Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 07:37
Static task
static1
Behavioral task
behavioral1
Sample
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe
Resource
win10v2004-20230831-en
General
-
Target
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe
-
Size
827KB
-
MD5
f370523fe7a107180d54b5ac8b34e8f7
-
SHA1
cb4bdcfa51faa8a9b9c8465df3280fd3206f7990
-
SHA256
227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9
-
SHA512
2666e6d9ab95740b6c8f5f9f8e32759096ece98582fe9a4404214583ab22f4f5a87513f286b7ff81a5f8dad88bbbb6b805b8211f71ad3843c88cb7d9061e44fd
-
SSDEEP
24576:LyWJsKTtJ0Tq4N3ZBBJtTFREsef175NSsBi:+WJsjuYJBzhxef13Ss
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023233-33.dat healer behavioral1/files/0x0007000000023233-34.dat healer behavioral1/memory/4912-35-0x0000000000DF0000-0x0000000000DFA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2836238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2836238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2836238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2836238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2836238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2836238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2536 v5700625.exe 3464 v3357705.exe 4936 v6954355.exe 4712 v7322059.exe 4912 a2836238.exe 2088 b3823907.exe 2480 c1774567.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2836238.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5700625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3357705.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6954355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7322059.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 a2836238.exe 4912 a2836238.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 a2836238.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2536 1884 227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe 86 PID 1884 wrote to memory of 2536 1884 227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe 86 PID 1884 wrote to memory of 2536 1884 227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe 86 PID 2536 wrote to memory of 3464 2536 v5700625.exe 87 PID 2536 wrote to memory of 3464 2536 v5700625.exe 87 PID 2536 wrote to memory of 3464 2536 v5700625.exe 87 PID 3464 wrote to memory of 4936 3464 v3357705.exe 88 PID 3464 wrote to memory of 4936 3464 v3357705.exe 88 PID 3464 wrote to memory of 4936 3464 v3357705.exe 88 PID 4936 wrote to memory of 4712 4936 v6954355.exe 89 PID 4936 wrote to memory of 4712 4936 v6954355.exe 89 PID 4936 wrote to memory of 4712 4936 v6954355.exe 89 PID 4712 wrote to memory of 4912 4712 v7322059.exe 90 PID 4712 wrote to memory of 4912 4712 v7322059.exe 90 PID 4712 wrote to memory of 2088 4712 v7322059.exe 93 PID 4712 wrote to memory of 2088 4712 v7322059.exe 93 PID 4712 wrote to memory of 2088 4712 v7322059.exe 93 PID 4936 wrote to memory of 2480 4936 v6954355.exe 94 PID 4936 wrote to memory of 2480 4936 v6954355.exe 94 PID 4936 wrote to memory of 2480 4936 v6954355.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe"C:\Users\Admin\AppData\Local\Temp\227ddce63c26bea0579d66b7217899f422b2a9a185316ef40ece8b737984e8e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5700625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5700625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3357705.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3357705.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6954355.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6954355.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7322059.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7322059.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2836238.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2836238.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3823907.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3823907.exe6⤵
- Executes dropped EXE
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1774567.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1774567.exe5⤵
- Executes dropped EXE
PID:2480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721KB
MD528e91849af9f9ed905338499197a0c42
SHA1714d2c2e49b27bc7576dd46b7352b7284f860e3a
SHA256141b50c21db586cd8b409fd98e66f86d36a424246dc5b25a7ca86859a1cb81c1
SHA512c7f56e36beb1b7393466e5146f12f0258ebd78dc981db7a57c0cc691c9e8a7692a0c1201674b0e0fafe543eb7ae8db1e22515f09aa6157e96ff59ce3ad0a730c
-
Filesize
721KB
MD528e91849af9f9ed905338499197a0c42
SHA1714d2c2e49b27bc7576dd46b7352b7284f860e3a
SHA256141b50c21db586cd8b409fd98e66f86d36a424246dc5b25a7ca86859a1cb81c1
SHA512c7f56e36beb1b7393466e5146f12f0258ebd78dc981db7a57c0cc691c9e8a7692a0c1201674b0e0fafe543eb7ae8db1e22515f09aa6157e96ff59ce3ad0a730c
-
Filesize
497KB
MD573071e9d3b5da88022dc419ee7c6c74b
SHA1aff5d413e7c87ddd39b5852c256cd91ed9a87c20
SHA2566690572b32edc8e33662716bbfa9bbeb46d1b354398beae95bd89ac3965e2edd
SHA512c4b00c30b9df7e317db18955ff1ba0edd69d1e27e8347395b3dd19e43452f7972418688133004c5467ae782f31f6acb55777dd5a6e14b0dccd4b0170ea911062
-
Filesize
497KB
MD573071e9d3b5da88022dc419ee7c6c74b
SHA1aff5d413e7c87ddd39b5852c256cd91ed9a87c20
SHA2566690572b32edc8e33662716bbfa9bbeb46d1b354398beae95bd89ac3965e2edd
SHA512c4b00c30b9df7e317db18955ff1ba0edd69d1e27e8347395b3dd19e43452f7972418688133004c5467ae782f31f6acb55777dd5a6e14b0dccd4b0170ea911062
-
Filesize
373KB
MD5cd1a4499c7b1cc2bb46b37bdebeb4a9c
SHA147051854f8536b65e0a390adbdbc2a68a6d6b2ef
SHA256df37c6306269d522c7908d28a78b3d48e321529ac57335dbe38c9dccdafabf4f
SHA5125a3d03f61924bb59d86b02a3756637da58a2e9dd2e3e843b5d43cce7af87414ceee73786ca5ecc307b9240fe64d3ecc99d72ba549e30da3248c12e9964f33f64
-
Filesize
373KB
MD5cd1a4499c7b1cc2bb46b37bdebeb4a9c
SHA147051854f8536b65e0a390adbdbc2a68a6d6b2ef
SHA256df37c6306269d522c7908d28a78b3d48e321529ac57335dbe38c9dccdafabf4f
SHA5125a3d03f61924bb59d86b02a3756637da58a2e9dd2e3e843b5d43cce7af87414ceee73786ca5ecc307b9240fe64d3ecc99d72ba549e30da3248c12e9964f33f64
-
Filesize
174KB
MD58954efeab65c11155df9608489727c7e
SHA1e4f5edafe1c156f8f8f384c3ca7bac1593f1cb04
SHA25604f6c621d38ebd00fb173eec6b3034a94032a918e352be4b5495b4131b425e9c
SHA512bcc81668f095ab3eacd7f48edf845e79e925d0aca0b58b3353956dad7be456de98d60e915278de4ab73dd13dc07f3c8dc3c7618b36f02881e4ab6fca3a0f4b15
-
Filesize
174KB
MD58954efeab65c11155df9608489727c7e
SHA1e4f5edafe1c156f8f8f384c3ca7bac1593f1cb04
SHA25604f6c621d38ebd00fb173eec6b3034a94032a918e352be4b5495b4131b425e9c
SHA512bcc81668f095ab3eacd7f48edf845e79e925d0aca0b58b3353956dad7be456de98d60e915278de4ab73dd13dc07f3c8dc3c7618b36f02881e4ab6fca3a0f4b15
-
Filesize
217KB
MD5c6892207ba783495e8f6277235e98da7
SHA1e1ab08809e45d1130c981d0cc09c37b085ac9ffb
SHA25623f980b57030a7c94d92a15fe0157386e5618d33a82f061ce2cfae094a94f273
SHA5122effc6f5846376f36f961f5197814079d4ae7854efad7b9b4fc8a3f411fbd4ff557389bd081fbf10c483ee0f4beb5772a3b3a9b0d5da7f30eab84a7cddd3e74c
-
Filesize
217KB
MD5c6892207ba783495e8f6277235e98da7
SHA1e1ab08809e45d1130c981d0cc09c37b085ac9ffb
SHA25623f980b57030a7c94d92a15fe0157386e5618d33a82f061ce2cfae094a94f273
SHA5122effc6f5846376f36f961f5197814079d4ae7854efad7b9b4fc8a3f411fbd4ff557389bd081fbf10c483ee0f4beb5772a3b3a9b0d5da7f30eab84a7cddd3e74c
-
Filesize
19KB
MD519f11edd972cde35d558b4df50a1c5d8
SHA1b174275b7e78309304978acc0f3df5ebfea21c95
SHA256c640f713394e9b2642e3a1b1b7d0d6233b8471a9d0047b9d0192eb64fae00a15
SHA51215499cf2b64ed8b18ee530baaa21484be407a25e40b8aa4ac9798cccf9d2ed9e98e517e590c9cc45611d05e75d1ac618dd28cb65036ab35004be6a88e4d19b88
-
Filesize
19KB
MD519f11edd972cde35d558b4df50a1c5d8
SHA1b174275b7e78309304978acc0f3df5ebfea21c95
SHA256c640f713394e9b2642e3a1b1b7d0d6233b8471a9d0047b9d0192eb64fae00a15
SHA51215499cf2b64ed8b18ee530baaa21484be407a25e40b8aa4ac9798cccf9d2ed9e98e517e590c9cc45611d05e75d1ac618dd28cb65036ab35004be6a88e4d19b88
-
Filesize
140KB
MD5ecd29d41290750d7bcc70437a13ce5ff
SHA17ca7176e3d949badf3e0056c88aadd66290e488f
SHA256a417be0a0600fecb9a18ea217b53084f49124dba3df7d0a8eb79b70a4e991e22
SHA512399e879bf0292df951f9d7e42577f6704bf1521d3a691b02185120f049d0af5e45979755115042155dc96eb4d2f0870c220f323a36f815aca6ae1ab4ba20cb24
-
Filesize
140KB
MD5ecd29d41290750d7bcc70437a13ce5ff
SHA17ca7176e3d949badf3e0056c88aadd66290e488f
SHA256a417be0a0600fecb9a18ea217b53084f49124dba3df7d0a8eb79b70a4e991e22
SHA512399e879bf0292df951f9d7e42577f6704bf1521d3a691b02185120f049d0af5e45979755115042155dc96eb4d2f0870c220f323a36f815aca6ae1ab4ba20cb24