Analysis
-
max time kernel
293s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
30/08/2023, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
z6252258.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
z6252258.exe
Resource
win10-20230703-en
General
-
Target
z6252258.exe
-
Size
823KB
-
MD5
8bd8339d7a7109d1b863a23ff6f14d08
-
SHA1
028e58ab210eaaa9c4cee72fb1e76606670ce996
-
SHA256
df8865f3bc0e832d4d9dc5793715eece8c90b335356c8f93305fd968b9d1ea47
-
SHA512
01f60ce0b205923971ed6727152c2f0b342b40c3d616869c977bfa4473076c17cc63ad7d167e128f69760dad16639d2b89fb9003a5cbcccebeb4641b1bb9069e
-
SSDEEP
24576:WyXUL+JkX+CgXMDh5whNRUiY10pGtH0Ja:lEAeRgXahChNRUf0Ga
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x0009000000015e6e-34.dat healer behavioral1/files/0x0009000000015e6e-35.dat healer behavioral1/files/0x0009000000015e6e-37.dat healer behavioral1/memory/2236-38-0x00000000003B0000-0x00000000003BA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q0393175.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2428 z8297145.exe 2380 z3592200.exe 2240 z9025032.exe 2236 q0393175.exe 2776 r1386398.exe 2684 s7372376.exe -
Loads dropped DLL 11 IoCs
pid Process 772 z6252258.exe 2428 z8297145.exe 2428 z8297145.exe 2380 z3592200.exe 2380 z3592200.exe 2240 z9025032.exe 2240 z9025032.exe 2240 z9025032.exe 2776 r1386398.exe 2380 z3592200.exe 2684 s7372376.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features q0393175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q0393175.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z6252258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8297145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3592200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9025032.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 q0393175.exe 2236 q0393175.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 q0393175.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 772 wrote to memory of 2428 772 z6252258.exe 28 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2428 wrote to memory of 2380 2428 z8297145.exe 29 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2380 wrote to memory of 2240 2380 z3592200.exe 30 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2236 2240 z9025032.exe 31 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2240 wrote to memory of 2776 2240 z9025032.exe 34 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37 PID 2380 wrote to memory of 2684 2380 z3592200.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\z6252258.exe"C:\Users\Admin\AppData\Local\Temp\z6252258.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8297145.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3592200.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9025032.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q0393175.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r1386398.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s7372376.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD52416894682f5e9b74488f703e2d6ba29
SHA13efc720cadf1f6cb571dfedf6128f1010e1bce64
SHA2560d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338
SHA512ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29
-
Filesize
599KB
MD52416894682f5e9b74488f703e2d6ba29
SHA13efc720cadf1f6cb571dfedf6128f1010e1bce64
SHA2560d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338
SHA512ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29
-
Filesize
373KB
MD50101cd7e1b8edb9b1d261a0037ba3474
SHA1342b5f1a6f1e26868c50fccf46f71733f0d89eb8
SHA256b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb
SHA5127edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96
-
Filesize
373KB
MD50101cd7e1b8edb9b1d261a0037ba3474
SHA1342b5f1a6f1e26868c50fccf46f71733f0d89eb8
SHA256b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb
SHA5127edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96
-
Filesize
174KB
MD5349241a38bafd0ac4e859471e974fe4d
SHA1adc8da0bd03a53947f95f585ea7fabf8831a3de5
SHA2563331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163
SHA5127a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04
-
Filesize
174KB
MD5349241a38bafd0ac4e859471e974fe4d
SHA1adc8da0bd03a53947f95f585ea7fabf8831a3de5
SHA2563331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163
SHA5127a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04
-
Filesize
217KB
MD50bf01d0a7f9b30070cec5ef4336b92dd
SHA12c720832934496005f87273c140f6882c49a8286
SHA256b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213
SHA512dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4
-
Filesize
217KB
MD50bf01d0a7f9b30070cec5ef4336b92dd
SHA12c720832934496005f87273c140f6882c49a8286
SHA256b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213
SHA512dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4
-
Filesize
17KB
MD525f22091beb8ae2f318226bb6005ca3c
SHA1cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2
SHA2567c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c
SHA5120244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57
-
Filesize
17KB
MD525f22091beb8ae2f318226bb6005ca3c
SHA1cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2
SHA2567c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c
SHA5120244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57
-
Filesize
141KB
MD5a1f50e9eb29422e2a074f540775c78e5
SHA1ef2c12ddf2b33b781274744bbe4990c133eb2b9b
SHA25694eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f
SHA51218955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07
-
Filesize
141KB
MD5a1f50e9eb29422e2a074f540775c78e5
SHA1ef2c12ddf2b33b781274744bbe4990c133eb2b9b
SHA25694eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f
SHA51218955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07
-
Filesize
599KB
MD52416894682f5e9b74488f703e2d6ba29
SHA13efc720cadf1f6cb571dfedf6128f1010e1bce64
SHA2560d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338
SHA512ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29
-
Filesize
599KB
MD52416894682f5e9b74488f703e2d6ba29
SHA13efc720cadf1f6cb571dfedf6128f1010e1bce64
SHA2560d508e2242211d0fe9eb65671e147c8fd70c0889834f94d68bbbdb8944535338
SHA512ce25d14400f996dba8340263edaa96fe4eec4480b570634e930e490c75920bd5d11f695aca242347dbf28881274baf23860e3cc1e9524ce117753f0791b5fe29
-
Filesize
373KB
MD50101cd7e1b8edb9b1d261a0037ba3474
SHA1342b5f1a6f1e26868c50fccf46f71733f0d89eb8
SHA256b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb
SHA5127edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96
-
Filesize
373KB
MD50101cd7e1b8edb9b1d261a0037ba3474
SHA1342b5f1a6f1e26868c50fccf46f71733f0d89eb8
SHA256b1f55ba5f0b6c470094aa90bd07828c6f8eb844e0feb6b393553a5392b54cccb
SHA5127edfcca67a1a3d6c52c569665a540f0f9cb613441ca74f0b5bcded2e5d2ddd97de1453432c7f6293b52b2f55001a81fb7edbdc83fb3e4c6b7fca8cc534e25a96
-
Filesize
174KB
MD5349241a38bafd0ac4e859471e974fe4d
SHA1adc8da0bd03a53947f95f585ea7fabf8831a3de5
SHA2563331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163
SHA5127a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04
-
Filesize
174KB
MD5349241a38bafd0ac4e859471e974fe4d
SHA1adc8da0bd03a53947f95f585ea7fabf8831a3de5
SHA2563331ead871b2176dcf7a3736fe8194c2b0d604c245b2eabfcc9648c87720d163
SHA5127a68e72dec506c53e3b84dd884ec9f3133e06ecfdbbc2b2fdbbdbc6f1e349dd7331ede2425fd899450ea638205f75f781e8663358d0db9438ea1cf8333f89b04
-
Filesize
217KB
MD50bf01d0a7f9b30070cec5ef4336b92dd
SHA12c720832934496005f87273c140f6882c49a8286
SHA256b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213
SHA512dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4
-
Filesize
217KB
MD50bf01d0a7f9b30070cec5ef4336b92dd
SHA12c720832934496005f87273c140f6882c49a8286
SHA256b650dcab7fd82bd47a58e73eb229b14b7a96b32473b07b6cf1aed2d8f646c213
SHA512dcd1cca9d5a9d769fd87065ccb0536c4f574f3c1753a203d6f920c1c8b0ac1d90d0690c6906fa56f17f9ee29a2c203230d5ea9ecfbf3d7b0fd49c91c83d300a4
-
Filesize
17KB
MD525f22091beb8ae2f318226bb6005ca3c
SHA1cc03ae7a06a3ff5d8cd63c25764b28ec6aa3c0f2
SHA2567c34fb203761d24ba673c666a98aca34782a3bf73566fc5c313dfb631d49a62c
SHA5120244f2fa9798bf1a636f00289d7bd1290e9906b7375374fdd0834042494c88b2e4d16b8565f8026588e4bf8b5b98b1be8b0ea0583e517df70cd4fe6cf0740e57
-
Filesize
141KB
MD5a1f50e9eb29422e2a074f540775c78e5
SHA1ef2c12ddf2b33b781274744bbe4990c133eb2b9b
SHA25694eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f
SHA51218955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07
-
Filesize
141KB
MD5a1f50e9eb29422e2a074f540775c78e5
SHA1ef2c12ddf2b33b781274744bbe4990c133eb2b9b
SHA25694eaf8b3b3335b191ca5f53157cfe665eca75c84f2a8b4e6361f5adf0b3fed4f
SHA51218955ddf8fac8630d798b59918dcac45b33f6808841469357613c0bd6d4c2e1f4dd52123532c65bd495ba65b91cd0fff98004c67e6801804c0840c189a591e07