Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe
Resource
win10v2004-20230831-en
General
-
Target
08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe
-
Size
828KB
-
MD5
9ac03c3dfd33dd14d00f642ea76bd9fb
-
SHA1
17a1c544ad383e32d3220a7159a0ac7bd0965e6d
-
SHA256
08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a
-
SHA512
42b499574fa33c6fd32a66dcce2d981c0964fcda36dcec3d1d7865da9870c2f986d2b1d35be4701fba1fcd659feea216faaf5aaa9b72ae152e9141f69aeb7760
-
SSDEEP
24576:ApyTy5XCPGZsGVntaxtNm3yAeloQef9aS:AcTwXoGZPVnIwiAelO
Malware Config
Extracted
redline
domka
77.91.124.82:19071
-
auth_value
74e19436acac85e44d691aebcc617529
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023165-34.dat healer behavioral1/files/0x0007000000023165-33.dat healer behavioral1/memory/4620-35-0x0000000000590000-0x000000000059A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8152021.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8152021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8152021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8152021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8152021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8152021.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3472 v0132572.exe 1600 v3936779.exe 4928 v0164219.exe 4880 v7138857.exe 4620 a8152021.exe 4668 b8169670.exe 3908 c5366957.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8152021.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0132572.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3936779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0164219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7138857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4620 a8152021.exe 4620 a8152021.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4620 a8152021.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3856 wrote to memory of 3472 3856 08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe 80 PID 3856 wrote to memory of 3472 3856 08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe 80 PID 3856 wrote to memory of 3472 3856 08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe 80 PID 3472 wrote to memory of 1600 3472 v0132572.exe 81 PID 3472 wrote to memory of 1600 3472 v0132572.exe 81 PID 3472 wrote to memory of 1600 3472 v0132572.exe 81 PID 1600 wrote to memory of 4928 1600 v3936779.exe 82 PID 1600 wrote to memory of 4928 1600 v3936779.exe 82 PID 1600 wrote to memory of 4928 1600 v3936779.exe 82 PID 4928 wrote to memory of 4880 4928 v0164219.exe 83 PID 4928 wrote to memory of 4880 4928 v0164219.exe 83 PID 4928 wrote to memory of 4880 4928 v0164219.exe 83 PID 4880 wrote to memory of 4620 4880 v7138857.exe 84 PID 4880 wrote to memory of 4620 4880 v7138857.exe 84 PID 4880 wrote to memory of 4668 4880 v7138857.exe 86 PID 4880 wrote to memory of 4668 4880 v7138857.exe 86 PID 4880 wrote to memory of 4668 4880 v7138857.exe 86 PID 4928 wrote to memory of 3908 4928 v0164219.exe 87 PID 4928 wrote to memory of 3908 4928 v0164219.exe 87 PID 4928 wrote to memory of 3908 4928 v0164219.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe"C:\Users\Admin\AppData\Local\Temp\08a8f0fc2a50de55a3f7f1c18d61671063fd6901857325417dbc09256b9fef2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0132572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0132572.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3936779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3936779.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0164219.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0164219.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7138857.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7138857.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8152021.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8152021.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8169670.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8169670.exe6⤵
- Executes dropped EXE
PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5366957.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5366957.exe5⤵
- Executes dropped EXE
PID:3908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD52f9850307ace27b8d83889c88ba85632
SHA1fe9dee8df1976600e5a4e78fd7b50c1ee10c0182
SHA25616ddba3707ba029f28e3b261cc3249718060af30b538c28f488666ade2ee2787
SHA51285c5a73ef7a9caf01722c9f737f7d021f0ef0932d79a2caae928d04c766d672953c04703cb983624f182824b224561771d79793369795ea1d81f8364d48ef75c
-
Filesize
724KB
MD52f9850307ace27b8d83889c88ba85632
SHA1fe9dee8df1976600e5a4e78fd7b50c1ee10c0182
SHA25616ddba3707ba029f28e3b261cc3249718060af30b538c28f488666ade2ee2787
SHA51285c5a73ef7a9caf01722c9f737f7d021f0ef0932d79a2caae928d04c766d672953c04703cb983624f182824b224561771d79793369795ea1d81f8364d48ef75c
-
Filesize
497KB
MD5594d679a7c8253c85750eff1e00d9c18
SHA12fb01e72ece8dffd1209d2127d952b845bfed8de
SHA2563a7aab8802d4dad9d6615a2aa990ff1bd53b8b92ee34348ab98270498ff219d3
SHA512cd4015844c83885afe775a6665e1d9027cd9129f0b70a5422d9d0dce742293e5e2965c0bac5a6c96161ab553333449a2529a258eab02cf1ab3977a8e0922a101
-
Filesize
497KB
MD5594d679a7c8253c85750eff1e00d9c18
SHA12fb01e72ece8dffd1209d2127d952b845bfed8de
SHA2563a7aab8802d4dad9d6615a2aa990ff1bd53b8b92ee34348ab98270498ff219d3
SHA512cd4015844c83885afe775a6665e1d9027cd9129f0b70a5422d9d0dce742293e5e2965c0bac5a6c96161ab553333449a2529a258eab02cf1ab3977a8e0922a101
-
Filesize
372KB
MD5a6d514248ac8f9aaec149fd4396eb333
SHA196fb31b30caf1cd57ca638be5ab86c2a9be2ad56
SHA256cecc6906ce33cc80201c29db4d00a0a9cdf99c7a30c6cae1ad89851f2535b5e2
SHA512a707d4c355739776a8f2f1828f973aa74fc506d1d47320a6b2c66f82baaea6184340f9c8f5f92c79b494786da010c5f6a5a041f6ec75c1cd6a2255916ebae420
-
Filesize
372KB
MD5a6d514248ac8f9aaec149fd4396eb333
SHA196fb31b30caf1cd57ca638be5ab86c2a9be2ad56
SHA256cecc6906ce33cc80201c29db4d00a0a9cdf99c7a30c6cae1ad89851f2535b5e2
SHA512a707d4c355739776a8f2f1828f973aa74fc506d1d47320a6b2c66f82baaea6184340f9c8f5f92c79b494786da010c5f6a5a041f6ec75c1cd6a2255916ebae420
-
Filesize
174KB
MD5c7b1f1cb61aeed8a47dcc3a453aa8575
SHA163286a40d414b0dd7d0c1a14583bcdbc996cd18c
SHA25695723e39a8cbc80fa672eac59ccf654549f06f8a816bc3e0bb7a0f80de090e85
SHA5126d279c04efdc0d41046e85d2c9fd4599996914cbc82b1e9ee0f10973bb5dbc94f8e1f6ed70f4d77cf1bb0d4276db74d575b47109246f5658b93d12a25530b678
-
Filesize
174KB
MD5c7b1f1cb61aeed8a47dcc3a453aa8575
SHA163286a40d414b0dd7d0c1a14583bcdbc996cd18c
SHA25695723e39a8cbc80fa672eac59ccf654549f06f8a816bc3e0bb7a0f80de090e85
SHA5126d279c04efdc0d41046e85d2c9fd4599996914cbc82b1e9ee0f10973bb5dbc94f8e1f6ed70f4d77cf1bb0d4276db74d575b47109246f5658b93d12a25530b678
-
Filesize
217KB
MD5ce9cc38c59d8222e6fb89398ea43c916
SHA1bad014533bf2adabba4da8875ac74b42c2427930
SHA2568e02dc57234355cbe458f150adc7433e49cfaeca8d153137df508d331fc01d10
SHA5126a740388031c320d250019e997f155856b5cec60625080677f13594a6d70ca98153f77ea55b5a9b573354f4daf5f5f409a46fba2af8933e1c44fbbda1496fd51
-
Filesize
217KB
MD5ce9cc38c59d8222e6fb89398ea43c916
SHA1bad014533bf2adabba4da8875ac74b42c2427930
SHA2568e02dc57234355cbe458f150adc7433e49cfaeca8d153137df508d331fc01d10
SHA5126a740388031c320d250019e997f155856b5cec60625080677f13594a6d70ca98153f77ea55b5a9b573354f4daf5f5f409a46fba2af8933e1c44fbbda1496fd51
-
Filesize
19KB
MD5f06d5f7cbe1729ed1ae16404ea3df31b
SHA17c1ad61f3e2782ea0febeee5967806b3e118f393
SHA256d7bcdd7a4720fc2c45e8749d7c977576dcd0853ec43838859a71d67d7c6b2d69
SHA5129d03a5d21ecc05f389cd9e910962ccacfbb3def1a38c214510e6c2918b20df3dc32ca23488ac0147e8bc115edcc13c2cf22f8800f950227405b2ca186aee10ae
-
Filesize
19KB
MD5f06d5f7cbe1729ed1ae16404ea3df31b
SHA17c1ad61f3e2782ea0febeee5967806b3e118f393
SHA256d7bcdd7a4720fc2c45e8749d7c977576dcd0853ec43838859a71d67d7c6b2d69
SHA5129d03a5d21ecc05f389cd9e910962ccacfbb3def1a38c214510e6c2918b20df3dc32ca23488ac0147e8bc115edcc13c2cf22f8800f950227405b2ca186aee10ae
-
Filesize
140KB
MD55fadbe1f22b30e9ab1deb90d99462f2d
SHA150c549365eb072f0d44ca0865e63b989c2e3ad28
SHA2562013e760c99ffd6bf36b3290112e426f4e322724b211f27873ff70d69fcf6d88
SHA51296b5fb633cbe439b236052049811566d739ed3013e74b84ddd1f49271293a112b53fbefc0843993928f792482c6b4bff62c3e13c0da3188e712a39d7b0069f7a
-
Filesize
140KB
MD55fadbe1f22b30e9ab1deb90d99462f2d
SHA150c549365eb072f0d44ca0865e63b989c2e3ad28
SHA2562013e760c99ffd6bf36b3290112e426f4e322724b211f27873ff70d69fcf6d88
SHA51296b5fb633cbe439b236052049811566d739ed3013e74b84ddd1f49271293a112b53fbefc0843993928f792482c6b4bff62c3e13c0da3188e712a39d7b0069f7a