Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 16:32

General

  • Target

    44e3ae1a3879de7cba4e80815.exe

  • Size

    791KB

  • MD5

    44e3ae1a3879de7cba4e80815baafbd9

  • SHA1

    6d3ede14b895b5c702df44479e6a01410aeffdf9

  • SHA256

    d2656006b64eeed2faee4e468239a7f19fa1979aa5661997b0a852b874973e03

  • SHA512

    089b294984dbd5d778f532a717eea7c3e8478987d003c4f8da979a8f4ad5af6dcfd67a9f718ad9eb6e12dbe3d0643254eec5ed73e7294f1aa2847e68c5ff3ca7

  • SSDEEP

    24576:tHSHove82gUHcMgm1OYOWjvHWYOwC73m2:VSIXnMgm1zr2ny2

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44e3ae1a3879de7cba4e80815.exe
    "C:\Users\Admin\AppData\Local\Temp\44e3ae1a3879de7cba4e80815.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exe
          4⤵
          • Executes dropped EXE
          PID:4648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exe

    Filesize

    522KB

    MD5

    8293245db013260efa1c978693485de1

    SHA1

    121b657d0d04bdc8bf2ddfe83071cab86b19265a

    SHA256

    04a7627ac611e5116ea18e94df79745283da5b993336758ba3dae2743e0625fd

    SHA512

    8f3be5c174598c130ac671f977a6146fb06034cb74e31544b0e20242247a2262cf4ef9c9165fcd65eddf24f9eb823f3e0637abab1fa2beb819a525773257187c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7602489.exe

    Filesize

    522KB

    MD5

    8293245db013260efa1c978693485de1

    SHA1

    121b657d0d04bdc8bf2ddfe83071cab86b19265a

    SHA256

    04a7627ac611e5116ea18e94df79745283da5b993336758ba3dae2743e0625fd

    SHA512

    8f3be5c174598c130ac671f977a6146fb06034cb74e31544b0e20242247a2262cf4ef9c9165fcd65eddf24f9eb823f3e0637abab1fa2beb819a525773257187c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exe

    Filesize

    397KB

    MD5

    382bdcdad0a91d0cd3d3852f6e8afa9c

    SHA1

    f5fd356d163c6569dd23c3a682b0ba879f35d3c4

    SHA256

    1d36903e401035c08ce36bd3d3f2d81fde1d68aca94dc952c498c5e27b445cc5

    SHA512

    386c75ff73c6e787983da04de15e2b7d065755fbd1c48996174597116aabd6574de048eb35adcdba8471a870f61f27d2fda51228797e651740b79c2c963aa139

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4941504.exe

    Filesize

    397KB

    MD5

    382bdcdad0a91d0cd3d3852f6e8afa9c

    SHA1

    f5fd356d163c6569dd23c3a682b0ba879f35d3c4

    SHA256

    1d36903e401035c08ce36bd3d3f2d81fde1d68aca94dc952c498c5e27b445cc5

    SHA512

    386c75ff73c6e787983da04de15e2b7d065755fbd1c48996174597116aabd6574de048eb35adcdba8471a870f61f27d2fda51228797e651740b79c2c963aa139

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exe

    Filesize

    258KB

    MD5

    4ec303caecf1c3ff8b8b34c7fe132cd2

    SHA1

    96f21d316711cb54af778817a5a16f12f4f45c25

    SHA256

    0a3779ee7861cfe5b8bd76fb480f41f15add0ad54dea18e3baf6f9770c8046c7

    SHA512

    bb85f546b2e7224801d2f3f26a07774bc632fed155df60105b9ddd5e9e7610427b35b86697308c539a97d1f012872784a9e00b8b841d1e84edf881887e2715da

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9807147.exe

    Filesize

    258KB

    MD5

    4ec303caecf1c3ff8b8b34c7fe132cd2

    SHA1

    96f21d316711cb54af778817a5a16f12f4f45c25

    SHA256

    0a3779ee7861cfe5b8bd76fb480f41f15add0ad54dea18e3baf6f9770c8046c7

    SHA512

    bb85f546b2e7224801d2f3f26a07774bc632fed155df60105b9ddd5e9e7610427b35b86697308c539a97d1f012872784a9e00b8b841d1e84edf881887e2715da

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exe

    Filesize

    197KB

    MD5

    f8d2ddbae9d24510a17eca54a9148789

    SHA1

    118aa6ca56955a3bacd71b4d2bc606ec5b225fa0

    SHA256

    411cc7577b429c5492cc7a91c339209ee174218f64a708041c5e0a11ee857cad

    SHA512

    a0135819745d3784de2a8e5c886ade2d939380ad1d12f0f0fda1a91cbfdd89637d830e8e79ec51ad96cb688d8cac8c615ddfd11cee99ee26122183cc1032a836

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0484294.exe

    Filesize

    197KB

    MD5

    f8d2ddbae9d24510a17eca54a9148789

    SHA1

    118aa6ca56955a3bacd71b4d2bc606ec5b225fa0

    SHA256

    411cc7577b429c5492cc7a91c339209ee174218f64a708041c5e0a11ee857cad

    SHA512

    a0135819745d3784de2a8e5c886ade2d939380ad1d12f0f0fda1a91cbfdd89637d830e8e79ec51ad96cb688d8cac8c615ddfd11cee99ee26122183cc1032a836

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exe

    Filesize

    97KB

    MD5

    23ca9af2b637765843fbb1474a3519d0

    SHA1

    7cc5e1148a0edb4006ff33f5b79d7b2d440b071d

    SHA256

    49a98f13ba1b20209648e30b31c9fb91f8df3e6022b48a7ce11d4c8f6f19b12c

    SHA512

    f8b3e9caefbb0b686ce012f9bb25e561035ac4de3a363f84399567928c851b613593419b78c0772365856fa663d4acb09201f73af355a4e5e1e14f7a1761d7f5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5084156.exe

    Filesize

    97KB

    MD5

    23ca9af2b637765843fbb1474a3519d0

    SHA1

    7cc5e1148a0edb4006ff33f5b79d7b2d440b071d

    SHA256

    49a98f13ba1b20209648e30b31c9fb91f8df3e6022b48a7ce11d4c8f6f19b12c

    SHA512

    f8b3e9caefbb0b686ce012f9bb25e561035ac4de3a363f84399567928c851b613593419b78c0772365856fa663d4acb09201f73af355a4e5e1e14f7a1761d7f5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2458339.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/2236-167-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/2844-176-0x00000000001B0000-0x00000000001BA000-memory.dmp

    Filesize

    40KB

  • memory/3168-133-0x00000000006C0000-0x0000000000776000-memory.dmp

    Filesize

    728KB

  • memory/4648-181-0x0000000000520000-0x0000000000550000-memory.dmp

    Filesize

    192KB

  • memory/4648-186-0x000000000A620000-0x000000000AC38000-memory.dmp

    Filesize

    6.1MB

  • memory/4648-187-0x000000000A000000-0x000000000A10A000-memory.dmp

    Filesize

    1.0MB

  • memory/4648-188-0x000000000A140000-0x000000000A152000-memory.dmp

    Filesize

    72KB

  • memory/4648-189-0x000000000A160000-0x000000000A19C000-memory.dmp

    Filesize

    240KB

  • memory/4648-190-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/4648-191-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB