Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 19:18
Static task
static1
Behavioral task
behavioral1
Sample
JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe
-
Size
930KB
-
MD5
b1c91dfe5e7acfd456da745113fbb936
-
SHA1
9351c757766ab66f64a4816d4ba9d05cb0914ecb
-
SHA256
7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5
-
SHA512
9fdd409466860ee070b0929cad4009faf9387bff16df104b9fcc0d7636bf5340ddb38a066529b7033272b1094ce4d53d224e7cbf791595bd88276e383382c3b6
-
SSDEEP
24576:tysQamVA9ssr+advJF+BD8uZjkjSOGVLX:IsQjA9DrdObW2
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000800000002317c-34.dat healer behavioral2/files/0x000800000002317c-33.dat healer behavioral2/memory/5116-35-0x0000000000F50000-0x0000000000F5A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8246959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8246959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8246959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8246959.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8246959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8246959.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4244 z2172217.exe 2880 z7448172.exe 1156 z5238597.exe 4964 z8231296.exe 5116 q8246959.exe 2576 r0263729.exe 4504 s0386718.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8246959.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8231296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2172217.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7448172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5238597.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5116 q8246959.exe 5116 q8246959.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5116 q8246959.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4244 2816 JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe 80 PID 2816 wrote to memory of 4244 2816 JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe 80 PID 2816 wrote to memory of 4244 2816 JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe 80 PID 4244 wrote to memory of 2880 4244 z2172217.exe 81 PID 4244 wrote to memory of 2880 4244 z2172217.exe 81 PID 4244 wrote to memory of 2880 4244 z2172217.exe 81 PID 2880 wrote to memory of 1156 2880 z7448172.exe 82 PID 2880 wrote to memory of 1156 2880 z7448172.exe 82 PID 2880 wrote to memory of 1156 2880 z7448172.exe 82 PID 1156 wrote to memory of 4964 1156 z5238597.exe 83 PID 1156 wrote to memory of 4964 1156 z5238597.exe 83 PID 1156 wrote to memory of 4964 1156 z5238597.exe 83 PID 4964 wrote to memory of 5116 4964 z8231296.exe 84 PID 4964 wrote to memory of 5116 4964 z8231296.exe 84 PID 4964 wrote to memory of 2576 4964 z8231296.exe 85 PID 4964 wrote to memory of 2576 4964 z8231296.exe 85 PID 4964 wrote to memory of 2576 4964 z8231296.exe 85 PID 1156 wrote to memory of 4504 1156 z5238597.exe 86 PID 1156 wrote to memory of 4504 1156 z5238597.exe 86 PID 1156 wrote to memory of 4504 1156 z5238597.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe"C:\Users\Admin\AppData\Local\Temp\JC_7b393839706fc44d8effc36ed3c9538240443d9fb9d64507b5c63b28b01a16d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2172217.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7448172.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5238597.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8231296.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8246959.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0263729.exe6⤵
- Executes dropped EXE
PID:2576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0386718.exe5⤵
- Executes dropped EXE
PID:4504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD5578c7a5afb5a984a0fb766372a00581f
SHA1bcfb4b4a8a7c79ab1c94c45adb08265e20c93296
SHA256ac004e5cda7900398b6c47019e3d64c28efdfbba61f59fe4df6c3edc0d8abd21
SHA5129214d6afdb1caba6ef3b18d9c560fc60014a8cd1e36715db943fef9acd45b3fa9d9170e25642e77ac64e7e7261f9e0a03abb01c218940bee58666a8825745dc1
-
Filesize
824KB
MD5578c7a5afb5a984a0fb766372a00581f
SHA1bcfb4b4a8a7c79ab1c94c45adb08265e20c93296
SHA256ac004e5cda7900398b6c47019e3d64c28efdfbba61f59fe4df6c3edc0d8abd21
SHA5129214d6afdb1caba6ef3b18d9c560fc60014a8cd1e36715db943fef9acd45b3fa9d9170e25642e77ac64e7e7261f9e0a03abb01c218940bee58666a8825745dc1
-
Filesize
599KB
MD55144b39f3106b55ca2cb459767186f91
SHA1d855ab3bafc03bfb846e4638d22ad8248fae1bf4
SHA2567e72a669ca31c7bdb820aa040bcbdf865e2ad7ed0eeed0de484f1c53b4597887
SHA512b48f7a6edda9d1a164b99ccac61588e726f91164a22c29fa3ddd4a3af6beef144a106f3adff1c61638abaae0008ef57bf490226bce41cf7db8f716ae0059d026
-
Filesize
599KB
MD55144b39f3106b55ca2cb459767186f91
SHA1d855ab3bafc03bfb846e4638d22ad8248fae1bf4
SHA2567e72a669ca31c7bdb820aa040bcbdf865e2ad7ed0eeed0de484f1c53b4597887
SHA512b48f7a6edda9d1a164b99ccac61588e726f91164a22c29fa3ddd4a3af6beef144a106f3adff1c61638abaae0008ef57bf490226bce41cf7db8f716ae0059d026
-
Filesize
373KB
MD5203794fd3f2564eadaae4d11a3c60b87
SHA1513f53b2f6f72e468299b3a1b79d117d1ffb2edf
SHA256b22e416755b475a2fb66185eafd8c9f8a85a9bf342c7f8877520ec2f0589995e
SHA512d0d27c529a2d86bd81632ac857e17f95c3ac0ab9539442a079e83e1838a0b33090461d48d195e00faea9664edc110ece860605943fc8941ac80491bfc40a58ef
-
Filesize
373KB
MD5203794fd3f2564eadaae4d11a3c60b87
SHA1513f53b2f6f72e468299b3a1b79d117d1ffb2edf
SHA256b22e416755b475a2fb66185eafd8c9f8a85a9bf342c7f8877520ec2f0589995e
SHA512d0d27c529a2d86bd81632ac857e17f95c3ac0ab9539442a079e83e1838a0b33090461d48d195e00faea9664edc110ece860605943fc8941ac80491bfc40a58ef
-
Filesize
174KB
MD5f3b031ad44f3fbb9925b1fafcf5c5537
SHA12a443398b2811f6d68a3c7ac59cf05d8a870a324
SHA2561d57b27c993a6a073ff451dbed1f9cbc071aeb6c8f9f50c83c93148ca10a3c6f
SHA512001a34fb323a272c2f46db4413992e2e322f8e8cd73821c4c9efa7072fb359e8254ed65d90a8372a89539b5777fb3c8eacb38255bc22905c3b962b07af6a38b9
-
Filesize
174KB
MD5f3b031ad44f3fbb9925b1fafcf5c5537
SHA12a443398b2811f6d68a3c7ac59cf05d8a870a324
SHA2561d57b27c993a6a073ff451dbed1f9cbc071aeb6c8f9f50c83c93148ca10a3c6f
SHA512001a34fb323a272c2f46db4413992e2e322f8e8cd73821c4c9efa7072fb359e8254ed65d90a8372a89539b5777fb3c8eacb38255bc22905c3b962b07af6a38b9
-
Filesize
217KB
MD5f4344315fed15b13ab58d0b168e31dfe
SHA1a423118f4c1a3689820598ed823883a40ec711b2
SHA256666f974bbdb5fdfe33c61a682fdb96a457c4ce2e3a5107a3698f905d3e63edd0
SHA512346048c2cf02403b9aa6ff01b092e327d95999c979fa7c4162d01f7461782f04475eee5bf0a33f5da03fdf8ea0a5c04545dfe55e07d35f8512ad462b2f18b570
-
Filesize
217KB
MD5f4344315fed15b13ab58d0b168e31dfe
SHA1a423118f4c1a3689820598ed823883a40ec711b2
SHA256666f974bbdb5fdfe33c61a682fdb96a457c4ce2e3a5107a3698f905d3e63edd0
SHA512346048c2cf02403b9aa6ff01b092e327d95999c979fa7c4162d01f7461782f04475eee5bf0a33f5da03fdf8ea0a5c04545dfe55e07d35f8512ad462b2f18b570
-
Filesize
19KB
MD5c86cbd17b43bfc1f0ec4000c1a380960
SHA1e8e94e60498c1ced0427e8bda5b656e926382d2c
SHA256f905db785fbc3de8238b2d025313d4b6296686e2e179574a9911e88aa16ff1c6
SHA5125fa95b15f2665b328dcedcde1bd1d11be1dc2c17bd80cf167a518e9b9d9a01b518a802c4e60f6c1455c3966dbb787b834a801da4b59f0fd621f7c30d98412482
-
Filesize
19KB
MD5c86cbd17b43bfc1f0ec4000c1a380960
SHA1e8e94e60498c1ced0427e8bda5b656e926382d2c
SHA256f905db785fbc3de8238b2d025313d4b6296686e2e179574a9911e88aa16ff1c6
SHA5125fa95b15f2665b328dcedcde1bd1d11be1dc2c17bd80cf167a518e9b9d9a01b518a802c4e60f6c1455c3966dbb787b834a801da4b59f0fd621f7c30d98412482
-
Filesize
140KB
MD59fc7177788d75945184823177231f664
SHA118d434c13d222d00d2af9e2929159d35ef25bbce
SHA2564510fd13049a4ca7951ed0fa2c5b18a706854c7d0b03dcf10aba4a85974a5d1a
SHA512148c6607ee32f9c73672faf04047c1190ec56d8e5a051ba223177436316ef0e9e8759c4bebdfeb05e46c9cfe7b34149950352a62b5547a6b4ac5deb12c311851
-
Filesize
140KB
MD59fc7177788d75945184823177231f664
SHA118d434c13d222d00d2af9e2929159d35ef25bbce
SHA2564510fd13049a4ca7951ed0fa2c5b18a706854c7d0b03dcf10aba4a85974a5d1a
SHA512148c6607ee32f9c73672faf04047c1190ec56d8e5a051ba223177436316ef0e9e8759c4bebdfeb05e46c9cfe7b34149950352a62b5547a6b4ac5deb12c311851