Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe
-
Size
930KB
-
MD5
ec91000d1fda6ed794def7eb56edac15
-
SHA1
61571ebee201e9a2941d08ea42b425f0166db4bf
-
SHA256
01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9
-
SHA512
38718af9b9bbe1df6dd0430bca6a5d4e2060b0ea69d0d8e99ab94bac93df7ed33f1d7851b93774602bf6b6ccf812dd2618a6e21e7c30cf6c803d6860ed26a20f
-
SSDEEP
24576:iypBFyq17MiYyIBjrII9lCfN3RoWe4/woVvGIgVA:JpBFyq17xYltrIIzEBoK+
Malware Config
Extracted
redline
domka
77.91.124.82:19071
-
auth_value
74e19436acac85e44d691aebcc617529
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023276-33.dat healer behavioral2/files/0x0007000000023276-34.dat healer behavioral2/memory/4536-35-0x0000000000430000-0x000000000043A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3441478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3441478.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q3441478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3441478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3441478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3441478.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3724 z8118158.exe 220 z5422670.exe 232 z8707324.exe 4884 z8632476.exe 4536 q3441478.exe 4796 r6005605.exe 2836 s5408526.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q3441478.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8118158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5422670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8707324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8632476.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 q3441478.exe 4536 q3441478.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 q3441478.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3724 2920 JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe 84 PID 2920 wrote to memory of 3724 2920 JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe 84 PID 2920 wrote to memory of 3724 2920 JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe 84 PID 3724 wrote to memory of 220 3724 z8118158.exe 85 PID 3724 wrote to memory of 220 3724 z8118158.exe 85 PID 3724 wrote to memory of 220 3724 z8118158.exe 85 PID 220 wrote to memory of 232 220 z5422670.exe 87 PID 220 wrote to memory of 232 220 z5422670.exe 87 PID 220 wrote to memory of 232 220 z5422670.exe 87 PID 232 wrote to memory of 4884 232 z8707324.exe 88 PID 232 wrote to memory of 4884 232 z8707324.exe 88 PID 232 wrote to memory of 4884 232 z8707324.exe 88 PID 4884 wrote to memory of 4536 4884 z8632476.exe 89 PID 4884 wrote to memory of 4536 4884 z8632476.exe 89 PID 4884 wrote to memory of 4796 4884 z8632476.exe 92 PID 4884 wrote to memory of 4796 4884 z8632476.exe 92 PID 4884 wrote to memory of 4796 4884 z8632476.exe 92 PID 232 wrote to memory of 2836 232 z8707324.exe 93 PID 232 wrote to memory of 2836 232 z8707324.exe 93 PID 232 wrote to memory of 2836 232 z8707324.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2236
-
C:\Users\Admin\AppData\Local\Temp\JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe"C:\Users\Admin\AppData\Local\Temp\JC_01245370325c4145cd762616c947c24f361ebfe1bab5e0ab453200cfdbdb7ea9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8118158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8118158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5422670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5422670.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707324.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707324.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8632476.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8632476.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3441478.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3441478.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6005605.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6005605.exe6⤵
- Executes dropped EXE
PID:4796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5408526.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5408526.exe5⤵
- Executes dropped EXE
PID:2836
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
825KB
MD5bb3cc3c2a9df7366d52d5f0dbd1ea367
SHA1c14780d11332767ceb3738c1aebc73be41e20b24
SHA256945f90b402af71a65fd502a61413fa63a99b6af4f2375b87b9d5c6ad7016c263
SHA5123c8a77652b5193ae7705cf9a720f5a4aed65fb45f49ed8d2f0cbecde8b71352003279c79d5430dcbeefe7977d9c8468f94180fff04769a519dbba7de410655a7
-
Filesize
825KB
MD5bb3cc3c2a9df7366d52d5f0dbd1ea367
SHA1c14780d11332767ceb3738c1aebc73be41e20b24
SHA256945f90b402af71a65fd502a61413fa63a99b6af4f2375b87b9d5c6ad7016c263
SHA5123c8a77652b5193ae7705cf9a720f5a4aed65fb45f49ed8d2f0cbecde8b71352003279c79d5430dcbeefe7977d9c8468f94180fff04769a519dbba7de410655a7
-
Filesize
599KB
MD5d003d82e7ba641747345a107047aebb2
SHA114280ce520610ad5042600f4bd5c10be783f5c8a
SHA25668b9e533e583bca0a307e93c35d51d72fe2b9a75ec34cf68f481d828bd579e16
SHA5129341fe1f2d4a5b059fdcbb75859eaa56b9be88dc08117b53dbf9c91892db68e7f7717f0728965bc2cce90229622541927283d241bcd8e6ccce4671f11f90fa8f
-
Filesize
599KB
MD5d003d82e7ba641747345a107047aebb2
SHA114280ce520610ad5042600f4bd5c10be783f5c8a
SHA25668b9e533e583bca0a307e93c35d51d72fe2b9a75ec34cf68f481d828bd579e16
SHA5129341fe1f2d4a5b059fdcbb75859eaa56b9be88dc08117b53dbf9c91892db68e7f7717f0728965bc2cce90229622541927283d241bcd8e6ccce4671f11f90fa8f
-
Filesize
373KB
MD5943d6fe5b66eab16ff1f8992aa45bcce
SHA170c78c814452f740bae77f73ac00b7c26e67810d
SHA2567c37db28c0d9f666d261c105638ca106494daee85ae1194f6ab516b60c5a6c94
SHA512c399603badbe5c80c1dab7e3201d1386e5bd08390e8d466ddb527a8a6793b4a1c9c81d2b1bda1c580839d1e11ff869ead0fe5adc4f1c7e582dfa56d87d2d5590
-
Filesize
373KB
MD5943d6fe5b66eab16ff1f8992aa45bcce
SHA170c78c814452f740bae77f73ac00b7c26e67810d
SHA2567c37db28c0d9f666d261c105638ca106494daee85ae1194f6ab516b60c5a6c94
SHA512c399603badbe5c80c1dab7e3201d1386e5bd08390e8d466ddb527a8a6793b4a1c9c81d2b1bda1c580839d1e11ff869ead0fe5adc4f1c7e582dfa56d87d2d5590
-
Filesize
174KB
MD599824cf19d8846e62e72abc86c467e3b
SHA14d3d312a9d90188653b4c044e508b494a24dc0d8
SHA256be1013d6a5de3dfb145d877d5e470cbe15fff2e49f1f49fcdcde8cca44e935dd
SHA5127ce284283e2c4ede7c984cd5e6201068e5c8ceb5548eb949aa85f3bb9fb1555189e3a6ad5a4af60b4efc5a6c0a2bcd979e791b933ecac8bea8607d987af08f13
-
Filesize
174KB
MD599824cf19d8846e62e72abc86c467e3b
SHA14d3d312a9d90188653b4c044e508b494a24dc0d8
SHA256be1013d6a5de3dfb145d877d5e470cbe15fff2e49f1f49fcdcde8cca44e935dd
SHA5127ce284283e2c4ede7c984cd5e6201068e5c8ceb5548eb949aa85f3bb9fb1555189e3a6ad5a4af60b4efc5a6c0a2bcd979e791b933ecac8bea8607d987af08f13
-
Filesize
217KB
MD5153fbb3f225c7bc7b49dad57aab8b8cd
SHA1ea9bdf0b74644b3877d0553fec9fcc01cd1c7f53
SHA256f0a21abf4d3bd4e4a5075f02f70fe527c835ded8bbd755fda59225e1c157c462
SHA512c581f35c23dcc733df522359f46daea2a7d0caedcd7f2e968b713d817b5066dfcaf79e23bd017aaba81884f9ae1395d5d56a1140de894e864e73e12e56a86b05
-
Filesize
217KB
MD5153fbb3f225c7bc7b49dad57aab8b8cd
SHA1ea9bdf0b74644b3877d0553fec9fcc01cd1c7f53
SHA256f0a21abf4d3bd4e4a5075f02f70fe527c835ded8bbd755fda59225e1c157c462
SHA512c581f35c23dcc733df522359f46daea2a7d0caedcd7f2e968b713d817b5066dfcaf79e23bd017aaba81884f9ae1395d5d56a1140de894e864e73e12e56a86b05
-
Filesize
19KB
MD56f683ae7d9c7ea8e725ab9dfc1a9102b
SHA16be785c1cb926a3edd55dbee4b2b2512c1472763
SHA25657d277d14b30679bbdf200a24f00a0509d79ffb243d76958457a8c434fb23b44
SHA5121fa350c28d4e5ed0c0dd3c6b7a039fc7880056bf4a41bfade28f0b1b28c014ae567d903309d060588719d70f771071a3cee65851e56e5ada4ac150ba6f0fd3e9
-
Filesize
19KB
MD56f683ae7d9c7ea8e725ab9dfc1a9102b
SHA16be785c1cb926a3edd55dbee4b2b2512c1472763
SHA25657d277d14b30679bbdf200a24f00a0509d79ffb243d76958457a8c434fb23b44
SHA5121fa350c28d4e5ed0c0dd3c6b7a039fc7880056bf4a41bfade28f0b1b28c014ae567d903309d060588719d70f771071a3cee65851e56e5ada4ac150ba6f0fd3e9
-
Filesize
140KB
MD5a6e2db438d25da1b30ed521f6afd9006
SHA15003d030b33743a7879bbd25628c7b54e349b230
SHA256638bbb6dc6b9abdc798cd185e84caedb20efca78b4a59af6dab86effefe38804
SHA5128684e6fb448fd8cf9f303ee2a8f2ac24f2e17a58f97feef47ab67cfd045002cb121814f0fc53c0280ea45933c89ce6ef6cc56efd34c410e0b16326806da5a07e
-
Filesize
140KB
MD5a6e2db438d25da1b30ed521f6afd9006
SHA15003d030b33743a7879bbd25628c7b54e349b230
SHA256638bbb6dc6b9abdc798cd185e84caedb20efca78b4a59af6dab86effefe38804
SHA5128684e6fb448fd8cf9f303ee2a8f2ac24f2e17a58f97feef47ab67cfd045002cb121814f0fc53c0280ea45933c89ce6ef6cc56efd34c410e0b16326806da5a07e