Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe
-
Size
829KB
-
MD5
eda8d3fae2b34c9008a25863c69950f5
-
SHA1
83e700b7277929b07b5319f1002bc5e789bc21d6
-
SHA256
80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3
-
SHA512
b1f840fb12f95e05a9d0e6d71d32ee34e0c7ddf5524beb9105fc3c2f9cf991fc96937bee3559736d56f1be541a5abac7d47eedc3eb5cee11843860314e0bb226
-
SSDEEP
12288:RMr9y90a2+VHlvV5pPCEaRxbNT6SleZfr6u4RsR++yxMi9MM5jCi9onN//M8HKvB:wy32G9ZqEYvYNViqy6i9MJiuN3ap
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023250-34.dat healer behavioral2/files/0x0007000000023250-33.dat healer behavioral2/memory/3604-35-0x0000000000C20000-0x0000000000C2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9962696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9962696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9962696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9962696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9962696.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9962696.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3792 v9558954.exe 4544 v1052935.exe 732 v1494727.exe 744 v1308060.exe 3604 a9962696.exe 768 b5073614.exe 4328 c1091389.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9962696.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9558954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1052935.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1494727.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1308060.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3604 a9962696.exe 3604 a9962696.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3604 a9962696.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3792 5024 JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe 85 PID 5024 wrote to memory of 3792 5024 JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe 85 PID 5024 wrote to memory of 3792 5024 JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe 85 PID 3792 wrote to memory of 4544 3792 v9558954.exe 86 PID 3792 wrote to memory of 4544 3792 v9558954.exe 86 PID 3792 wrote to memory of 4544 3792 v9558954.exe 86 PID 4544 wrote to memory of 732 4544 v1052935.exe 87 PID 4544 wrote to memory of 732 4544 v1052935.exe 87 PID 4544 wrote to memory of 732 4544 v1052935.exe 87 PID 732 wrote to memory of 744 732 v1494727.exe 88 PID 732 wrote to memory of 744 732 v1494727.exe 88 PID 732 wrote to memory of 744 732 v1494727.exe 88 PID 744 wrote to memory of 3604 744 v1308060.exe 89 PID 744 wrote to memory of 3604 744 v1308060.exe 89 PID 744 wrote to memory of 768 744 v1308060.exe 92 PID 744 wrote to memory of 768 744 v1308060.exe 92 PID 744 wrote to memory of 768 744 v1308060.exe 92 PID 732 wrote to memory of 4328 732 v1494727.exe 93 PID 732 wrote to memory of 4328 732 v1494727.exe 93 PID 732 wrote to memory of 4328 732 v1494727.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe"C:\Users\Admin\AppData\Local\Temp\JC_80aeb339921513c6df9bdf9cae6ef8ee31b435313294f7b797966040599ab4c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9558954.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9558954.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1052935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1052935.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1494727.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1494727.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1308060.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1308060.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9962696.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9962696.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5073614.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5073614.exe6⤵
- Executes dropped EXE
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1091389.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1091389.exe5⤵
- Executes dropped EXE
PID:4328
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5746610c49253f186d3001d8ae08d6ea2
SHA126c4c21d923641ae880d163393fbe5ac3bc80b86
SHA256fd4d9bcb128cae2d9098b7309d1a7b8426b5c64164a447f21634f213f755f852
SHA51255ec6b1dbfcd3c21adde18c68a179833df01a2858391c3b7615e91ceb284963573a9d98e1ab948ac062b2fdea32ca1bcfaa1f1c4cd159320b1ae0a7c81868487
-
Filesize
723KB
MD5746610c49253f186d3001d8ae08d6ea2
SHA126c4c21d923641ae880d163393fbe5ac3bc80b86
SHA256fd4d9bcb128cae2d9098b7309d1a7b8426b5c64164a447f21634f213f755f852
SHA51255ec6b1dbfcd3c21adde18c68a179833df01a2858391c3b7615e91ceb284963573a9d98e1ab948ac062b2fdea32ca1bcfaa1f1c4cd159320b1ae0a7c81868487
-
Filesize
498KB
MD55b6204b19acbf2e198eaf64a670ce3b6
SHA1c8c4b7bb8182bdf45c2daa0b12f21c5abf3c1b53
SHA2563060f911f8dcc564ecdc56b62b244342439be82141d5d283d704ac491a34a27b
SHA512880ded7624d9288a0729a6b5ea2dc7a4ef634ce966dc84c46e9ac98c5579343cabb8b8e315b75e8959e6ab8f4f42a8fbb4aefc15c0c7c4b4c28911c31ad1f4bc
-
Filesize
498KB
MD55b6204b19acbf2e198eaf64a670ce3b6
SHA1c8c4b7bb8182bdf45c2daa0b12f21c5abf3c1b53
SHA2563060f911f8dcc564ecdc56b62b244342439be82141d5d283d704ac491a34a27b
SHA512880ded7624d9288a0729a6b5ea2dc7a4ef634ce966dc84c46e9ac98c5579343cabb8b8e315b75e8959e6ab8f4f42a8fbb4aefc15c0c7c4b4c28911c31ad1f4bc
-
Filesize
373KB
MD5731d70f1ced7570330d3b380bc3d3d56
SHA179df8e7eb9a0ea0818f5054dc00aa0859ff4aec4
SHA2562036b36147635d8a522e1db2f2aeba3fdee188e61543954ef5613d98057c1a37
SHA512bed5c7f89068f64846f239c19d7766b418534c2ab98535184fc28c4078603ba00b7324d46284c0db07503c63555b7e43f2119bd41ca64e8811d603bdce384156
-
Filesize
373KB
MD5731d70f1ced7570330d3b380bc3d3d56
SHA179df8e7eb9a0ea0818f5054dc00aa0859ff4aec4
SHA2562036b36147635d8a522e1db2f2aeba3fdee188e61543954ef5613d98057c1a37
SHA512bed5c7f89068f64846f239c19d7766b418534c2ab98535184fc28c4078603ba00b7324d46284c0db07503c63555b7e43f2119bd41ca64e8811d603bdce384156
-
Filesize
174KB
MD5435004f6f06fec49209cb676ee1bf4f7
SHA1a5807e92b854ee64b3d0ce21c52942fcb7f25fbc
SHA2568b1dfd69e4635f7d1a85b064d50f323efab0138a43b44a542e16e611512e5ffd
SHA51235ed2d517ed961de54a7afc42dfd4585c4e2fb6e57def42ff373fa10e225419ce76afc79d0030fc207b756ed4518d22bea6267442e0134351cf0bd4f8009f268
-
Filesize
174KB
MD5435004f6f06fec49209cb676ee1bf4f7
SHA1a5807e92b854ee64b3d0ce21c52942fcb7f25fbc
SHA2568b1dfd69e4635f7d1a85b064d50f323efab0138a43b44a542e16e611512e5ffd
SHA51235ed2d517ed961de54a7afc42dfd4585c4e2fb6e57def42ff373fa10e225419ce76afc79d0030fc207b756ed4518d22bea6267442e0134351cf0bd4f8009f268
-
Filesize
217KB
MD5a679bc282ee280a54b56aaa1d511a4a2
SHA1d50272d67d55a1f797410975c62bc817e71fee4a
SHA2567eeaae12fde5d4f9bf15a5ec94bbce2df4106b79b7804ec66b2f31a8e54e98c5
SHA5127826cf04d6b95730209f1a434041a7ce24814f94f17b0b94677874bd4c2a92e5df07d3b961cb3fee08e649fceca9b489b6237924b899ad50f9b4aaf1810373fd
-
Filesize
217KB
MD5a679bc282ee280a54b56aaa1d511a4a2
SHA1d50272d67d55a1f797410975c62bc817e71fee4a
SHA2567eeaae12fde5d4f9bf15a5ec94bbce2df4106b79b7804ec66b2f31a8e54e98c5
SHA5127826cf04d6b95730209f1a434041a7ce24814f94f17b0b94677874bd4c2a92e5df07d3b961cb3fee08e649fceca9b489b6237924b899ad50f9b4aaf1810373fd
-
Filesize
19KB
MD5d6ce7c6fdbfe24babb449e20f0da7ab7
SHA107ab3822986beb45d62dd7ac3e742c6f2ad5545b
SHA256dbd711f7e598350db824f64a61a217d1378c5d255faa3ef06b3231c7e823cb46
SHA512f6983c752d3688489c6d4cb8a4245381db9d68994c637de6a763df9556294b24cbb8bc9927a5b84454bd90805e28e9dc3888ba334b8fb7635e94a8a50dc75c28
-
Filesize
19KB
MD5d6ce7c6fdbfe24babb449e20f0da7ab7
SHA107ab3822986beb45d62dd7ac3e742c6f2ad5545b
SHA256dbd711f7e598350db824f64a61a217d1378c5d255faa3ef06b3231c7e823cb46
SHA512f6983c752d3688489c6d4cb8a4245381db9d68994c637de6a763df9556294b24cbb8bc9927a5b84454bd90805e28e9dc3888ba334b8fb7635e94a8a50dc75c28
-
Filesize
140KB
MD5aaed57265252729fe6891ba9d5254952
SHA1daf0f1ee5f5db008d71f6178e98d8b5c3ff786ad
SHA256d8caa4b53d51978a825c6af0f5b443503325021fc20e9b13f713780dafb7156d
SHA5127d76d691d2c53ee972fef4187f9c6683669195d2a643f35387647821887a0c8e84ae76964be890315868aeb33228c81ac9d80704a24f0eaa01919f5cc88d7f33
-
Filesize
140KB
MD5aaed57265252729fe6891ba9d5254952
SHA1daf0f1ee5f5db008d71f6178e98d8b5c3ff786ad
SHA256d8caa4b53d51978a825c6af0f5b443503325021fc20e9b13f713780dafb7156d
SHA5127d76d691d2c53ee972fef4187f9c6683669195d2a643f35387647821887a0c8e84ae76964be890315868aeb33228c81ac9d80704a24f0eaa01919f5cc88d7f33