Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe
Resource
win10-20230703-en
General
-
Target
02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe
-
Size
930KB
-
MD5
cc6416c8bf573208099ad7d52c1a1a05
-
SHA1
c4a9836d6d4727487536006bf1fee3b02172c6eb
-
SHA256
02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9
-
SHA512
afbae5de1dd56ab458b3f2245ea70c03d7de88ad3c59c1adc64e90d6ef7ddb8ae666f147c1ed4a407e70209f9dea7d31e04d21912e5ac5cb16e418a18ff396cc
-
SSDEEP
12288:yMr0y900EcOQLXtAuztgDPJSx7uhd6WGIeyF1/iq6UpMxQwxuB0sdDGRi+tr9F13:SyNuQiuxg9I7Ir5biypyQjui+DUBY
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afd3-34.dat healer behavioral1/files/0x000700000001afd3-33.dat healer behavioral1/memory/4164-35-0x00000000001B0000-0x00000000001BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q5393754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q5393754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q5393754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q5393754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q5393754.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5048 z6772651.exe 4244 z1750270.exe 3068 z5284060.exe 4060 z9521807.exe 4164 q5393754.exe 3860 r7265394.exe 3612 s7173788.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q5393754.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5284060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9521807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6772651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1750270.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4164 q5393754.exe 4164 q5393754.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4164 q5393754.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5064 wrote to memory of 5048 5064 02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe 69 PID 5064 wrote to memory of 5048 5064 02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe 69 PID 5064 wrote to memory of 5048 5064 02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe 69 PID 5048 wrote to memory of 4244 5048 z6772651.exe 70 PID 5048 wrote to memory of 4244 5048 z6772651.exe 70 PID 5048 wrote to memory of 4244 5048 z6772651.exe 70 PID 4244 wrote to memory of 3068 4244 z1750270.exe 71 PID 4244 wrote to memory of 3068 4244 z1750270.exe 71 PID 4244 wrote to memory of 3068 4244 z1750270.exe 71 PID 3068 wrote to memory of 4060 3068 z5284060.exe 72 PID 3068 wrote to memory of 4060 3068 z5284060.exe 72 PID 3068 wrote to memory of 4060 3068 z5284060.exe 72 PID 4060 wrote to memory of 4164 4060 z9521807.exe 73 PID 4060 wrote to memory of 4164 4060 z9521807.exe 73 PID 4060 wrote to memory of 3860 4060 z9521807.exe 74 PID 4060 wrote to memory of 3860 4060 z9521807.exe 74 PID 4060 wrote to memory of 3860 4060 z9521807.exe 74 PID 3068 wrote to memory of 3612 3068 z5284060.exe 75 PID 3068 wrote to memory of 3612 3068 z5284060.exe 75 PID 3068 wrote to memory of 3612 3068 z5284060.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe"C:\Users\Admin\AppData\Local\Temp\02f471ebd0b4aa842cbf4f645f03f73e0a7a14109851b3064791deeeaf99b0e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6772651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6772651.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1750270.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1750270.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5284060.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5284060.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9521807.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9521807.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5393754.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5393754.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7265394.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7265394.exe6⤵
- Executes dropped EXE
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7173788.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7173788.exe5⤵
- Executes dropped EXE
PID:3612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD57ab886e2b704a2312e33cdcbc1e01430
SHA1823a452128015e11b55684515763b41953400aea
SHA2567a2d8f497b7468ad3b8d7d7159663eaa7b6306370a1fbb2b63b4aab7391536ac
SHA5123bdb01e7a847762e8d81067759c1cd436e935cc5d65b41a8b0759f56b1aeca4e7db16b3da8806125f593ac94d6e338097a76699e9caab00e227c8517eed65d7b
-
Filesize
824KB
MD57ab886e2b704a2312e33cdcbc1e01430
SHA1823a452128015e11b55684515763b41953400aea
SHA2567a2d8f497b7468ad3b8d7d7159663eaa7b6306370a1fbb2b63b4aab7391536ac
SHA5123bdb01e7a847762e8d81067759c1cd436e935cc5d65b41a8b0759f56b1aeca4e7db16b3da8806125f593ac94d6e338097a76699e9caab00e227c8517eed65d7b
-
Filesize
598KB
MD52d2d32ff9db25d89bc22c21f8b52a9f8
SHA11f7baf6548255a406de7cf0f65c14d66fcfa0c52
SHA2563aeb4a52337ccc9bb96906c44171469c600a5cff807062a4077d02262efd3764
SHA512b7e6e3e05055b8ed9d2d22be88629d5981cdd15c17f19b8bdfd3e5c45f226db90fb9805ad7387d8edbc786db6a5e67e0bee6368fd908ae51772356911189db56
-
Filesize
598KB
MD52d2d32ff9db25d89bc22c21f8b52a9f8
SHA11f7baf6548255a406de7cf0f65c14d66fcfa0c52
SHA2563aeb4a52337ccc9bb96906c44171469c600a5cff807062a4077d02262efd3764
SHA512b7e6e3e05055b8ed9d2d22be88629d5981cdd15c17f19b8bdfd3e5c45f226db90fb9805ad7387d8edbc786db6a5e67e0bee6368fd908ae51772356911189db56
-
Filesize
372KB
MD5718a0ab22d456a6ef1c04688315268c5
SHA184d05ccea383bae54a2e0c87acaa85ad66a4cf27
SHA25628de2b2be7d8b0ec44e632e824a5e680f0727f1f83536ddf2840c46f836b17a1
SHA5126f37561f5a0ed9868ebcbb139b1db29788b003edfb75dc0fe1ffca3340fe7b049a5709036a8dc9361b253b358dd029c7d9ea937999c12838547d173ed7d7c2dd
-
Filesize
372KB
MD5718a0ab22d456a6ef1c04688315268c5
SHA184d05ccea383bae54a2e0c87acaa85ad66a4cf27
SHA25628de2b2be7d8b0ec44e632e824a5e680f0727f1f83536ddf2840c46f836b17a1
SHA5126f37561f5a0ed9868ebcbb139b1db29788b003edfb75dc0fe1ffca3340fe7b049a5709036a8dc9361b253b358dd029c7d9ea937999c12838547d173ed7d7c2dd
-
Filesize
175KB
MD53cac501e5015d14ec5050ef4a8e4b76d
SHA1daf739988822082cfb9200f693dc0128cc612864
SHA25692500d43881c333718945c8e0747c6f6e079c1cb4fe5c9e989e8b142ebf1f79d
SHA512b237dfe399ce1eadd5c796e47bbca3972ffb6028b559c117d0a3f49afbb0657490bbbe282e0f691f13c50b8421ca8b5989c9f0771c17e8294f68980ea3156bd2
-
Filesize
175KB
MD53cac501e5015d14ec5050ef4a8e4b76d
SHA1daf739988822082cfb9200f693dc0128cc612864
SHA25692500d43881c333718945c8e0747c6f6e079c1cb4fe5c9e989e8b142ebf1f79d
SHA512b237dfe399ce1eadd5c796e47bbca3972ffb6028b559c117d0a3f49afbb0657490bbbe282e0f691f13c50b8421ca8b5989c9f0771c17e8294f68980ea3156bd2
-
Filesize
217KB
MD50fb590203aaef5fd7851c119811fcbdf
SHA1855f4b03ac6967e6f57334d042ff2999ee150bd8
SHA256366beb8c93f5d80bb402add4b2cabd86d889402d96df62d798a3b1b847ba0f5c
SHA5122a1dbbd58aefb00de695ccc92575f93fc04e2d4224c1f29f0dae78f4d8832c4eb7bb8ab382a3954f1952ebfb11c3ecdddc06d996a1bebbe09a6ad5a6928ad8e2
-
Filesize
217KB
MD50fb590203aaef5fd7851c119811fcbdf
SHA1855f4b03ac6967e6f57334d042ff2999ee150bd8
SHA256366beb8c93f5d80bb402add4b2cabd86d889402d96df62d798a3b1b847ba0f5c
SHA5122a1dbbd58aefb00de695ccc92575f93fc04e2d4224c1f29f0dae78f4d8832c4eb7bb8ab382a3954f1952ebfb11c3ecdddc06d996a1bebbe09a6ad5a6928ad8e2
-
Filesize
17KB
MD53276cb50649f44d66f40312a2f521551
SHA128cef74be3da98ae5b106345435fe24600c79ea4
SHA256b2e705ea7f6a82b959cf34251b520c6e26e359fe1edf68eb890594335e8c0e50
SHA5126cbd7868c85ca172a143d165c7c50912ca058e745e8079bedbc037ad1f77fd51a16d2b018d579af4166673322e5986b48c0f13d561e0cf6fd981e01da36373d3
-
Filesize
17KB
MD53276cb50649f44d66f40312a2f521551
SHA128cef74be3da98ae5b106345435fe24600c79ea4
SHA256b2e705ea7f6a82b959cf34251b520c6e26e359fe1edf68eb890594335e8c0e50
SHA5126cbd7868c85ca172a143d165c7c50912ca058e745e8079bedbc037ad1f77fd51a16d2b018d579af4166673322e5986b48c0f13d561e0cf6fd981e01da36373d3
-
Filesize
140KB
MD51faad9a38a380ff035d251b2fd0d3aed
SHA153fcd853bc0b448a8e78e6598e64ed9f5903aa7f
SHA2560011e8558f7545f7fce1cc6a452dcba194bbea581e5b4bd056f722e0259b765b
SHA51209a2e71f77731564a1ce0a558f75683f05df9255018d9e3f514a4c8060ee4638067bce9fd5f24b51edee45b1973f728d9a9a605e941b69cb1bba3bb7819d005f
-
Filesize
140KB
MD51faad9a38a380ff035d251b2fd0d3aed
SHA153fcd853bc0b448a8e78e6598e64ed9f5903aa7f
SHA2560011e8558f7545f7fce1cc6a452dcba194bbea581e5b4bd056f722e0259b765b
SHA51209a2e71f77731564a1ce0a558f75683f05df9255018d9e3f514a4c8060ee4638067bce9fd5f24b51edee45b1973f728d9a9a605e941b69cb1bba3bb7819d005f