Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 11:08
Static task
static1
Behavioral task
behavioral1
Sample
3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe
Resource
win10v2004-20230703-en
General
-
Target
3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe
-
Size
828KB
-
MD5
2bf42c81013320f77eadd003c0c45e21
-
SHA1
8062b3d67b1ed3ac9e46cd35de0a1f7ab58ce4d1
-
SHA256
3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a
-
SHA512
4247533a3f086eb8c098c6e81e01a71481b2d0b4206e8a4ed9cc4008e0ea0bd73cd51d61361fe3e52a41a113c43cf5e61021b729dc3bd3585dc5342a98888a97
-
SSDEEP
24576:AyJhtsczA8Qfi8FUZw8859H1j9ns2uJ0W:HHGcMpq8Ew8859Hjns2q0
Malware Config
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002321c-33.dat healer behavioral1/files/0x000700000002321c-34.dat healer behavioral1/memory/2508-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1133922.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1133922.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1133922.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1133922.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1133922.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1133922.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4480 v6288569.exe 4748 v1938377.exe 4560 v6607764.exe 3224 v6458338.exe 2508 a1133922.exe 2252 b3221261.exe 3372 c0097415.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1133922.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1938377.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6607764.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6458338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6288569.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 a1133922.exe 2508 a1133922.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 a1133922.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4480 2360 3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe 83 PID 2360 wrote to memory of 4480 2360 3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe 83 PID 2360 wrote to memory of 4480 2360 3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe 83 PID 4480 wrote to memory of 4748 4480 v6288569.exe 84 PID 4480 wrote to memory of 4748 4480 v6288569.exe 84 PID 4480 wrote to memory of 4748 4480 v6288569.exe 84 PID 4748 wrote to memory of 4560 4748 v1938377.exe 85 PID 4748 wrote to memory of 4560 4748 v1938377.exe 85 PID 4748 wrote to memory of 4560 4748 v1938377.exe 85 PID 4560 wrote to memory of 3224 4560 v6607764.exe 86 PID 4560 wrote to memory of 3224 4560 v6607764.exe 86 PID 4560 wrote to memory of 3224 4560 v6607764.exe 86 PID 3224 wrote to memory of 2508 3224 v6458338.exe 87 PID 3224 wrote to memory of 2508 3224 v6458338.exe 87 PID 3224 wrote to memory of 2252 3224 v6458338.exe 92 PID 3224 wrote to memory of 2252 3224 v6458338.exe 92 PID 3224 wrote to memory of 2252 3224 v6458338.exe 92 PID 4560 wrote to memory of 3372 4560 v6607764.exe 93 PID 4560 wrote to memory of 3372 4560 v6607764.exe 93 PID 4560 wrote to memory of 3372 4560 v6607764.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe"C:\Users\Admin\AppData\Local\Temp\3fb85dd28d41887e7d5344a2fc980fc3b20edf0af1eb1a9c17b5c12b85ff0f1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6288569.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6288569.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1938377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1938377.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6607764.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6607764.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6458338.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6458338.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1133922.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1133922.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3221261.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3221261.exe6⤵
- Executes dropped EXE
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0097415.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0097415.exe5⤵
- Executes dropped EXE
PID:3372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5db724ac1fe54cadbb97505382674bdf1
SHA1e02f95ecb344f5d16fc9d0f7531a7dff249f509c
SHA256c855209656fbf86db7c96e731cc9ae35eff8f60193cdbf0e59ee1c6f8cdb93f4
SHA51229b18ab36a12876ded49c8bc22390d1f20f73b0a08deb9996711c55fd13a4e5316d199512dce12a4d68907e8c49d2dbb645cc17f7dd226550f198005941d004b
-
Filesize
722KB
MD5db724ac1fe54cadbb97505382674bdf1
SHA1e02f95ecb344f5d16fc9d0f7531a7dff249f509c
SHA256c855209656fbf86db7c96e731cc9ae35eff8f60193cdbf0e59ee1c6f8cdb93f4
SHA51229b18ab36a12876ded49c8bc22390d1f20f73b0a08deb9996711c55fd13a4e5316d199512dce12a4d68907e8c49d2dbb645cc17f7dd226550f198005941d004b
-
Filesize
497KB
MD569629231ce94ba2f298b60ab3f24f419
SHA15674a16df9d0e9b109106fa271368f7e0bcfad4e
SHA2564b02f2c72d1aa73e5089f65491e0a2263d536659f7a53e6962b32c54e09e4eec
SHA512b4ae94ff0f041b31af791f18cbc99674abcd2e21db3c5c84aef0812a19357e0f7ba7593c5070757ba4f59254dec6b5d398f2fa6b1a79d33d75636c13d73d9414
-
Filesize
497KB
MD569629231ce94ba2f298b60ab3f24f419
SHA15674a16df9d0e9b109106fa271368f7e0bcfad4e
SHA2564b02f2c72d1aa73e5089f65491e0a2263d536659f7a53e6962b32c54e09e4eec
SHA512b4ae94ff0f041b31af791f18cbc99674abcd2e21db3c5c84aef0812a19357e0f7ba7593c5070757ba4f59254dec6b5d398f2fa6b1a79d33d75636c13d73d9414
-
Filesize
372KB
MD525d1f1c66a0e17ae78f15452d53f9ff7
SHA1e71005113efd46cf85e3035118ac14a4947d9b88
SHA256f55fb1b1f3f4084d0eb7c7eac11834502f384e8d527d1c316e407b6b2491f19c
SHA5123514be3d71633b23d9911adb702ab0de901f7e081272326e501c162dcca14c67a246e12dace9afcdb0d221e99d8e4a5e133a5bdf5fc13a9e32d044f2347f95fa
-
Filesize
372KB
MD525d1f1c66a0e17ae78f15452d53f9ff7
SHA1e71005113efd46cf85e3035118ac14a4947d9b88
SHA256f55fb1b1f3f4084d0eb7c7eac11834502f384e8d527d1c316e407b6b2491f19c
SHA5123514be3d71633b23d9911adb702ab0de901f7e081272326e501c162dcca14c67a246e12dace9afcdb0d221e99d8e4a5e133a5bdf5fc13a9e32d044f2347f95fa
-
Filesize
176KB
MD51bf04219ae8b7c1679625bf2d9971b83
SHA1c450c93e09d7cae85d579b197a7fd39e7c33db61
SHA25668aeeab47a0ca61c0a19e01579c9c9c360ff06c49ebc3c34e9368dd4d51f41ee
SHA5123cc5964ebbe917cd4bca1166b20cdb1f103374e9c4e4629364464df8c293afc2ce86af6fdbfc180e6af42c8e6d84a2b8d61abeca8adea4f046ee89ebdae11498
-
Filesize
176KB
MD51bf04219ae8b7c1679625bf2d9971b83
SHA1c450c93e09d7cae85d579b197a7fd39e7c33db61
SHA25668aeeab47a0ca61c0a19e01579c9c9c360ff06c49ebc3c34e9368dd4d51f41ee
SHA5123cc5964ebbe917cd4bca1166b20cdb1f103374e9c4e4629364464df8c293afc2ce86af6fdbfc180e6af42c8e6d84a2b8d61abeca8adea4f046ee89ebdae11498
-
Filesize
217KB
MD5d2989f9dcbc388954f6e264a383ce530
SHA10d1c94d5b6fbeb8006bf7af5938d033599ed1030
SHA256925fbf215ddf9a962422f83a88c15893bc37de34a006701408ae4765f91fbef7
SHA5128e3407c3728955ca5d3f01b4d3ea19b8e380be7be24412b994199df2f617869f644d82cd91663e1595fa7c7fc5b6804f8452fa147428c73d7d950cf08b3bd8b9
-
Filesize
217KB
MD5d2989f9dcbc388954f6e264a383ce530
SHA10d1c94d5b6fbeb8006bf7af5938d033599ed1030
SHA256925fbf215ddf9a962422f83a88c15893bc37de34a006701408ae4765f91fbef7
SHA5128e3407c3728955ca5d3f01b4d3ea19b8e380be7be24412b994199df2f617869f644d82cd91663e1595fa7c7fc5b6804f8452fa147428c73d7d950cf08b3bd8b9
-
Filesize
18KB
MD5124b5cb5ab6b554710cce5aace9ef897
SHA1d923af2f590f761f1b3cd2aaeb991470fbc16e81
SHA2564d6965d61d4b88591f1b95c02fc07e7fa1891597a436bee6f1f2cdfc4827bc49
SHA512a69e262da290c6f4ddcc21d6ceb3566e11d9cef1377531d1420784d92bfa992702f256df0716c92667ec4c93036c6a0a341e1eee2f2e4f84ff8cc2a45ea4295d
-
Filesize
18KB
MD5124b5cb5ab6b554710cce5aace9ef897
SHA1d923af2f590f761f1b3cd2aaeb991470fbc16e81
SHA2564d6965d61d4b88591f1b95c02fc07e7fa1891597a436bee6f1f2cdfc4827bc49
SHA512a69e262da290c6f4ddcc21d6ceb3566e11d9cef1377531d1420784d92bfa992702f256df0716c92667ec4c93036c6a0a341e1eee2f2e4f84ff8cc2a45ea4295d
-
Filesize
141KB
MD5e87bc0926fed26126f12664c857bbbf4
SHA1ffdb47988cac2837ed3b8764c73f9c365ada943f
SHA256b191b2e74a7c9bfe13e644a05d45fe8781cce8ab54f95aa2a43b8dc055b084dc
SHA512dd45eee7cbd62e6e10be0c1bb06618c01423c035f1fbbb5d4dac7433f44a6658791d7698088c5cdcb8c3d5c343832dc6e887d89b90e476ed1510afbd310c4eb5
-
Filesize
141KB
MD5e87bc0926fed26126f12664c857bbbf4
SHA1ffdb47988cac2837ed3b8764c73f9c365ada943f
SHA256b191b2e74a7c9bfe13e644a05d45fe8781cce8ab54f95aa2a43b8dc055b084dc
SHA512dd45eee7cbd62e6e10be0c1bb06618c01423c035f1fbbb5d4dac7433f44a6658791d7698088c5cdcb8c3d5c343832dc6e887d89b90e476ed1510afbd310c4eb5