Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe
Resource
win10-20230703-en
General
-
Target
3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe
-
Size
818KB
-
MD5
afb62f0e85c51165b28312a9e00e0efb
-
SHA1
7bf32ad943066412c0d7a59dd11c5bc9883541f4
-
SHA256
3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d
-
SHA512
616ceb3ff73bbff3171db83dc12b0989b57bfd6dbc8af0c768908368564123589f56aca849dd6a1db0d0aa865b3b59dda3a3e9e5a8b7f4a4e9dedbee2cd3d18b
-
SSDEEP
12288:7Mrvy90JUsg3Ouxp+7U6Mef8ZaTgqV0MwCgNBhRGTdqy3GgQdJaSEekQZW7Mi2:IyMUsg3Xpq8gV4NxGTspX0/oZni2
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af98-33.dat healer behavioral1/files/0x000700000001af98-34.dat healer behavioral1/memory/2764-35-0x0000000000E10000-0x0000000000E1A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9012263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9012263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9012263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9012263.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9012263.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2056 v1759604.exe 3932 v1356161.exe 3800 v0376747.exe 2788 v6922168.exe 2764 a9012263.exe 4836 b1420641.exe 3172 c1616681.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9012263.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1759604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1356161.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0376747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6922168.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2764 a9012263.exe 2764 a9012263.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 a9012263.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2056 4152 3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe 69 PID 4152 wrote to memory of 2056 4152 3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe 69 PID 4152 wrote to memory of 2056 4152 3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe 69 PID 2056 wrote to memory of 3932 2056 v1759604.exe 70 PID 2056 wrote to memory of 3932 2056 v1759604.exe 70 PID 2056 wrote to memory of 3932 2056 v1759604.exe 70 PID 3932 wrote to memory of 3800 3932 v1356161.exe 71 PID 3932 wrote to memory of 3800 3932 v1356161.exe 71 PID 3932 wrote to memory of 3800 3932 v1356161.exe 71 PID 3800 wrote to memory of 2788 3800 v0376747.exe 72 PID 3800 wrote to memory of 2788 3800 v0376747.exe 72 PID 3800 wrote to memory of 2788 3800 v0376747.exe 72 PID 2788 wrote to memory of 2764 2788 v6922168.exe 73 PID 2788 wrote to memory of 2764 2788 v6922168.exe 73 PID 2788 wrote to memory of 4836 2788 v6922168.exe 74 PID 2788 wrote to memory of 4836 2788 v6922168.exe 74 PID 2788 wrote to memory of 4836 2788 v6922168.exe 74 PID 3800 wrote to memory of 3172 3800 v0376747.exe 75 PID 3800 wrote to memory of 3172 3800 v0376747.exe 75 PID 3800 wrote to memory of 3172 3800 v0376747.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe"C:\Users\Admin\AppData\Local\Temp\3468337caef24b6242c390c8b4d078afc8d36c7903e3387a5dee4cbc776b442d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1759604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1759604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1356161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1356161.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0376747.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0376747.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6922168.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6922168.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9012263.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9012263.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1420641.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1420641.exe6⤵
- Executes dropped EXE
PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1616681.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1616681.exe5⤵
- Executes dropped EXE
PID:3172
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD531224a91076d64f5074724ba49a4162d
SHA15d052946e12488c255120061823fc4f9614264fe
SHA256b0cf04635d01f0f0471f52e65ab4880224742faa0f16dc3ef3f638233ae0130f
SHA51220ae6a5d0e5574b62afddc869f63ef61c297baa53085235ec651e458a4d69ae0573ea0c88e0777ee6ae1b84c956d60de40aee87c3643eb4847869b2ee3cfb658
-
Filesize
713KB
MD531224a91076d64f5074724ba49a4162d
SHA15d052946e12488c255120061823fc4f9614264fe
SHA256b0cf04635d01f0f0471f52e65ab4880224742faa0f16dc3ef3f638233ae0130f
SHA51220ae6a5d0e5574b62afddc869f63ef61c297baa53085235ec651e458a4d69ae0573ea0c88e0777ee6ae1b84c956d60de40aee87c3643eb4847869b2ee3cfb658
-
Filesize
497KB
MD5d983bdcb4d96fe583cc85e851c574f00
SHA19aecee2ac3a15e08b921c36541a8f31ba46f30a0
SHA256ed1624cc1213cb7f77055492acbaeb1471ccdaa247c95dbee0ce045b939f75cc
SHA51248e3a074992a09a3671495305c8083e65fe9214f8854d488dd50033bfc0413140474b41fc1bd0d5c8b4a20d71c69270815341bb10ee187e0de84a31a82c8caaf
-
Filesize
497KB
MD5d983bdcb4d96fe583cc85e851c574f00
SHA19aecee2ac3a15e08b921c36541a8f31ba46f30a0
SHA256ed1624cc1213cb7f77055492acbaeb1471ccdaa247c95dbee0ce045b939f75cc
SHA51248e3a074992a09a3671495305c8083e65fe9214f8854d488dd50033bfc0413140474b41fc1bd0d5c8b4a20d71c69270815341bb10ee187e0de84a31a82c8caaf
-
Filesize
373KB
MD597b09b161f88bca0352f0cc46866453a
SHA1b87eb166102eca447438fe8b03341a0d423e3398
SHA256c8974bbf8735e2e89932464da143fb09fed23d5231d966ad2044368b1a78d432
SHA512737f6dac2098f47e8fcdbf5bc4414be955914ef81676745e696fa5b188403abaff3dd2d52417416a6a653731e31d43eeb8557f153a210d579d9aec71bbc26f5f
-
Filesize
373KB
MD597b09b161f88bca0352f0cc46866453a
SHA1b87eb166102eca447438fe8b03341a0d423e3398
SHA256c8974bbf8735e2e89932464da143fb09fed23d5231d966ad2044368b1a78d432
SHA512737f6dac2098f47e8fcdbf5bc4414be955914ef81676745e696fa5b188403abaff3dd2d52417416a6a653731e31d43eeb8557f153a210d579d9aec71bbc26f5f
-
Filesize
174KB
MD5a780b6de4a818494be3523cc2d3c7164
SHA1b731f83a3fe1b20b5899b1eaebd71c7868d59fa2
SHA256cb3429328e442a28ba1c16927d0e71ed7d59238f3a9f836624201cd973a23e37
SHA5120177dbca103a171237e02d0ed70528b5c46ae187646f1fed9be132838ff0ca3e94e4a24e7d8f8930456a2dca137cf44caba9c3e162955b957cd5d4670c2223e6
-
Filesize
174KB
MD5a780b6de4a818494be3523cc2d3c7164
SHA1b731f83a3fe1b20b5899b1eaebd71c7868d59fa2
SHA256cb3429328e442a28ba1c16927d0e71ed7d59238f3a9f836624201cd973a23e37
SHA5120177dbca103a171237e02d0ed70528b5c46ae187646f1fed9be132838ff0ca3e94e4a24e7d8f8930456a2dca137cf44caba9c3e162955b957cd5d4670c2223e6
-
Filesize
217KB
MD5e1438c7ad6c4dad9fefb7c6f73cd486e
SHA1bee42221d2d09afd5c8f6b4c355d73597385c3b1
SHA2566b04203d63fe6ea0aea55741cdb9caf05bfe977b5e61a6506985001139c633c9
SHA5121b40638285726e6c028f8da0421895cca071d6450150b8a75f932be30ef0d8d9b22c41479a390422dff655342ecf722fe5cac9d949d1ad4518631252a0dd78d3
-
Filesize
217KB
MD5e1438c7ad6c4dad9fefb7c6f73cd486e
SHA1bee42221d2d09afd5c8f6b4c355d73597385c3b1
SHA2566b04203d63fe6ea0aea55741cdb9caf05bfe977b5e61a6506985001139c633c9
SHA5121b40638285726e6c028f8da0421895cca071d6450150b8a75f932be30ef0d8d9b22c41479a390422dff655342ecf722fe5cac9d949d1ad4518631252a0dd78d3
-
Filesize
16KB
MD583c0ee95d47fa3d081c777c9dbcf2eae
SHA19618430d8a3efc66f8ce8314c5b89a140b66514f
SHA25689d998e262c5579e11e0860efaf658e59e014f0c07cb869cd4c90ea3fe649792
SHA5124bd943f01f8b4652a0738b195da54c7990c4508238b0b8b717137d4533caac3daa2cd81869ec6bae31ccd2388106c69c83d919fb00266bd8233ec6ded4f7e5a3
-
Filesize
16KB
MD583c0ee95d47fa3d081c777c9dbcf2eae
SHA19618430d8a3efc66f8ce8314c5b89a140b66514f
SHA25689d998e262c5579e11e0860efaf658e59e014f0c07cb869cd4c90ea3fe649792
SHA5124bd943f01f8b4652a0738b195da54c7990c4508238b0b8b717137d4533caac3daa2cd81869ec6bae31ccd2388106c69c83d919fb00266bd8233ec6ded4f7e5a3
-
Filesize
141KB
MD50395b7fe1360e5a94e973a943c9cb43a
SHA130898d7e8c853df04bd1f37a693e51bde089e3f0
SHA2569d555dddec6f13d393f4fcc416b7714f3dcc905d93f885679bb579ac9af7ea98
SHA512dadc3f6220fbeef678c93c56e18da8d1136c856301e394e4114a6c7f3e8e088b21112c60fa8fc45b159563acb44ef333335b961b63a62a6b5c4133ced9dc2d35
-
Filesize
141KB
MD50395b7fe1360e5a94e973a943c9cb43a
SHA130898d7e8c853df04bd1f37a693e51bde089e3f0
SHA2569d555dddec6f13d393f4fcc416b7714f3dcc905d93f885679bb579ac9af7ea98
SHA512dadc3f6220fbeef678c93c56e18da8d1136c856301e394e4114a6c7f3e8e088b21112c60fa8fc45b159563acb44ef333335b961b63a62a6b5c4133ced9dc2d35