Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe
Resource
win10v2004-20230703-en
General
-
Target
e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe
-
Size
930KB
-
MD5
f30bde4684e6b77652d1699c08b122a7
-
SHA1
ede24b90415c59c26469368d14a41add29a52f77
-
SHA256
e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56
-
SHA512
f21afe7acf338dec156cc131dba70779dd73fe1fea714e4df7acf4af5e63d0b8867332950a16fb4bf22291ff9d73cff9e83d627bfec6994a98e8f72416e4107d
-
SSDEEP
24576:Xynf1PJND+lm5S1eEo3/saCRG0HsE8n+FHyYGdiH09c:ixJND+lmkBovsBY0HwY3I
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023245-33.dat healer behavioral1/files/0x0007000000023245-34.dat healer behavioral1/memory/3004-35-0x0000000000DE0000-0x0000000000DEA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q2303402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q2303402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q2303402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q2303402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q2303402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q2303402.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2996 z0494201.exe 1776 z1133261.exe 2968 z2146589.exe 1480 z6259768.exe 3004 q2303402.exe 4724 r1788906.exe 404 s3643586.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q2303402.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6259768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0494201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1133261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2146589.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3004 q2303402.exe 3004 q2303402.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 q2303402.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2996 1400 e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe 83 PID 1400 wrote to memory of 2996 1400 e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe 83 PID 1400 wrote to memory of 2996 1400 e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe 83 PID 2996 wrote to memory of 1776 2996 z0494201.exe 84 PID 2996 wrote to memory of 1776 2996 z0494201.exe 84 PID 2996 wrote to memory of 1776 2996 z0494201.exe 84 PID 1776 wrote to memory of 2968 1776 z1133261.exe 85 PID 1776 wrote to memory of 2968 1776 z1133261.exe 85 PID 1776 wrote to memory of 2968 1776 z1133261.exe 85 PID 2968 wrote to memory of 1480 2968 z2146589.exe 86 PID 2968 wrote to memory of 1480 2968 z2146589.exe 86 PID 2968 wrote to memory of 1480 2968 z2146589.exe 86 PID 1480 wrote to memory of 3004 1480 z6259768.exe 87 PID 1480 wrote to memory of 3004 1480 z6259768.exe 87 PID 1480 wrote to memory of 4724 1480 z6259768.exe 96 PID 1480 wrote to memory of 4724 1480 z6259768.exe 96 PID 1480 wrote to memory of 4724 1480 z6259768.exe 96 PID 2968 wrote to memory of 404 2968 z2146589.exe 97 PID 2968 wrote to memory of 404 2968 z2146589.exe 97 PID 2968 wrote to memory of 404 2968 z2146589.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe"C:\Users\Admin\AppData\Local\Temp\e286655ef9375e33a3f9ba2a7a6c63d13b32d2569741f68fdd439e426ed9cd56.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0494201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0494201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1133261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1133261.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2146589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2146589.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6259768.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6259768.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2303402.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2303402.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1788906.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1788906.exe6⤵
- Executes dropped EXE
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3643586.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3643586.exe5⤵
- Executes dropped EXE
PID:404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD521b2407d52571f03d6b205dcec9c647d
SHA1ed6cdccadbb70ad72e333f13000839891ca5ff3e
SHA2561ed6b475943e8f82a02d8819c7d2fefa004da7a4c90666d046de8d730e78f9c2
SHA512bb7ceb35e778863ff07f4eb9e2529ece9076effc671e76dc6e2c4254ffde3e5f574b2a1e90b242fe6979b4244148b94b4340688f499b604fd7d5878bf4494a87
-
Filesize
824KB
MD521b2407d52571f03d6b205dcec9c647d
SHA1ed6cdccadbb70ad72e333f13000839891ca5ff3e
SHA2561ed6b475943e8f82a02d8819c7d2fefa004da7a4c90666d046de8d730e78f9c2
SHA512bb7ceb35e778863ff07f4eb9e2529ece9076effc671e76dc6e2c4254ffde3e5f574b2a1e90b242fe6979b4244148b94b4340688f499b604fd7d5878bf4494a87
-
Filesize
598KB
MD51708189b5df83e87349cf5ab023b5093
SHA1f3bcd89531abb94e2f1b5c8ee6749344d59b431e
SHA2561bf1cd699a37e85083e5ad2a529d09f7055fd6f53e544e762a76c7baab31b3f9
SHA512508e6d68c25e216ae300f0320cbf9fa57847b83c1acb7f63750289babddd8cb963577170026d5716a3dadb41991b05927cc92f1b3faca523105bd973b64a54d6
-
Filesize
598KB
MD51708189b5df83e87349cf5ab023b5093
SHA1f3bcd89531abb94e2f1b5c8ee6749344d59b431e
SHA2561bf1cd699a37e85083e5ad2a529d09f7055fd6f53e544e762a76c7baab31b3f9
SHA512508e6d68c25e216ae300f0320cbf9fa57847b83c1acb7f63750289babddd8cb963577170026d5716a3dadb41991b05927cc92f1b3faca523105bd973b64a54d6
-
Filesize
373KB
MD5300cdafb4de8ef414d3b43a9ee51d918
SHA1ebd086362e74a65b5d7db510857689abf901a3b8
SHA25624e2bcf536cfd883760904a23974a3a4a685e43bfe737a81277b938fcadb0bec
SHA512e73dea68af72494e31e80bdcc8da714aad5b3aeceb9a5d97b50abb807bec055c786144ac5c9be0fe61fe8428cca608b7497a7611923f8023cb0461d1b7735457
-
Filesize
373KB
MD5300cdafb4de8ef414d3b43a9ee51d918
SHA1ebd086362e74a65b5d7db510857689abf901a3b8
SHA25624e2bcf536cfd883760904a23974a3a4a685e43bfe737a81277b938fcadb0bec
SHA512e73dea68af72494e31e80bdcc8da714aad5b3aeceb9a5d97b50abb807bec055c786144ac5c9be0fe61fe8428cca608b7497a7611923f8023cb0461d1b7735457
-
Filesize
174KB
MD558ed3b25f56dc1e2bdbcf40f8f68dcc9
SHA1164081c2336a8b443ad2bcde1542e6a003eff597
SHA2567e77a90e757fd3c72eb54c2bea91344b0d951405ca80f7fffd2d4298ebf9a607
SHA51283184a12f5d1ad7d54b1fb61aa25e4793dd9687aea52593945f35f3e1ab8b34d53e9fcc131afb4ee6489aaacd72605541a9ff46fec19e34cff69e5da720e06c7
-
Filesize
174KB
MD558ed3b25f56dc1e2bdbcf40f8f68dcc9
SHA1164081c2336a8b443ad2bcde1542e6a003eff597
SHA2567e77a90e757fd3c72eb54c2bea91344b0d951405ca80f7fffd2d4298ebf9a607
SHA51283184a12f5d1ad7d54b1fb61aa25e4793dd9687aea52593945f35f3e1ab8b34d53e9fcc131afb4ee6489aaacd72605541a9ff46fec19e34cff69e5da720e06c7
-
Filesize
217KB
MD59d3b72cd338739a5ccce8bbff2c1cf1e
SHA15daa2fd8551ffb2828cd6dd7ba7c110a6776c4af
SHA256e9f67a47270c2ba8888b1c46265c10a0a758224625b481de376423ee3cdfae55
SHA51219c26db3785e6000ee1212d713b263ed3c211abb3f923418567d69231f37ddcb5202893366974742ea6198cb965c39cceb0c8cf797eedc44a9e10beeb584d571
-
Filesize
217KB
MD59d3b72cd338739a5ccce8bbff2c1cf1e
SHA15daa2fd8551ffb2828cd6dd7ba7c110a6776c4af
SHA256e9f67a47270c2ba8888b1c46265c10a0a758224625b481de376423ee3cdfae55
SHA51219c26db3785e6000ee1212d713b263ed3c211abb3f923418567d69231f37ddcb5202893366974742ea6198cb965c39cceb0c8cf797eedc44a9e10beeb584d571
-
Filesize
17KB
MD5c5f6fde75afd74339de22f296c16df93
SHA10cf2bea9bd0666509c1fabce410f072608ddde33
SHA256240f25058243a5dbab9303c6b675c4fe3578c394655175b48a33ad56d1bb4574
SHA5129f43bd6e08333f58f40d418a1c2e805dbb0f0892948c2000e58d2fa103c0e2ed493b77f5df9ea635288f99e6070aa267b203d692284f39220202b0006a9a52e1
-
Filesize
17KB
MD5c5f6fde75afd74339de22f296c16df93
SHA10cf2bea9bd0666509c1fabce410f072608ddde33
SHA256240f25058243a5dbab9303c6b675c4fe3578c394655175b48a33ad56d1bb4574
SHA5129f43bd6e08333f58f40d418a1c2e805dbb0f0892948c2000e58d2fa103c0e2ed493b77f5df9ea635288f99e6070aa267b203d692284f39220202b0006a9a52e1
-
Filesize
140KB
MD5e0515aebb17e51c5761fcf58c22d9369
SHA1b2cd6d0bf2427b2bd9a30ef2292c288ed24b8334
SHA256c920ab9c7538c0bb5691dd4ad44fc46578e0c078c6f908a556e9d1454e7c176c
SHA512f731daa82bfa03e061d84943e4af6ff4d68da68ff02fc3b85c4c84342ac85c0babf908a85ecc735af65c4980903bb31d4ea0866a50ac8d9f58ef2554d4edd364
-
Filesize
140KB
MD5e0515aebb17e51c5761fcf58c22d9369
SHA1b2cd6d0bf2427b2bd9a30ef2292c288ed24b8334
SHA256c920ab9c7538c0bb5691dd4ad44fc46578e0c078c6f908a556e9d1454e7c176c
SHA512f731daa82bfa03e061d84943e4af6ff4d68da68ff02fc3b85c4c84342ac85c0babf908a85ecc735af65c4980903bb31d4ea0866a50ac8d9f58ef2554d4edd364