Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2023 12:17
Static task
static1
Behavioral task
behavioral1
Sample
c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe
-
Size
828KB
-
MD5
91deae4211c478675cc3d5de23bba12a
-
SHA1
dba18ace0166a8a6b6edb2849fc8527149753710
-
SHA256
c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5
-
SHA512
72de786be187fda522896a4afa96b7505d27727976e88a04224d0cf35dbf30f840c13e420c824d94cf1508705be5cb925458109fc77e78489a7e5855ed3668fa
-
SSDEEP
12288:KMrOy90VympjymDi3R5uluUMmaAPawHADdwwE4NWTKbTa4ZM5DJgI00:syDI+mDi5ul7MZiAdBEPTIal9vZ
Malware Config
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002324f-33.dat healer behavioral2/files/0x000700000002324f-34.dat healer behavioral2/memory/4736-35-0x0000000000880000-0x000000000088A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4801457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4801457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4801457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4801457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4801457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4801457.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1412 v7795964.exe 4768 v3186335.exe 4052 v6219541.exe 4448 v1806195.exe 4736 a4801457.exe 3740 b3868682.exe 1876 c9950690.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4801457.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7795964.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3186335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6219541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1806195.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 a4801457.exe 4736 a4801457.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 a4801457.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1412 2448 c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe 85 PID 2448 wrote to memory of 1412 2448 c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe 85 PID 2448 wrote to memory of 1412 2448 c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe 85 PID 1412 wrote to memory of 4768 1412 v7795964.exe 86 PID 1412 wrote to memory of 4768 1412 v7795964.exe 86 PID 1412 wrote to memory of 4768 1412 v7795964.exe 86 PID 4768 wrote to memory of 4052 4768 v3186335.exe 87 PID 4768 wrote to memory of 4052 4768 v3186335.exe 87 PID 4768 wrote to memory of 4052 4768 v3186335.exe 87 PID 4052 wrote to memory of 4448 4052 v6219541.exe 88 PID 4052 wrote to memory of 4448 4052 v6219541.exe 88 PID 4052 wrote to memory of 4448 4052 v6219541.exe 88 PID 4448 wrote to memory of 4736 4448 v1806195.exe 89 PID 4448 wrote to memory of 4736 4448 v1806195.exe 89 PID 4448 wrote to memory of 3740 4448 v1806195.exe 92 PID 4448 wrote to memory of 3740 4448 v1806195.exe 92 PID 4448 wrote to memory of 3740 4448 v1806195.exe 92 PID 4052 wrote to memory of 1876 4052 v6219541.exe 93 PID 4052 wrote to memory of 1876 4052 v6219541.exe 93 PID 4052 wrote to memory of 1876 4052 v6219541.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe"C:\Users\Admin\AppData\Local\Temp\c32942e638646854d0d3a9373b3e592be13459c8533dc6662c65f2f2555f50e5_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7795964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7795964.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3186335.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3186335.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6219541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6219541.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1806195.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1806195.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4801457.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4801457.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3868682.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3868682.exe6⤵
- Executes dropped EXE
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9950690.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9950690.exe5⤵
- Executes dropped EXE
PID:1876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD565e97755576c402ab2867c3e6a000537
SHA11e2e51a52797f8e813d137339ad0b3e161d0164c
SHA256842d93ab44f49297270ab7e48df78f470ebbe2e5c83bdd531aa43b10187133b1
SHA5129a1a86132b06d9762f86097ca42ab2921a96e27be8cd6e8a86e4c707192baff65fb867eb36b71c1ab563f1e92ac85251cbb3d93a8ed4b793150d1d557b5cb110
-
Filesize
723KB
MD565e97755576c402ab2867c3e6a000537
SHA11e2e51a52797f8e813d137339ad0b3e161d0164c
SHA256842d93ab44f49297270ab7e48df78f470ebbe2e5c83bdd531aa43b10187133b1
SHA5129a1a86132b06d9762f86097ca42ab2921a96e27be8cd6e8a86e4c707192baff65fb867eb36b71c1ab563f1e92ac85251cbb3d93a8ed4b793150d1d557b5cb110
-
Filesize
497KB
MD52b3de9801c0f2ea691bc69928e1ac448
SHA12fa2c9b6909a80464404eac79498220f7cd064c5
SHA256dcf33d2ac71aaf2072212384127d41c765172de7d58ec4e93fb1e46a42c6eedc
SHA5127bc04cdc45d4b37ff00acd226a0e99e0b1c12327e56731bf590bb41749ee9c71af2a6f92100850cc6c6b4a7dca1f7bc869ee4eef7ba2025e820cdb1de2071347
-
Filesize
497KB
MD52b3de9801c0f2ea691bc69928e1ac448
SHA12fa2c9b6909a80464404eac79498220f7cd064c5
SHA256dcf33d2ac71aaf2072212384127d41c765172de7d58ec4e93fb1e46a42c6eedc
SHA5127bc04cdc45d4b37ff00acd226a0e99e0b1c12327e56731bf590bb41749ee9c71af2a6f92100850cc6c6b4a7dca1f7bc869ee4eef7ba2025e820cdb1de2071347
-
Filesize
372KB
MD575720efc209e530f03ceb487103d57c5
SHA1a7ef63d8c032ae8c37dd842724fec62656d7df2c
SHA256389eb9793f1fdbc6459041eb98901edb688e813c7d188695ae38f6c9efdaa1a8
SHA512d3e19580c4d92b162827bd543ca214ee984903e771700a11b663fe01fc6192535bc0cfbe34462707a3a36cfbe46745daeb6f5f6bd0da38cb67f22345e4279cf1
-
Filesize
372KB
MD575720efc209e530f03ceb487103d57c5
SHA1a7ef63d8c032ae8c37dd842724fec62656d7df2c
SHA256389eb9793f1fdbc6459041eb98901edb688e813c7d188695ae38f6c9efdaa1a8
SHA512d3e19580c4d92b162827bd543ca214ee984903e771700a11b663fe01fc6192535bc0cfbe34462707a3a36cfbe46745daeb6f5f6bd0da38cb67f22345e4279cf1
-
Filesize
174KB
MD566b6b3f685f54a6292d5c1b72829083c
SHA1342b6b6426feee0ccf487f3a56431de018d36ed5
SHA256b3fea3d669d954b1ca24a79b945ac970dc89e9adde39342ed580adcda4ad0313
SHA512a4edb1f5bddbdaba6f4173222a44497515552f35e64a79e5b48e9e4769ab4f3504944c27c98da563d55c8bda40840b0714de631ff24a61e1de4b1efc9788534b
-
Filesize
174KB
MD566b6b3f685f54a6292d5c1b72829083c
SHA1342b6b6426feee0ccf487f3a56431de018d36ed5
SHA256b3fea3d669d954b1ca24a79b945ac970dc89e9adde39342ed580adcda4ad0313
SHA512a4edb1f5bddbdaba6f4173222a44497515552f35e64a79e5b48e9e4769ab4f3504944c27c98da563d55c8bda40840b0714de631ff24a61e1de4b1efc9788534b
-
Filesize
217KB
MD5076a9b3108904155f7a97f51ded2717b
SHA1f2c18ff691065ea1ec315d2513ce4f7ad171822e
SHA25600814cf7cc86ad91726b2653d6d161fcfdb1c0f0a5b1b2687f35dccde0909efd
SHA512b19d02884b5f7c3ffe6bb2323ff5c0770ce9d95f5f6432b0ceac72971b88cbc2e7e572b729f7ffd6d7a1731efeb909f269c89d729145975816974dcf45dcf9d0
-
Filesize
217KB
MD5076a9b3108904155f7a97f51ded2717b
SHA1f2c18ff691065ea1ec315d2513ce4f7ad171822e
SHA25600814cf7cc86ad91726b2653d6d161fcfdb1c0f0a5b1b2687f35dccde0909efd
SHA512b19d02884b5f7c3ffe6bb2323ff5c0770ce9d95f5f6432b0ceac72971b88cbc2e7e572b729f7ffd6d7a1731efeb909f269c89d729145975816974dcf45dcf9d0
-
Filesize
19KB
MD5755c2c97e071aeedc69bd5735f013ab5
SHA14bbc7dfd154958f8f8ebcdf2c38ea1d8024484a4
SHA256b671364d3b8e2ae8e213fcf4aad7053249ecbcada353da0002b3fdc722a24a35
SHA5120d0a0aa0e17f1e670f9fa3e8c8d9c29fa1f7ea657a98fa27da4b89e279363e2dbec428f9be9111e67790e63c8cec0a7f2ca02142b078a6de2f422fd9473d29b1
-
Filesize
19KB
MD5755c2c97e071aeedc69bd5735f013ab5
SHA14bbc7dfd154958f8f8ebcdf2c38ea1d8024484a4
SHA256b671364d3b8e2ae8e213fcf4aad7053249ecbcada353da0002b3fdc722a24a35
SHA5120d0a0aa0e17f1e670f9fa3e8c8d9c29fa1f7ea657a98fa27da4b89e279363e2dbec428f9be9111e67790e63c8cec0a7f2ca02142b078a6de2f422fd9473d29b1
-
Filesize
140KB
MD56a27ff51330a0b29410b5aaf5a521080
SHA1ef215de9a4ac9047c4067102c2059ebe791ec413
SHA2569fb75bf15e20b0b439291784512fddef719339b05c0c414742475c342df906a8
SHA51287f37efc4f816b79330100204f0f82c4eec81fd3de62c4c867ffc6032fbe6102ef5125e888a33172e4afffe1048940a3150f7f703233fdcadfca7523830a2488
-
Filesize
140KB
MD56a27ff51330a0b29410b5aaf5a521080
SHA1ef215de9a4ac9047c4067102c2059ebe791ec413
SHA2569fb75bf15e20b0b439291784512fddef719339b05c0c414742475c342df906a8
SHA51287f37efc4f816b79330100204f0f82c4eec81fd3de62c4c867ffc6032fbe6102ef5125e888a33172e4afffe1048940a3150f7f703233fdcadfca7523830a2488