e08b7fbc11b15e2ebc4cbda1880032b879a176dea11c95e2a6923d628d60453c32fb45
-
Filesize
174KB
MD50b720dcaf7800886484a5653ab3d3b0b
SHA171dc69bdf5904ddefdf7cfc4730969ed088ec126
SHA256d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61
SHA51205e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9
-
Filesize
174KB
MD50b720dcaf7800886484a5653ab3d3b0b
SHA171dc69bdf5904ddefdf7cfc4730969ed088ec126
SHA256d33dd57a407234380eb3e83bd61be94840c24cac4aa27b84d9d1ce1e56f5df61
SHA51205e17fe9cb69da689bb3e7cf2b82798fb167ed622c55f86369b08103829cf9134fb91ebfa65d325e680c1caa4bd970c29edee9f629bad0d2cf3ec6ac0b3d83d9
-
Filesize
217KB
MD5536fdd473974df3d4a0ca6e8d07ca08b
SHA1e59eb3a0b56ae4042576414d057de40ea8f67d94
SHA25670ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5
SHA5121ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc
-
Filesize
217KB
MD5536fdd473974df3d4a0ca6e8d07ca08b
SHA1e59eb3a0b56ae4042576414d057de40ea8f67d94
SHA25670ef9254eb80d5f844d46f023b76bc186c8ec7e74fde33a67c059079b844adb5
SHA5121ef2514f8135e45ee7e8380dc1b29d028b62d104cd5582a42f30f1ae8cb78989883d1a7e2762187b52893512cf03b78a4f7a73581ba228384f038caeec082bcc
-
Filesize
14KB
MD52b33dc9f94f0ff1f1a2b4ec50ceddbf5
SHA12c154597c5696c4a493271eaeb6dcf714b256a79
SHA25632aa2648cc29a5aa6abce6fc9203434ac5b772b7f7f2a1a725a82dc2b0d79aa2
SHA5129e60fe795628173828490c721f52b3ff186e69383958f5671a6b9985c6ebcfc623d959d46403c5a98455257cb6140e28ceca2f99af331ca20809b54e08292189
-
Filesize
140KB
MD593bdbd71164f3aba04fae02d98e7048a
SHA1c7ac3a250814491caa55108ec68f571008dd8a73
SHA2561c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d
SHA51253434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4
-
Filesize
140KB
MD593bdbd71164f3aba04fae02d98e7048a
SHA1c7ac3a250814491caa55108ec68f571008dd8a73
SHA2561c9a430e89c03746ae76d53659f8875aa13afaf7bccb15ddd0050443677f655d
SHA51253434dbeba3c0ea161a151ed25ea8a6dc4a92fd3692235d8e993e912f09f5e2aaff8a276ab9daf9c15cecceece592614d401caa1ee99b3bdc23d61b32d266be4