Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 16:48
Static task
static1
Behavioral task
behavioral1
Sample
f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe
-
Size
829KB
-
MD5
b24eb3d6f4b192da47e778b693b9d8d6
-
SHA1
821401e6683f2038e2786cce49c423ea52c43e6b
-
SHA256
f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581
-
SHA512
7f440bc0b46f3911c9237a40e8997dd282538f6822f19e04daeb51d81433710d603897fdb8e57fe6bf3c4791b737f8bae702d039d15022bf666712ba50db2755
-
SSDEEP
12288:IMrfy90wII/ZiX9pREwKEALkOO4ekPSllmzLTvfcd0dGXU5z67Eq8bCci18Ro0BU:HyqI/+9HEPED4eSzLTsdJ4jqLp8buSU
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002327d-33.dat healer behavioral2/files/0x000700000002327d-34.dat healer behavioral2/memory/216-35-0x0000000000E20000-0x0000000000E2A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5722072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5722072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5722072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5722072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5722072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5722072.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2192 v1697426.exe 1560 v9300151.exe 3420 v3507894.exe 5084 v0937333.exe 216 a5722072.exe 2492 b0086352.exe 3064 c0543259.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5722072.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9300151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3507894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0937333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1697426.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 a5722072.exe 216 a5722072.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 a5722072.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2192 4432 f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe 83 PID 4432 wrote to memory of 2192 4432 f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe 83 PID 4432 wrote to memory of 2192 4432 f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe 83 PID 2192 wrote to memory of 1560 2192 v1697426.exe 84 PID 2192 wrote to memory of 1560 2192 v1697426.exe 84 PID 2192 wrote to memory of 1560 2192 v1697426.exe 84 PID 1560 wrote to memory of 3420 1560 v9300151.exe 85 PID 1560 wrote to memory of 3420 1560 v9300151.exe 85 PID 1560 wrote to memory of 3420 1560 v9300151.exe 85 PID 3420 wrote to memory of 5084 3420 v3507894.exe 86 PID 3420 wrote to memory of 5084 3420 v3507894.exe 86 PID 3420 wrote to memory of 5084 3420 v3507894.exe 86 PID 5084 wrote to memory of 216 5084 v0937333.exe 87 PID 5084 wrote to memory of 216 5084 v0937333.exe 87 PID 5084 wrote to memory of 2492 5084 v0937333.exe 90 PID 5084 wrote to memory of 2492 5084 v0937333.exe 90 PID 5084 wrote to memory of 2492 5084 v0937333.exe 90 PID 3420 wrote to memory of 3064 3420 v3507894.exe 91 PID 3420 wrote to memory of 3064 3420 v3507894.exe 91 PID 3420 wrote to memory of 3064 3420 v3507894.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe"C:\Users\Admin\AppData\Local\Temp\f760709128505dad3c485825b3e72646cbf0702336e3f16e7cd609e1c88a8581_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1697426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1697426.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9300151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9300151.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3507894.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3507894.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0937333.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0937333.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5722072.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5722072.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0086352.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0086352.exe6⤵
- Executes dropped EXE
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0543259.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0543259.exe5⤵
- Executes dropped EXE
PID:3064
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5259d99a52439d61aa285210836e9174f
SHA1aedef2020df3a1e4898e32cf4bc86de42ca8aa1a
SHA256c2f13d10b080f27a7e1c5fa10804705f885d370b8beca0afe3e30b5de18e44d0
SHA512cb81fbcf34944c5a3ab67084d419ad8eb0bcb4ab63334b84a15d079d2015e22fcf0714958ba2f0bc409e36a65ff805959605b1e49a00be6fa8f94a3df6a264c3
-
Filesize
723KB
MD5259d99a52439d61aa285210836e9174f
SHA1aedef2020df3a1e4898e32cf4bc86de42ca8aa1a
SHA256c2f13d10b080f27a7e1c5fa10804705f885d370b8beca0afe3e30b5de18e44d0
SHA512cb81fbcf34944c5a3ab67084d419ad8eb0bcb4ab63334b84a15d079d2015e22fcf0714958ba2f0bc409e36a65ff805959605b1e49a00be6fa8f94a3df6a264c3
-
Filesize
497KB
MD5e764f37b5a039c0aad9839d6b55a0d28
SHA1402f4c4b83e8ac9a727fbf942566e6ea426e86b0
SHA256b81d6594db82f59a08464229230398ffbc1d4be691f33eb42798c6d3bf50d46a
SHA51232f09253a18d44502d0773c38e2ee2526edf7bc627b9cc7422d0fb24fd3c71fc2032b37864262e00a2ed9bff52421f6d6c06161480234cff2e3778c80d0fa074
-
Filesize
497KB
MD5e764f37b5a039c0aad9839d6b55a0d28
SHA1402f4c4b83e8ac9a727fbf942566e6ea426e86b0
SHA256b81d6594db82f59a08464229230398ffbc1d4be691f33eb42798c6d3bf50d46a
SHA51232f09253a18d44502d0773c38e2ee2526edf7bc627b9cc7422d0fb24fd3c71fc2032b37864262e00a2ed9bff52421f6d6c06161480234cff2e3778c80d0fa074
-
Filesize
373KB
MD5becd1299ebd093e0607265ded764c5ee
SHA1ce105f88742e58d460944c30b5cdf3abde7c2398
SHA2565b339b51e7e142d454c4f41e097ecc3d18954c0f43cc173e37a768eacb90e228
SHA51213504e7cf69f3367ba310c761bbc7b8aad6d84b9d340429c0a0436169a8a17ef737fe8a0f37399c16a74825b84e73dbf159ab1fca9b9cbd1634260afb511ac51
-
Filesize
373KB
MD5becd1299ebd093e0607265ded764c5ee
SHA1ce105f88742e58d460944c30b5cdf3abde7c2398
SHA2565b339b51e7e142d454c4f41e097ecc3d18954c0f43cc173e37a768eacb90e228
SHA51213504e7cf69f3367ba310c761bbc7b8aad6d84b9d340429c0a0436169a8a17ef737fe8a0f37399c16a74825b84e73dbf159ab1fca9b9cbd1634260afb511ac51
-
Filesize
174KB
MD58a1214ce4c33a197cc2220ec309cce03
SHA1f45623d7018379c1d8dd330d365ea60899310011
SHA256704b83b01ea884e2addae7150ee6dd3631e0f69d1af725adf36895d5ef07eb7a
SHA5126341ac428b91402bfdcf5ae0fe6027adbbe284df0157f573a7cd92dd927230a56727afbe201d1a9dc8aba15b2f9578de18e31840c41f461c20841b8a7868e3b9
-
Filesize
174KB
MD58a1214ce4c33a197cc2220ec309cce03
SHA1f45623d7018379c1d8dd330d365ea60899310011
SHA256704b83b01ea884e2addae7150ee6dd3631e0f69d1af725adf36895d5ef07eb7a
SHA5126341ac428b91402bfdcf5ae0fe6027adbbe284df0157f573a7cd92dd927230a56727afbe201d1a9dc8aba15b2f9578de18e31840c41f461c20841b8a7868e3b9
-
Filesize
217KB
MD52bc52f7cb8cbb5da7994f659597b22fa
SHA14aa5ba36409432e8105e07e2fba7f7884fe4ca5c
SHA256be30b9c81059ef0f054a08203f20a25e6d76693d2e0c35650f134fbd3b2f1e85
SHA5125295e4a1ff31016f2985c7bec17aa0b7ce0c927510a12c6a75319d00b1a2a737e6ff236665e06f40474547892e4d2c7c2a0ff3f85cd0bb0c1eedd92d6a07cb53
-
Filesize
217KB
MD52bc52f7cb8cbb5da7994f659597b22fa
SHA14aa5ba36409432e8105e07e2fba7f7884fe4ca5c
SHA256be30b9c81059ef0f054a08203f20a25e6d76693d2e0c35650f134fbd3b2f1e85
SHA5125295e4a1ff31016f2985c7bec17aa0b7ce0c927510a12c6a75319d00b1a2a737e6ff236665e06f40474547892e4d2c7c2a0ff3f85cd0bb0c1eedd92d6a07cb53
-
Filesize
18KB
MD57322becca14ea4315255a89d7be9cedb
SHA1abbdf02731839c42d849cc3a50db5c16c47d4839
SHA256229534871203b89e25d7a739e103e599190d340a160b18d8e65934f0315fdd06
SHA5128e00b3f023e23dce845b52534c0d332f0f5c1648fe13254af133cdb11b9ec5444d3c81ad3d029123f7bc673743555dc698688f30bda29dbcd70707030f14db2a
-
Filesize
18KB
MD57322becca14ea4315255a89d7be9cedb
SHA1abbdf02731839c42d849cc3a50db5c16c47d4839
SHA256229534871203b89e25d7a739e103e599190d340a160b18d8e65934f0315fdd06
SHA5128e00b3f023e23dce845b52534c0d332f0f5c1648fe13254af133cdb11b9ec5444d3c81ad3d029123f7bc673743555dc698688f30bda29dbcd70707030f14db2a
-
Filesize
140KB
MD5a247e59a998942f30bafcbf068348d11
SHA168899e7a61959509aec0b937609913d60e22961c
SHA256fa01d62aa5f00dad475376401126bc25e6f3f31ac6e45fce951a04f72f38ed77
SHA5126dced6fc68d646dcd57ae8ec46d13d9bd03c30776d249d2bb2a298ffca0d7045f19e5b919e524632609b5ab9eb3ecf3a5cdf4c26a02ff7805ee2bf141bf87cc8
-
Filesize
140KB
MD5a247e59a998942f30bafcbf068348d11
SHA168899e7a61959509aec0b937609913d60e22961c
SHA256fa01d62aa5f00dad475376401126bc25e6f3f31ac6e45fce951a04f72f38ed77
SHA5126dced6fc68d646dcd57ae8ec46d13d9bd03c30776d249d2bb2a298ffca0d7045f19e5b919e524632609b5ab9eb3ecf3a5cdf4c26a02ff7805ee2bf141bf87cc8