Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe
-
Size
829KB
-
MD5
0716527a972e074edbc0d866a98100aa
-
SHA1
f5df6609c87446d245aeb807a6e9740dbc48022b
-
SHA256
2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199
-
SHA512
db192ab2c66bc943801cf222a66aab87ca462d493852a596a6551e7277a6098c5fd21f4b5f8224b290d4f43a295a17af07a3acb4dd163fef6c424cf6c86bf4dc
-
SSDEEP
12288:tMrZy903vIMu3M/NB2rwNQnnMhnkHT/g7aYqFlTldyAN2Q0EWzSMBs1Q2HEz:QyIIZ3M/NBowingnkHT/gJKvMtrGMx
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023241-33.dat healer behavioral2/files/0x0007000000023241-34.dat healer behavioral2/memory/4456-35-0x0000000000520000-0x000000000052A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4106910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4106910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4106910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4106910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4106910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4106910.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 844 v7375466.exe 1272 v9247784.exe 2896 v5663578.exe 2728 v5149467.exe 4456 a4106910.exe 5104 b1675370.exe 1208 c5629138.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4106910.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5149467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7375466.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9247784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5663578.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4456 a4106910.exe 4456 a4106910.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4456 a4106910.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2720 wrote to memory of 844 2720 JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe 83 PID 2720 wrote to memory of 844 2720 JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe 83 PID 2720 wrote to memory of 844 2720 JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe 83 PID 844 wrote to memory of 1272 844 v7375466.exe 85 PID 844 wrote to memory of 1272 844 v7375466.exe 85 PID 844 wrote to memory of 1272 844 v7375466.exe 85 PID 1272 wrote to memory of 2896 1272 v9247784.exe 86 PID 1272 wrote to memory of 2896 1272 v9247784.exe 86 PID 1272 wrote to memory of 2896 1272 v9247784.exe 86 PID 2896 wrote to memory of 2728 2896 v5663578.exe 87 PID 2896 wrote to memory of 2728 2896 v5663578.exe 87 PID 2896 wrote to memory of 2728 2896 v5663578.exe 87 PID 2728 wrote to memory of 4456 2728 v5149467.exe 88 PID 2728 wrote to memory of 4456 2728 v5149467.exe 88 PID 2728 wrote to memory of 5104 2728 v5149467.exe 91 PID 2728 wrote to memory of 5104 2728 v5149467.exe 91 PID 2728 wrote to memory of 5104 2728 v5149467.exe 91 PID 2896 wrote to memory of 1208 2896 v5663578.exe 92 PID 2896 wrote to memory of 1208 2896 v5663578.exe 92 PID 2896 wrote to memory of 1208 2896 v5663578.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe"C:\Users\Admin\AppData\Local\Temp\JC_2af40a3b4910b714915c754ec4932ea56de54c62196097e4e0938babefe8e199.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7375466.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7375466.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9247784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9247784.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5663578.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5663578.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5149467.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5149467.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4106910.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4106910.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1675370.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1675370.exe6⤵
- Executes dropped EXE
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5629138.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5629138.exe5⤵
- Executes dropped EXE
PID:1208
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD59b2d21d2d545402f523b0a85f45b8b45
SHA129b2052f660b61c9aa14249693d3fc899a5df04f
SHA256d0e267ce3bbe21cb6705b19a08784853e29ee43bcaf0db6691d059a9e6b46495
SHA51241a4823ac7e0d9a3babbbe85ef1352d5d7e1f30244aa1c7497ec8e7b897999d35f543dccce40caacd55ac0fc9998d2e39a1aace45567cd64b79f655c5f14adc0
-
Filesize
723KB
MD59b2d21d2d545402f523b0a85f45b8b45
SHA129b2052f660b61c9aa14249693d3fc899a5df04f
SHA256d0e267ce3bbe21cb6705b19a08784853e29ee43bcaf0db6691d059a9e6b46495
SHA51241a4823ac7e0d9a3babbbe85ef1352d5d7e1f30244aa1c7497ec8e7b897999d35f543dccce40caacd55ac0fc9998d2e39a1aace45567cd64b79f655c5f14adc0
-
Filesize
497KB
MD5b7df63815c17d7fced5f8f355b537178
SHA198bf8f79352004f4cb52b9d47c425cd37d7386ec
SHA2566154746cdf730b9314e18d2518d20a07cbae34bddaed743a64882ecb43827913
SHA5128563eaec8cd17c39e5873d682cf5fd20a8783a2b39a5c6e2a7e72721f45c091a41033fe0216036e6af048318c5a0aaf1e25703dde7e610f11056016b40fd7590
-
Filesize
497KB
MD5b7df63815c17d7fced5f8f355b537178
SHA198bf8f79352004f4cb52b9d47c425cd37d7386ec
SHA2566154746cdf730b9314e18d2518d20a07cbae34bddaed743a64882ecb43827913
SHA5128563eaec8cd17c39e5873d682cf5fd20a8783a2b39a5c6e2a7e72721f45c091a41033fe0216036e6af048318c5a0aaf1e25703dde7e610f11056016b40fd7590
-
Filesize
373KB
MD5a50159eddee7cc5d1f3c4b853fa33125
SHA117f793fde86734966f250838c56ccf71e3a5b7d5
SHA2564aad119947a4a5864f9ec3879ff4d5d5f773a51193768cfe196c681bb41d4272
SHA512a34a67b6897fb95bc16df1fefeba27bf01c7fb71aca362f7dd95da0faf95359ac0b4043e6086c0d1f68456c7544bffbf9c7b1d01b2e97e351b055e0926e015f4
-
Filesize
373KB
MD5a50159eddee7cc5d1f3c4b853fa33125
SHA117f793fde86734966f250838c56ccf71e3a5b7d5
SHA2564aad119947a4a5864f9ec3879ff4d5d5f773a51193768cfe196c681bb41d4272
SHA512a34a67b6897fb95bc16df1fefeba27bf01c7fb71aca362f7dd95da0faf95359ac0b4043e6086c0d1f68456c7544bffbf9c7b1d01b2e97e351b055e0926e015f4
-
Filesize
174KB
MD53cdb080efe1ab2180e230502be1826f9
SHA173d2435dc57d0ef5952a67015bb1c3d2d93953f0
SHA256e0b1d51b59ac8dd34474fa7840f6887d50399710795f0d187dae51ad070d6b25
SHA5125e7f06d62be3c8ffe1c8b811046ea6d533d39d12df12b15d2a01e5ca6f0b4c1cd6e8b35fea91711f5aafc0be872fed50d9f3636de5bfafbe0a95edf763ab23c4
-
Filesize
174KB
MD53cdb080efe1ab2180e230502be1826f9
SHA173d2435dc57d0ef5952a67015bb1c3d2d93953f0
SHA256e0b1d51b59ac8dd34474fa7840f6887d50399710795f0d187dae51ad070d6b25
SHA5125e7f06d62be3c8ffe1c8b811046ea6d533d39d12df12b15d2a01e5ca6f0b4c1cd6e8b35fea91711f5aafc0be872fed50d9f3636de5bfafbe0a95edf763ab23c4
-
Filesize
217KB
MD5cd19edea68d9e9fb7b53fcc5bec4dade
SHA1bb50635d27e0c0e3ad99a3a9157bbb584444df39
SHA256186a3b33aaedcbf335ff1a9ebc97644caaad963ea76039a24f2212680a30ab6a
SHA512ae38831dec083bbde301918f2176344bf7583f2cae3f9f6e7fd5a6377d1bf120aae84c75e43989b2a87e80d6e9fbf98b8eb36707fadd5e8b7af9f2a2866bc306
-
Filesize
217KB
MD5cd19edea68d9e9fb7b53fcc5bec4dade
SHA1bb50635d27e0c0e3ad99a3a9157bbb584444df39
SHA256186a3b33aaedcbf335ff1a9ebc97644caaad963ea76039a24f2212680a30ab6a
SHA512ae38831dec083bbde301918f2176344bf7583f2cae3f9f6e7fd5a6377d1bf120aae84c75e43989b2a87e80d6e9fbf98b8eb36707fadd5e8b7af9f2a2866bc306
-
Filesize
19KB
MD5d3a22fd74fb7ec2ec66da0200ee00aa1
SHA152b644daac107e00e804eaa4754492a92f370a3c
SHA256e63cff2a160f918a88e9b519b62fd797f84a3b055f726d2cbe666a138071ca29
SHA5127ac3d27ab853ac49803a4e53d96af962d902d501706244148a56d1f882cb14fc6e5ce1acbc8b2c35221f883a5f600fd6a72d7ac879b0d55453c531f3b80744ef
-
Filesize
19KB
MD5d3a22fd74fb7ec2ec66da0200ee00aa1
SHA152b644daac107e00e804eaa4754492a92f370a3c
SHA256e63cff2a160f918a88e9b519b62fd797f84a3b055f726d2cbe666a138071ca29
SHA5127ac3d27ab853ac49803a4e53d96af962d902d501706244148a56d1f882cb14fc6e5ce1acbc8b2c35221f883a5f600fd6a72d7ac879b0d55453c531f3b80744ef
-
Filesize
140KB
MD5c01675c372963449025ad80a28934162
SHA1acbf23da8072e2235bea9291ed4da54cdf8934d9
SHA256d91f5eb43882a5a0daec4572c38fae11283ce3e7ea41542e94771c2bcd877592
SHA512236dd245a93b00c316a4a0812f83eaee6b79fe7de70e0ea07c317fe3547663f7d04697d6bf7199004b3810bc6f117ec70469bbb43c1cb0545bbbe39137e6bfaf
-
Filesize
140KB
MD5c01675c372963449025ad80a28934162
SHA1acbf23da8072e2235bea9291ed4da54cdf8934d9
SHA256d91f5eb43882a5a0daec4572c38fae11283ce3e7ea41542e94771c2bcd877592
SHA512236dd245a93b00c316a4a0812f83eaee6b79fe7de70e0ea07c317fe3547663f7d04697d6bf7199004b3810bc6f117ec70469bbb43c1cb0545bbbe39137e6bfaf