Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
01-09-2023 10:14
Static task
static1
Behavioral task
behavioral1
Sample
87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe
Resource
win10-20230831-en
General
-
Target
87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe
-
Size
829KB
-
MD5
adf392614475570a4be8309398e97bdc
-
SHA1
628898d1e3a12013fad112537b20bacee20e97b2
-
SHA256
87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b
-
SHA512
8effef99cc6b26fb6f49e5357b3451db854a4dd1ca3abba76ef8693018d002d91fb94723b0f7a383c3c4552078f6f9702120891a3853a6a881fab5cdba494e56
-
SSDEEP
24576:byAjxlqKdfvcBPI8XyrWOgcqBtdYV0Fzty:OAjXqKdf0hzqgcq6VC5
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afe9-33.dat healer behavioral1/files/0x000700000001afe9-34.dat healer behavioral1/memory/4816-35-0x0000000000600000-0x000000000060A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0832965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0832965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0832965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0832965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0832965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4412 v7552807.exe 4780 v5898080.exe 4792 v8800665.exe 2264 v9289437.exe 4816 a0832965.exe 4404 b5748260.exe 2876 c8220955.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a0832965.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7552807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5898080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8800665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9289437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4816 a0832965.exe 4816 a0832965.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4816 a0832965.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4412 4364 87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe 70 PID 4364 wrote to memory of 4412 4364 87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe 70 PID 4364 wrote to memory of 4412 4364 87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe 70 PID 4412 wrote to memory of 4780 4412 v7552807.exe 71 PID 4412 wrote to memory of 4780 4412 v7552807.exe 71 PID 4412 wrote to memory of 4780 4412 v7552807.exe 71 PID 4780 wrote to memory of 4792 4780 v5898080.exe 72 PID 4780 wrote to memory of 4792 4780 v5898080.exe 72 PID 4780 wrote to memory of 4792 4780 v5898080.exe 72 PID 4792 wrote to memory of 2264 4792 v8800665.exe 73 PID 4792 wrote to memory of 2264 4792 v8800665.exe 73 PID 4792 wrote to memory of 2264 4792 v8800665.exe 73 PID 2264 wrote to memory of 4816 2264 v9289437.exe 74 PID 2264 wrote to memory of 4816 2264 v9289437.exe 74 PID 2264 wrote to memory of 4404 2264 v9289437.exe 75 PID 2264 wrote to memory of 4404 2264 v9289437.exe 75 PID 2264 wrote to memory of 4404 2264 v9289437.exe 75 PID 4792 wrote to memory of 2876 4792 v8800665.exe 76 PID 4792 wrote to memory of 2876 4792 v8800665.exe 76 PID 4792 wrote to memory of 2876 4792 v8800665.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe"C:\Users\Admin\AppData\Local\Temp\87cbd11dc21a1d8ab83fad63e1d2ea8da6970b843455e6522e6d87747a4cc01b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7552807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7552807.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5898080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5898080.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8800665.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8800665.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9289437.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9289437.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0832965.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0832965.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5748260.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5748260.exe6⤵
- Executes dropped EXE
PID:4404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8220955.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8220955.exe5⤵
- Executes dropped EXE
PID:2876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5ad87fa84814f7f51a2ffc5ba507515aa
SHA1e414b88cd0923232f34021d43607af33170b6b50
SHA25620ef7cef043a43d36e2ae99b40e6bce6077f308b1aaeff56d15147b79bf9bce2
SHA5120554dc1cb90015a138350db6a621af4dada89180167fd76610cdec71add26ed947989db43fb4524fd7e3b63fc8c95799dd0c7526acfe02539bbcd8b413a98c2d
-
Filesize
724KB
MD5ad87fa84814f7f51a2ffc5ba507515aa
SHA1e414b88cd0923232f34021d43607af33170b6b50
SHA25620ef7cef043a43d36e2ae99b40e6bce6077f308b1aaeff56d15147b79bf9bce2
SHA5120554dc1cb90015a138350db6a621af4dada89180167fd76610cdec71add26ed947989db43fb4524fd7e3b63fc8c95799dd0c7526acfe02539bbcd8b413a98c2d
-
Filesize
497KB
MD5d4d771223d803cbf2eccbdd47c50d59e
SHA1aac7c897ffde812a753bee5fdccf5a8c40c29860
SHA256c65d5a8f496a8bc8424cadd7ed6cdb7c3c7251c5344da4b7aaa75d69dbd1ad8d
SHA512474c08ac89637f433436fd2cb9c82a1e8e55c5b0d6de97e286c79db31de9cead5546d900e3efc022a55c70ab6c1fdabdfc597cac03e3afed9b7a439d4c9bd422
-
Filesize
497KB
MD5d4d771223d803cbf2eccbdd47c50d59e
SHA1aac7c897ffde812a753bee5fdccf5a8c40c29860
SHA256c65d5a8f496a8bc8424cadd7ed6cdb7c3c7251c5344da4b7aaa75d69dbd1ad8d
SHA512474c08ac89637f433436fd2cb9c82a1e8e55c5b0d6de97e286c79db31de9cead5546d900e3efc022a55c70ab6c1fdabdfc597cac03e3afed9b7a439d4c9bd422
-
Filesize
373KB
MD580dcb27588d3caa8a43804a9e09492de
SHA18c879dbf848c5160f9b42e80ffd69d8519d5dfc2
SHA2560f30849817c672a97c5ebf349eb5f115ee18b2d3e75cc8725be9e28acc794bd9
SHA51268b96fb534c3a9f8d91e62d6be2282d65be9db2e7a8eaa78c17de4387e8ea4be9528e01fe259d5c9c64db3a26fde478f5623fe1ced5641ec9c237f4590e89ef1
-
Filesize
373KB
MD580dcb27588d3caa8a43804a9e09492de
SHA18c879dbf848c5160f9b42e80ffd69d8519d5dfc2
SHA2560f30849817c672a97c5ebf349eb5f115ee18b2d3e75cc8725be9e28acc794bd9
SHA51268b96fb534c3a9f8d91e62d6be2282d65be9db2e7a8eaa78c17de4387e8ea4be9528e01fe259d5c9c64db3a26fde478f5623fe1ced5641ec9c237f4590e89ef1
-
Filesize
174KB
MD52f07092486fd88223819ed93d460f5f5
SHA1e0b9f63beb94101494b4ea4cb16d69dcb02251c2
SHA25624b2436e57c4ffcc82e4c2366b1b1d8861c93501ef81f1f93bab641453400f82
SHA512497efc1859779e49b4bd397cfa90f5dea36860471a349f71973bf4c705ca74bd0cbff1efb2cc1f5f0a3635ca819a75aaf27b6f56157bbfd62095e7eb53c744e7
-
Filesize
174KB
MD52f07092486fd88223819ed93d460f5f5
SHA1e0b9f63beb94101494b4ea4cb16d69dcb02251c2
SHA25624b2436e57c4ffcc82e4c2366b1b1d8861c93501ef81f1f93bab641453400f82
SHA512497efc1859779e49b4bd397cfa90f5dea36860471a349f71973bf4c705ca74bd0cbff1efb2cc1f5f0a3635ca819a75aaf27b6f56157bbfd62095e7eb53c744e7
-
Filesize
217KB
MD5af5e2ece543d16cc7653306d0f637596
SHA107f12a4f74aeb1dcec97ea7f0660ee63fea43820
SHA25666680d2a3cb3d9b105da05ba0d3f7bca499a614707ff1779558f302286eac939
SHA512d7c7d89c0cadfd7f711f8123b68553acb7e52654635641137e5a0ad3fe8c7897e52f1db984e0dbcf79967d75098a1725b2545a2b92b3bccfac74d139e2b02e20
-
Filesize
217KB
MD5af5e2ece543d16cc7653306d0f637596
SHA107f12a4f74aeb1dcec97ea7f0660ee63fea43820
SHA25666680d2a3cb3d9b105da05ba0d3f7bca499a614707ff1779558f302286eac939
SHA512d7c7d89c0cadfd7f711f8123b68553acb7e52654635641137e5a0ad3fe8c7897e52f1db984e0dbcf79967d75098a1725b2545a2b92b3bccfac74d139e2b02e20
-
Filesize
19KB
MD5cea108b4d07fb41b2e474ee12f170126
SHA1223d3da32a5be51477421c6b55cd1d995859e4a2
SHA2564e1c0327636d11aef7b9cc55a25410521241ece3620ec0d14ac2f901c8df9cc6
SHA51260231cdb5a57d8ae0ee70ded345f49a3364602f59ec89c75902348147bedbe4105b4c1a0ccc28082f2b6aea22865e97ecd846a3d2442c91875f3a3401eb958ee
-
Filesize
19KB
MD5cea108b4d07fb41b2e474ee12f170126
SHA1223d3da32a5be51477421c6b55cd1d995859e4a2
SHA2564e1c0327636d11aef7b9cc55a25410521241ece3620ec0d14ac2f901c8df9cc6
SHA51260231cdb5a57d8ae0ee70ded345f49a3364602f59ec89c75902348147bedbe4105b4c1a0ccc28082f2b6aea22865e97ecd846a3d2442c91875f3a3401eb958ee
-
Filesize
141KB
MD5148d2847f1cf482b2ad44db77fe115be
SHA1468a0964ede764d0686054984bbf1dacb975aaa1
SHA25665b02d6f619152b24364f29501fc7b82d918f62226a8162c4cf6ed9df5378404
SHA512c692752edd22ae8081e54392c45189cc1a75f59d7e865a2ece308b5461055a741ef40b7dd7355a003fd40e094fd0c436fb3b584183c34a8f47b468476b606886
-
Filesize
141KB
MD5148d2847f1cf482b2ad44db77fe115be
SHA1468a0964ede764d0686054984bbf1dacb975aaa1
SHA25665b02d6f619152b24364f29501fc7b82d918f62226a8162c4cf6ed9df5378404
SHA512c692752edd22ae8081e54392c45189cc1a75f59d7e865a2ece308b5461055a741ef40b7dd7355a003fd40e094fd0c436fb3b584183c34a8f47b468476b606886