Analysis
-
max time kernel
278s -
max time network
291s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28-08-2023 04:37
Static task
static1
Behavioral task
behavioral1
Sample
z3355895.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
z3355895.exe
Resource
win10-20230703-en
General
-
Target
z3355895.exe
-
Size
823KB
-
MD5
6b33e28f85c1eb0363dcf90ffcede676
-
SHA1
273da6f53b2debc200410fac12042534e3c10892
-
SHA256
b0217a3d624c058f1cacc3dd5eb21f69e8aee7ccf7615d9943abc6184b349955
-
SHA512
c4f1a62039331e0986ebd6ea464aeb671d5e5774811290960e436025dccc8ab5c1a7ccd28b63a158388d04c5536107d3f272b149759ad38fef6a9a21454dc40d
-
SSDEEP
12288:XMrMy90tb2Fx7X2mZYIYQHfZpwswR7A4kWPI7m51cnLUIXQ9xo8HGWU2Uxh4lpF0:7yS2F8mqIYw/wswFZZPIisU8Q3mWXt0
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x00060000000195a5-34.dat healer behavioral1/files/0x00060000000195a5-36.dat healer behavioral1/files/0x00060000000195a5-37.dat healer behavioral1/memory/392-38-0x0000000000D40000-0x0000000000D4A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q1692333.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1060 z9005121.exe 2128 z9903491.exe 816 z0229822.exe 392 q1692333.exe 2820 r5312698.exe 3032 s9173115.exe -
Loads dropped DLL 11 IoCs
pid Process 1944 z3355895.exe 1060 z9005121.exe 1060 z9005121.exe 2128 z9903491.exe 2128 z9903491.exe 816 z0229822.exe 816 z0229822.exe 816 z0229822.exe 2820 r5312698.exe 2128 z9903491.exe 3032 s9173115.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features q1692333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q1692333.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z3355895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9005121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9903491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0229822.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 392 q1692333.exe 392 q1692333.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 392 q1692333.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1944 wrote to memory of 1060 1944 z3355895.exe 28 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 1060 wrote to memory of 2128 1060 z9005121.exe 29 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 2128 wrote to memory of 816 2128 z9903491.exe 30 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 392 816 z0229822.exe 31 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 816 wrote to memory of 2820 816 z0229822.exe 32 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35 PID 2128 wrote to memory of 3032 2128 z9903491.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\z3355895.exe"C:\Users\Admin\AppData\Local\Temp\z3355895.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9005121.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9903491.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0229822.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1692333.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5312698.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s9173115.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD52a73ee718b6a2fc1f7e7a97be01851e0
SHA1331bba485ae0590cd17654bb55100a6c653fa8bf
SHA256af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252
SHA512aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a
-
Filesize
598KB
MD52a73ee718b6a2fc1f7e7a97be01851e0
SHA1331bba485ae0590cd17654bb55100a6c653fa8bf
SHA256af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252
SHA512aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a
-
Filesize
372KB
MD537f31c1bd8a007f9c340cee0a36a1978
SHA1ada78da7ac57ffe73d348ca9c6e18e58e2283174
SHA2569b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553
SHA512c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b
-
Filesize
372KB
MD537f31c1bd8a007f9c340cee0a36a1978
SHA1ada78da7ac57ffe73d348ca9c6e18e58e2283174
SHA2569b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553
SHA512c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b
-
Filesize
174KB
MD5bf1fbc78b555e851ad5e87bd6b6d39f1
SHA150f9aa3e1e3db16d10f92558e4385a6a8e6aa12b
SHA2562ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e
SHA51200f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791
-
Filesize
174KB
MD5bf1fbc78b555e851ad5e87bd6b6d39f1
SHA150f9aa3e1e3db16d10f92558e4385a6a8e6aa12b
SHA2562ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e
SHA51200f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791
-
Filesize
217KB
MD5d3fb0d6ac1c25081e49f59f67bbbe749
SHA1f24a1ad77a695800c99c41c36fac9743e314b84c
SHA25615955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4
SHA51225b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a
-
Filesize
217KB
MD5d3fb0d6ac1c25081e49f59f67bbbe749
SHA1f24a1ad77a695800c99c41c36fac9743e314b84c
SHA25615955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4
SHA51225b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a
-
Filesize
15KB
MD5932b2ddaf63311f7c4b619c6bf0fe403
SHA11ee3a38dbb776a5e95855cafd66977cc3b073261
SHA2568d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3
SHA5124939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654
-
Filesize
15KB
MD5932b2ddaf63311f7c4b619c6bf0fe403
SHA11ee3a38dbb776a5e95855cafd66977cc3b073261
SHA2568d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3
SHA5124939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654
-
Filesize
140KB
MD59bb9dd7aef5faa22ea475689e40d2b95
SHA119fa7b88ea00b3506e853b49ebf0c2f394322758
SHA25655775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5
SHA5125639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999
-
Filesize
140KB
MD59bb9dd7aef5faa22ea475689e40d2b95
SHA119fa7b88ea00b3506e853b49ebf0c2f394322758
SHA25655775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5
SHA5125639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999
-
Filesize
598KB
MD52a73ee718b6a2fc1f7e7a97be01851e0
SHA1331bba485ae0590cd17654bb55100a6c653fa8bf
SHA256af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252
SHA512aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a
-
Filesize
598KB
MD52a73ee718b6a2fc1f7e7a97be01851e0
SHA1331bba485ae0590cd17654bb55100a6c653fa8bf
SHA256af2bde137f7456de033db4d71f7af25417d02033c12abb8bc274f4f69a656252
SHA512aeff483974248956453471f69a528580019ac888dd64d56864ec161aeb7a61ddaf385a76b5c9ceb2ce5397e2d53a060f6e7a4a6ac6ee1a725b7a0f665a8d695a
-
Filesize
372KB
MD537f31c1bd8a007f9c340cee0a36a1978
SHA1ada78da7ac57ffe73d348ca9c6e18e58e2283174
SHA2569b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553
SHA512c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b
-
Filesize
372KB
MD537f31c1bd8a007f9c340cee0a36a1978
SHA1ada78da7ac57ffe73d348ca9c6e18e58e2283174
SHA2569b16b45081d9f6e4eacd6b0eb2907b91389f9be012b453b62393ca47595df553
SHA512c4d2e84d1bc1551ec00812a3e1194d727a29f156a453238a9059ce50b632c44e90e8a1aee746125868ea109fc8acc39c2d3973fb5faf89e9f55b3d99e900c42b
-
Filesize
174KB
MD5bf1fbc78b555e851ad5e87bd6b6d39f1
SHA150f9aa3e1e3db16d10f92558e4385a6a8e6aa12b
SHA2562ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e
SHA51200f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791
-
Filesize
174KB
MD5bf1fbc78b555e851ad5e87bd6b6d39f1
SHA150f9aa3e1e3db16d10f92558e4385a6a8e6aa12b
SHA2562ddf24548fb078acd4a3ab902f84021c52eefaa6f72f06126bda9b642aa4566e
SHA51200f76604d8593da586b7f50fe677a3d94425e2bca12baf9a8c101efdfed6d0351fca7dafcccea06fc79732f95f540c6b939ee2302d666107172e68d81d4d7791
-
Filesize
217KB
MD5d3fb0d6ac1c25081e49f59f67bbbe749
SHA1f24a1ad77a695800c99c41c36fac9743e314b84c
SHA25615955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4
SHA51225b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a
-
Filesize
217KB
MD5d3fb0d6ac1c25081e49f59f67bbbe749
SHA1f24a1ad77a695800c99c41c36fac9743e314b84c
SHA25615955632f175d9251d3eb24e66230e0fae1598ab014dd9a911b0856192be10d4
SHA51225b3a95597e83b556e8c9a23505b20c53f5b57bcd0bb2d04b82cff851b1cacf7baa1ae80fefe2cd540f2ca727e95cfe153971514b6487127c2107453d9702a9a
-
Filesize
15KB
MD5932b2ddaf63311f7c4b619c6bf0fe403
SHA11ee3a38dbb776a5e95855cafd66977cc3b073261
SHA2568d09ac6e4dde88074dbba05bc7495381422abf17902f79e8072b3655ca5672b3
SHA5124939aef8bfbbfc07e262ff4280e65f3d25e55a3572b8184091b58514fd49f67b719069944f2b26bf459dcfacbbe9cac9bf1ce8a842477c28565c40ad398bc654
-
Filesize
140KB
MD59bb9dd7aef5faa22ea475689e40d2b95
SHA119fa7b88ea00b3506e853b49ebf0c2f394322758
SHA25655775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5
SHA5125639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999
-
Filesize
140KB
MD59bb9dd7aef5faa22ea475689e40d2b95
SHA119fa7b88ea00b3506e853b49ebf0c2f394322758
SHA25655775f9024c361cabbb70d870522a5f9d1dd36c8def7a944dd5cfa240f936ed5
SHA5125639b707d4d0e3d8230f321c378c49cd5ed4d573d2e6b22e649ee3f33d59ff30ef1cb1c3b5b93033467062bcd733bc0a042035bc40421cf60c265c2bd5e12999