Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe
-
Size
827KB
-
MD5
0cb06c38c15ac2c52958c5ada1f2b3d3
-
SHA1
d217817f3ae9e095e4dc9ebce456f7e9ce6b3cec
-
SHA256
dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa
-
SHA512
ba1e30bb145326d4993d8e9c0280616b89c6c32843c2924e6d8f9b1b07174ec87ed1e1da49f78fd67126ae6970e153165000ecfde16e675addeb335dcbee4f8a
-
SSDEEP
24576:GyW6l1rIZ+Mmr0w4PLgMOB99z8GCQbOz2USH0b:V/rIy8LLOBzAQblUS
Malware Config
Extracted
redline
bobik
77.91.124.82:19071
-
auth_value
d639522ae3c9dda998264d691a19eb33
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023165-33.dat healer behavioral2/files/0x0007000000023165-34.dat healer behavioral2/memory/4804-35-0x0000000000920000-0x000000000092A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6652322.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6652322.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6652322.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6652322.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6652322.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6652322.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4344 v8284293.exe 2356 v9652083.exe 3592 v5117640.exe 3644 v2332398.exe 4804 a6652322.exe 1036 b4617955.exe 2884 c8738248.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6652322.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5117640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2332398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8284293.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9652083.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4804 a6652322.exe 4804 a6652322.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 a6652322.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3064 wrote to memory of 4344 3064 JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe 81 PID 3064 wrote to memory of 4344 3064 JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe 81 PID 3064 wrote to memory of 4344 3064 JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe 81 PID 4344 wrote to memory of 2356 4344 v8284293.exe 83 PID 4344 wrote to memory of 2356 4344 v8284293.exe 83 PID 4344 wrote to memory of 2356 4344 v8284293.exe 83 PID 2356 wrote to memory of 3592 2356 v9652083.exe 84 PID 2356 wrote to memory of 3592 2356 v9652083.exe 84 PID 2356 wrote to memory of 3592 2356 v9652083.exe 84 PID 3592 wrote to memory of 3644 3592 v5117640.exe 85 PID 3592 wrote to memory of 3644 3592 v5117640.exe 85 PID 3592 wrote to memory of 3644 3592 v5117640.exe 85 PID 3644 wrote to memory of 4804 3644 v2332398.exe 86 PID 3644 wrote to memory of 4804 3644 v2332398.exe 86 PID 3644 wrote to memory of 1036 3644 v2332398.exe 87 PID 3644 wrote to memory of 1036 3644 v2332398.exe 87 PID 3644 wrote to memory of 1036 3644 v2332398.exe 87 PID 3592 wrote to memory of 2884 3592 v5117640.exe 88 PID 3592 wrote to memory of 2884 3592 v5117640.exe 88 PID 3592 wrote to memory of 2884 3592 v5117640.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe"C:\Users\Admin\AppData\Local\Temp\JC_dbe1fdc4d73b168e1814221465c051775dd1dc488c0f155561903e2dca3ec8fa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8284293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8284293.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9652083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9652083.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5117640.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5117640.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2332398.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2332398.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6652322.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6652322.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4617955.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4617955.exe6⤵
- Executes dropped EXE
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8738248.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8738248.exe5⤵
- Executes dropped EXE
PID:2884
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD542cc54b5759956bfe77b51e990135699
SHA1196ed7772fc344599288b08ff9c012e4f5815d90
SHA2563b1a62729b9a1e049a1499b5c2ec681c8d21020bf75f3a7775fde55af4fad086
SHA51242bfd27aa3e3065e3acda32a0262a043ffb84ee1b95e5106e567763062c602adc1536fdb26994e1ae25e8df54a1a19b6876e177943f9592b12c12572c6d32bae
-
Filesize
723KB
MD542cc54b5759956bfe77b51e990135699
SHA1196ed7772fc344599288b08ff9c012e4f5815d90
SHA2563b1a62729b9a1e049a1499b5c2ec681c8d21020bf75f3a7775fde55af4fad086
SHA51242bfd27aa3e3065e3acda32a0262a043ffb84ee1b95e5106e567763062c602adc1536fdb26994e1ae25e8df54a1a19b6876e177943f9592b12c12572c6d32bae
-
Filesize
497KB
MD5a6901d427247d0955f4b46e39a148726
SHA1cb98d295938a05fb6602c0b0af8d0882364ec47b
SHA256db3bead184679fc5ca7741f73856edbabde32fbe8617b3c0cb5808c609f929fe
SHA512cca82d221e456b0f2f5ce5a2b03b489c6f1325a722b08436dd3ead289a62ff31348ecb7075969619bf27249f6e6b5c78f4f01afc24185f79504a2ae127638634
-
Filesize
497KB
MD5a6901d427247d0955f4b46e39a148726
SHA1cb98d295938a05fb6602c0b0af8d0882364ec47b
SHA256db3bead184679fc5ca7741f73856edbabde32fbe8617b3c0cb5808c609f929fe
SHA512cca82d221e456b0f2f5ce5a2b03b489c6f1325a722b08436dd3ead289a62ff31348ecb7075969619bf27249f6e6b5c78f4f01afc24185f79504a2ae127638634
-
Filesize
372KB
MD51f699e846d91b990e96944abd219e9de
SHA188e5490bd68f0c791669dc9f84732fe64c42ecb2
SHA256084eecddd4f663ada4c16d58fcf021b60c1218b17c093d73a17b228c73292697
SHA512bf6c94e7c00026e30eaeb9638d77dbfa3c4f1f93eef67196f685f1920a88e2d95f642ed99f9642239ee1aa955ecf2cff4f95844cfce8d75822482ea7bbb4c9f7
-
Filesize
372KB
MD51f699e846d91b990e96944abd219e9de
SHA188e5490bd68f0c791669dc9f84732fe64c42ecb2
SHA256084eecddd4f663ada4c16d58fcf021b60c1218b17c093d73a17b228c73292697
SHA512bf6c94e7c00026e30eaeb9638d77dbfa3c4f1f93eef67196f685f1920a88e2d95f642ed99f9642239ee1aa955ecf2cff4f95844cfce8d75822482ea7bbb4c9f7
-
Filesize
174KB
MD5c35ff2c0cf0e7aa5c5092313c653fedd
SHA1739c86879a9acc7bd0a20281528a489280cd3a67
SHA256589b3b52b09f35c83f07d95d60e289a090f81acfd91faf1966e08fdd66909e2b
SHA5126f70a46231c70f71401f617ce4c93f9e858dc6290b8f27bddfbc078d9f4791100449977834a10cdf6ff59979eeea15d211b99741eac5298a44f45b4c1c047d66
-
Filesize
174KB
MD5c35ff2c0cf0e7aa5c5092313c653fedd
SHA1739c86879a9acc7bd0a20281528a489280cd3a67
SHA256589b3b52b09f35c83f07d95d60e289a090f81acfd91faf1966e08fdd66909e2b
SHA5126f70a46231c70f71401f617ce4c93f9e858dc6290b8f27bddfbc078d9f4791100449977834a10cdf6ff59979eeea15d211b99741eac5298a44f45b4c1c047d66
-
Filesize
217KB
MD5d00db2883b2d6a1ef95b50d76ee4cd7b
SHA1bb314992169e0a45bed1ebc8658bb0212bd73019
SHA256482f9d6bd798649c3db1cb2e2b3134ea9560dfdfd73b0ac2b2512c8a47e6a3de
SHA5122b1a224d9ac7f22bdf322c0c36d2de66f5bcafccfba6d4059c4f56be09b858c43bd6961e607a7c6bbd045c0e6e203b0b54bcd0423be044d18b7d3bd39bdd70da
-
Filesize
217KB
MD5d00db2883b2d6a1ef95b50d76ee4cd7b
SHA1bb314992169e0a45bed1ebc8658bb0212bd73019
SHA256482f9d6bd798649c3db1cb2e2b3134ea9560dfdfd73b0ac2b2512c8a47e6a3de
SHA5122b1a224d9ac7f22bdf322c0c36d2de66f5bcafccfba6d4059c4f56be09b858c43bd6961e607a7c6bbd045c0e6e203b0b54bcd0423be044d18b7d3bd39bdd70da
-
Filesize
20KB
MD5eb0f5f8b3b4382d608567004c95fa346
SHA16f50fcd56e3ce237f8101aae95e7643977345a4c
SHA256c5b27d7d3eb4ae0fda34d044583f4687a9fd3656de0c6627ba07240f66f70e3e
SHA512c17e75d46f9d266d31a41ca605f23a5af37ee5e0515ac1e38cb221e9c4b42223112961d2e77c0b4ca6f29e2f8cfc6306ef8f31116b03ac080d2883191f03ed80
-
Filesize
20KB
MD5eb0f5f8b3b4382d608567004c95fa346
SHA16f50fcd56e3ce237f8101aae95e7643977345a4c
SHA256c5b27d7d3eb4ae0fda34d044583f4687a9fd3656de0c6627ba07240f66f70e3e
SHA512c17e75d46f9d266d31a41ca605f23a5af37ee5e0515ac1e38cb221e9c4b42223112961d2e77c0b4ca6f29e2f8cfc6306ef8f31116b03ac080d2883191f03ed80
-
Filesize
140KB
MD5a75f4caadd489a32d445dc94af871082
SHA1e08b6db91dcc31c691e4bd1b7c72c833b34c58f2
SHA25604421eb1a84520d65bdd3b7f694706e94852abc7f6f38c0bd46b01c5e65c0ea9
SHA512dd982193fe3a3ecfa5cdfb78ab68de4aa0bd442222a181392e65b6e782ae114a607d75731ecb955511d0096449c3d838f0af769fe5c880e5207970091fd97894
-
Filesize
140KB
MD5a75f4caadd489a32d445dc94af871082
SHA1e08b6db91dcc31c691e4bd1b7c72c833b34c58f2
SHA25604421eb1a84520d65bdd3b7f694706e94852abc7f6f38c0bd46b01c5e65c0ea9
SHA512dd982193fe3a3ecfa5cdfb78ab68de4aa0bd442222a181392e65b6e782ae114a607d75731ecb955511d0096449c3d838f0af769fe5c880e5207970091fd97894