Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
02/09/2023, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe
Resource
win10-20230831-en
General
-
Target
33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe
-
Size
931KB
-
MD5
3c917159cc4b0705c635f85404b0969c
-
SHA1
ba13f1e5e8067455f5159a8161500e23d629a70f
-
SHA256
33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13
-
SHA512
18c29bf0b0567fb7d5652e8b7322a19aeefe09e53237ebb04fc80c3b195174de7834942079cd46aa934628b099b81072de946a9cac772ab28308cc7e1bc3a252
-
SSDEEP
12288:AMrTy900aOeF3aCbEqOPTsm6peUI1NoDU61LRc1BCv/IrX6tSn9eDXp0zv8zkQ8n:Dy2k6EPPNlohJgCvgLAs9ed3APn//
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af56-32.dat healer behavioral1/files/0x000700000001af56-34.dat healer behavioral1/memory/1264-35-0x00000000000D0000-0x00000000000DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8239118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8239118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8239118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8239118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8239118.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2364 z0687811.exe 4576 z4014363.exe 4136 z5598233.exe 3760 z0511745.exe 1264 q8239118.exe 4020 r7303689.exe 4996 s5484632.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8239118.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0687811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4014363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5598233.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0511745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1264 q8239118.exe 1264 q8239118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 q8239118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3852 wrote to memory of 2364 3852 33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe 69 PID 3852 wrote to memory of 2364 3852 33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe 69 PID 3852 wrote to memory of 2364 3852 33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe 69 PID 2364 wrote to memory of 4576 2364 z0687811.exe 70 PID 2364 wrote to memory of 4576 2364 z0687811.exe 70 PID 2364 wrote to memory of 4576 2364 z0687811.exe 70 PID 4576 wrote to memory of 4136 4576 z4014363.exe 71 PID 4576 wrote to memory of 4136 4576 z4014363.exe 71 PID 4576 wrote to memory of 4136 4576 z4014363.exe 71 PID 4136 wrote to memory of 3760 4136 z5598233.exe 72 PID 4136 wrote to memory of 3760 4136 z5598233.exe 72 PID 4136 wrote to memory of 3760 4136 z5598233.exe 72 PID 3760 wrote to memory of 1264 3760 z0511745.exe 73 PID 3760 wrote to memory of 1264 3760 z0511745.exe 73 PID 3760 wrote to memory of 4020 3760 z0511745.exe 74 PID 3760 wrote to memory of 4020 3760 z0511745.exe 74 PID 3760 wrote to memory of 4020 3760 z0511745.exe 74 PID 4136 wrote to memory of 4996 4136 z5598233.exe 75 PID 4136 wrote to memory of 4996 4136 z5598233.exe 75 PID 4136 wrote to memory of 4996 4136 z5598233.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe"C:\Users\Admin\AppData\Local\Temp\33526bc3a19fe44ee8aa475ceeb7508098ebaa599015949a398d3c49770e6d13.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0687811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0687811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4014363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4014363.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5598233.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5598233.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0511745.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0511745.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8239118.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8239118.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7303689.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7303689.exe6⤵
- Executes dropped EXE
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5484632.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5484632.exe5⤵
- Executes dropped EXE
PID:4996
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5ddd79d3c72ddece07306aa6e6f3e8f4e
SHA10656b475c43efed4dcfd471d05acd889c2d25c13
SHA2563e21fd9cd3582c3635aa579173983ba80801d6cf14f50846628db2f4bc008084
SHA512b6dc5a6154e487ef9e4cdfe98ea675821df46f221b6c11c1386bde768878937dd6b258447c20d616b50cd45023222f343e32e67b9d68613cb730331506a1262c
-
Filesize
826KB
MD5ddd79d3c72ddece07306aa6e6f3e8f4e
SHA10656b475c43efed4dcfd471d05acd889c2d25c13
SHA2563e21fd9cd3582c3635aa579173983ba80801d6cf14f50846628db2f4bc008084
SHA512b6dc5a6154e487ef9e4cdfe98ea675821df46f221b6c11c1386bde768878937dd6b258447c20d616b50cd45023222f343e32e67b9d68613cb730331506a1262c
-
Filesize
600KB
MD57f867dc0eb0e1c2d8d4c8a244b9f5c66
SHA10eb0d6a79b733498bee94129f0c9404d6530d661
SHA256cb0278ac1894a3895c15e6763fcc5ebd326f6ae0a1ee34635f23a49406e19f1a
SHA512416d5ca02ab840e4c198d0a28ea1b79c848929efcfae6c4020918f396df1d957d0ab93f7a01b876fc0e6606aeaff00faabc2359ebf5769e8e78ffa821cc6385b
-
Filesize
600KB
MD57f867dc0eb0e1c2d8d4c8a244b9f5c66
SHA10eb0d6a79b733498bee94129f0c9404d6530d661
SHA256cb0278ac1894a3895c15e6763fcc5ebd326f6ae0a1ee34635f23a49406e19f1a
SHA512416d5ca02ab840e4c198d0a28ea1b79c848929efcfae6c4020918f396df1d957d0ab93f7a01b876fc0e6606aeaff00faabc2359ebf5769e8e78ffa821cc6385b
-
Filesize
374KB
MD5375b9d1cbd531777721294fe55f78cb3
SHA1f877726da741a216c1eb832d71bd9ea18ef05419
SHA256627cccd19e79f7678aa41a45dfd9ad2d902e7ea5b12daf8503a7f947de0b7d55
SHA512071c0756542f772a020a46788811a6999197153c4be18f415cea9fa0940f606ee878f1c5657a2039b9cb0e1f5da9b7b114ffe81eab658ab6b89ae5e68bad9c50
-
Filesize
374KB
MD5375b9d1cbd531777721294fe55f78cb3
SHA1f877726da741a216c1eb832d71bd9ea18ef05419
SHA256627cccd19e79f7678aa41a45dfd9ad2d902e7ea5b12daf8503a7f947de0b7d55
SHA512071c0756542f772a020a46788811a6999197153c4be18f415cea9fa0940f606ee878f1c5657a2039b9cb0e1f5da9b7b114ffe81eab658ab6b89ae5e68bad9c50
-
Filesize
174KB
MD509919b2cdb1be63abc3354df092fcd9e
SHA118a49366f4cddc8699a63ab638d1b183f1fea334
SHA256760e1bffde54a4c7a3b2447aeba3aa4d46f7ece9111ae3114029e4b3c4ada023
SHA5129c973f6572b972bd6ce9560b3b1cb80a55315bc67abce60bee523ef833e72d403d5a2a11449b7fa55b38d2c168c8a4def2f97e33100f352df370458f09af290e
-
Filesize
174KB
MD509919b2cdb1be63abc3354df092fcd9e
SHA118a49366f4cddc8699a63ab638d1b183f1fea334
SHA256760e1bffde54a4c7a3b2447aeba3aa4d46f7ece9111ae3114029e4b3c4ada023
SHA5129c973f6572b972bd6ce9560b3b1cb80a55315bc67abce60bee523ef833e72d403d5a2a11449b7fa55b38d2c168c8a4def2f97e33100f352df370458f09af290e
-
Filesize
217KB
MD5f67152ee0670837533816278074f41e1
SHA12c5d9b99002213f954a215b6c8b134a02f162cb7
SHA256ca25b0b04e23f0b8d4ae893f978d411b26c6f4935e9356ee3cb8587553e72f67
SHA5121824db07a790a5cd3eb6c52454dc2bdceba865574d8541ed5890922eb02fb692fef704a700aac08f723c004339f5c2f6f443519cd63771c6f699effd7e0387c7
-
Filesize
217KB
MD5f67152ee0670837533816278074f41e1
SHA12c5d9b99002213f954a215b6c8b134a02f162cb7
SHA256ca25b0b04e23f0b8d4ae893f978d411b26c6f4935e9356ee3cb8587553e72f67
SHA5121824db07a790a5cd3eb6c52454dc2bdceba865574d8541ed5890922eb02fb692fef704a700aac08f723c004339f5c2f6f443519cd63771c6f699effd7e0387c7
-
Filesize
19KB
MD506525c322fa0753bd4811883c22fe53f
SHA1c1a0519d79705d026b9c1fe89f96682aa2d77769
SHA2565ae9273717a3b4ea3bc1583abf2f19e8de1eb5076b891b00d75900643f6c6fa9
SHA51278b21b3262e8e66d45d367d82066bfaadd413a07036cf4708ce7a903fd1d16293b5de40980c71271fd94f6d869da976f38d1960a7b3f87930606e66e5d46d2ea
-
Filesize
19KB
MD506525c322fa0753bd4811883c22fe53f
SHA1c1a0519d79705d026b9c1fe89f96682aa2d77769
SHA2565ae9273717a3b4ea3bc1583abf2f19e8de1eb5076b891b00d75900643f6c6fa9
SHA51278b21b3262e8e66d45d367d82066bfaadd413a07036cf4708ce7a903fd1d16293b5de40980c71271fd94f6d869da976f38d1960a7b3f87930606e66e5d46d2ea
-
Filesize
140KB
MD5481417a1ecfaece2d6512156a199274f
SHA1e790d3a55a1340555638e8038191a26169cee84d
SHA256bc6e66bf4bb52784b132cb0289b5cf925cacba93fb25b49093d33ee886e8aab1
SHA5123dcad0ad6e92e402be14aeb1304d9ba02c46089eedb5132166000651b864bc32f7dd915f85c13d9bff4fa8aaec7d0160a32b5a5ca920f259c930a50faa9716fb
-
Filesize
140KB
MD5481417a1ecfaece2d6512156a199274f
SHA1e790d3a55a1340555638e8038191a26169cee84d
SHA256bc6e66bf4bb52784b132cb0289b5cf925cacba93fb25b49093d33ee886e8aab1
SHA5123dcad0ad6e92e402be14aeb1304d9ba02c46089eedb5132166000651b864bc32f7dd915f85c13d9bff4fa8aaec7d0160a32b5a5ca920f259c930a50faa9716fb