Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe
Resource
win10-20230703-en
General
-
Target
97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe
-
Size
928KB
-
MD5
7865506ed4e470d5e9235d8ec8921a15
-
SHA1
791cea5988b74e294dee922cdaf5f23b015387dd
-
SHA256
97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d
-
SHA512
6b6a1dbaa71508e0cb6790e10849269a2f90c2408b75be0e636a95c71bb536c679dba8e73ec26ec6a0451d7a2e769f534510a929a34eddbef3a716614d847fe0
-
SSDEEP
24576:WyZvx6gpXJ2xvDjeyLO3m5jqyzOkOzb5cPitK:lZvPXoxmOOlvHnci
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afc7-33.dat healer behavioral1/files/0x000700000001afc7-34.dat healer behavioral1/memory/2308-35-0x0000000000240000-0x000000000024A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8050467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8050467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8050467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8050467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8050467.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4532 z7945916.exe 1504 z1511866.exe 4524 z1259996.exe 4432 z8668195.exe 2308 q8050467.exe 700 r8075445.exe 3176 s1819785.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8050467.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7945916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1511866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1259996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8668195.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 q8050467.exe 2308 q8050467.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 q8050467.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4532 4796 97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe 70 PID 4796 wrote to memory of 4532 4796 97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe 70 PID 4796 wrote to memory of 4532 4796 97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe 70 PID 4532 wrote to memory of 1504 4532 z7945916.exe 71 PID 4532 wrote to memory of 1504 4532 z7945916.exe 71 PID 4532 wrote to memory of 1504 4532 z7945916.exe 71 PID 1504 wrote to memory of 4524 1504 z1511866.exe 72 PID 1504 wrote to memory of 4524 1504 z1511866.exe 72 PID 1504 wrote to memory of 4524 1504 z1511866.exe 72 PID 4524 wrote to memory of 4432 4524 z1259996.exe 73 PID 4524 wrote to memory of 4432 4524 z1259996.exe 73 PID 4524 wrote to memory of 4432 4524 z1259996.exe 73 PID 4432 wrote to memory of 2308 4432 z8668195.exe 74 PID 4432 wrote to memory of 2308 4432 z8668195.exe 74 PID 4432 wrote to memory of 700 4432 z8668195.exe 75 PID 4432 wrote to memory of 700 4432 z8668195.exe 75 PID 4432 wrote to memory of 700 4432 z8668195.exe 75 PID 4524 wrote to memory of 3176 4524 z1259996.exe 76 PID 4524 wrote to memory of 3176 4524 z1259996.exe 76 PID 4524 wrote to memory of 3176 4524 z1259996.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe"C:\Users\Admin\AppData\Local\Temp\97c409738750d5b75afb0a9ea5d752ac15787f7d51a097757bc3699bf3465f6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7945916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7945916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1511866.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1511866.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1259996.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1259996.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8668195.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8668195.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8050467.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8050467.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8075445.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8075445.exe6⤵
- Executes dropped EXE
PID:700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1819785.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1819785.exe5⤵
- Executes dropped EXE
PID:3176
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822KB
MD5d356fbfd958abe382b5a712ca1da6402
SHA1dc95d336085eee7dac4dcdd0dd0bd4cd2305836d
SHA25618c8a0e2b68fdf2c2e94aef74b2a184f5f93637a68dd576fd88378e3e2f00844
SHA5122219ba94283dbdcdc5b91922e4ad0e5a1708e3f16546b87f3c5b1bc29cb69d07a2c36ba20e69c9d0b4123787ac3e2ca941aefa58b964a394501750dd42985f45
-
Filesize
822KB
MD5d356fbfd958abe382b5a712ca1da6402
SHA1dc95d336085eee7dac4dcdd0dd0bd4cd2305836d
SHA25618c8a0e2b68fdf2c2e94aef74b2a184f5f93637a68dd576fd88378e3e2f00844
SHA5122219ba94283dbdcdc5b91922e4ad0e5a1708e3f16546b87f3c5b1bc29cb69d07a2c36ba20e69c9d0b4123787ac3e2ca941aefa58b964a394501750dd42985f45
-
Filesize
597KB
MD554f07558414219bc4ca839702365ce2f
SHA1d58805870563e7b138e4a4271a0469fc11f5ccdf
SHA25659ce15008febd81c53d9b1db93add9ba344739f70c411b4dc35c2489f1ae7c41
SHA51221a954a36e31878f92ca16e9ed088dcaf7afc29b1f2814790663a821264acc0518bc4f47fd5dc9cfae5afe0736a9a07942b3084940bfa2c8e2657dca0eafb102
-
Filesize
597KB
MD554f07558414219bc4ca839702365ce2f
SHA1d58805870563e7b138e4a4271a0469fc11f5ccdf
SHA25659ce15008febd81c53d9b1db93add9ba344739f70c411b4dc35c2489f1ae7c41
SHA51221a954a36e31878f92ca16e9ed088dcaf7afc29b1f2814790663a821264acc0518bc4f47fd5dc9cfae5afe0736a9a07942b3084940bfa2c8e2657dca0eafb102
-
Filesize
372KB
MD54f6e087c4b7c8d00703c7cf4a251f8b9
SHA10b8474be1f0c07299c32f1fbd87369e03358116d
SHA256736b57e71f166c0e67afd716ec43e80d4254e6d899121d4c0982d3ccadccbf92
SHA51287234df26c51cefc4177f462313d03de5637c99b18010e20ec786ee36a0b881ed0877a2ce921dbec77e1d64ab256c6f8694872d72a99dc9373899cf3853051a3
-
Filesize
372KB
MD54f6e087c4b7c8d00703c7cf4a251f8b9
SHA10b8474be1f0c07299c32f1fbd87369e03358116d
SHA256736b57e71f166c0e67afd716ec43e80d4254e6d899121d4c0982d3ccadccbf92
SHA51287234df26c51cefc4177f462313d03de5637c99b18010e20ec786ee36a0b881ed0877a2ce921dbec77e1d64ab256c6f8694872d72a99dc9373899cf3853051a3
-
Filesize
175KB
MD507888ca195ed9172ade905504f41f57f
SHA1fd2dc20a551a5ccc2aeed4d6f9d3e5c554e02313
SHA2564cd2ae2697bb7e9e57cfa2c8a6141fbde51f1a1d332d06ecaa0ebd05c158c426
SHA512bbb6e4c500cb5c51eea5189770530b47374590a298ddfa5f777b43312520b358c13e5915fee50bfdeeb62c1c78493b20b847e8f256ec6b63fa37afd5ab783694
-
Filesize
175KB
MD507888ca195ed9172ade905504f41f57f
SHA1fd2dc20a551a5ccc2aeed4d6f9d3e5c554e02313
SHA2564cd2ae2697bb7e9e57cfa2c8a6141fbde51f1a1d332d06ecaa0ebd05c158c426
SHA512bbb6e4c500cb5c51eea5189770530b47374590a298ddfa5f777b43312520b358c13e5915fee50bfdeeb62c1c78493b20b847e8f256ec6b63fa37afd5ab783694
-
Filesize
217KB
MD5fae09a1eadf8db14ae6f7ed2817c6b71
SHA1c8ef8dc429e5d1a311937f637c75bf2104b128a3
SHA2568411218893acd5353e08d7ed021a7db9d70b5ef0cfde9d51d485e02253b10bc8
SHA5123c632f406fc2613bc2098fe86b286849bcd95b0ee9ee140f0704e2d7b9f7f042ac934c713f58ebf8db2c2b925241d2baad20d107eac85a4322c5285c4d944210
-
Filesize
217KB
MD5fae09a1eadf8db14ae6f7ed2817c6b71
SHA1c8ef8dc429e5d1a311937f637c75bf2104b128a3
SHA2568411218893acd5353e08d7ed021a7db9d70b5ef0cfde9d51d485e02253b10bc8
SHA5123c632f406fc2613bc2098fe86b286849bcd95b0ee9ee140f0704e2d7b9f7f042ac934c713f58ebf8db2c2b925241d2baad20d107eac85a4322c5285c4d944210
-
Filesize
18KB
MD5ba34dd50359511f3db959704545e36da
SHA15888f8353ebb4b3716b4e01e0d0193164e35f21a
SHA256f343fbe82030907188280097ad0f235d803f5dd35a4bbaa3e9297a9b2818b67a
SHA512024ceeace1d1249c558df19b2edfc632dd4e1974865a84c1760e7f94df100d1b44ce348fe1e43a23787610212cfeb27a92dba6344c306fab555b2108714ca8c9
-
Filesize
18KB
MD5ba34dd50359511f3db959704545e36da
SHA15888f8353ebb4b3716b4e01e0d0193164e35f21a
SHA256f343fbe82030907188280097ad0f235d803f5dd35a4bbaa3e9297a9b2818b67a
SHA512024ceeace1d1249c558df19b2edfc632dd4e1974865a84c1760e7f94df100d1b44ce348fe1e43a23787610212cfeb27a92dba6344c306fab555b2108714ca8c9
-
Filesize
141KB
MD50d06de9461c27c323df0af511f28378d
SHA14288d77fa7d71723a63f5d22b0196e00229e9144
SHA2563885e1fe5db62895c166f11b0c91d467d02bdd2f425471c36639ead2495707b5
SHA5127b2e4b356b0ccc02606d1fd5bfe9d5bebfe45bf367da0cda3deab776ab02508ae6caa3792f6b10878a727f080af774c7e41a4894e8aead1c78ba97193833ad66
-
Filesize
141KB
MD50d06de9461c27c323df0af511f28378d
SHA14288d77fa7d71723a63f5d22b0196e00229e9144
SHA2563885e1fe5db62895c166f11b0c91d467d02bdd2f425471c36639ead2495707b5
SHA5127b2e4b356b0ccc02606d1fd5bfe9d5bebfe45bf367da0cda3deab776ab02508ae6caa3792f6b10878a727f080af774c7e41a4894e8aead1c78ba97193833ad66