Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2023, 11:10

General

  • Target

    8b6d9499a1c8734cd8ecf0652.exe

  • Size

    783KB

  • MD5

    8b6d9499a1c8734cd8ecf06523bc94a7

  • SHA1

    8eec3ed216856bcabd413e81f895cca07dcba614

  • SHA256

    40466ed58c6e1c69bd8a5e5b9863f5de08058c15b40861fbc28f983ca43417b4

  • SHA512

    6dc9cca915b59b46a8fa793efbc254632cab5f865ac81ba7b6cd122cab92c7856a03fecf3bbb6b2c2cd8b2e5517c1c4f6acc21ba517ca947f873bc21204d775a

  • SSDEEP

    24576:iIucxvp82gAh6jHwRgj0vKZZ9jMiK6o/D:3uQ2ChMb3rKv

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe
    "C:\Users\Admin\AppData\Local\Temp\8b6d9499a1c8734cd8ecf0652.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe
          4⤵
          • Executes dropped EXE
          PID:368

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

          Filesize

          226B

          MD5

          916851e072fbabc4796d8916c5131092

          SHA1

          d48a602229a690c512d5fdaf4c8d77547a88e7a2

          SHA256

          7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

          SHA512

          07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4791442.exe

          Filesize

          517KB

          MD5

          dc4ded2e57a0cc9a854dbeb51ee6e776

          SHA1

          355089fffa26a93d79e3e91c8dfb343767794831

          SHA256

          b7ae24ba7685884b35d6ab3be88d154454a6f36ffbf00d36bee974d8d581f9df

          SHA512

          6c21c419b346161c79f8684a63f37e9ab658065ad40ac8cb722d3549d9d263c2fbaa6cc206b7e3769b3aaed4d4718da3656bc57b1c469a6a7291c265948b3236

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7172701.exe

          Filesize

          393KB

          MD5

          89609691765692ad1ce164b4bcb032f3

          SHA1

          ab806573d920d4cfdd6ecbdf47fbe140d036909e

          SHA256

          a556f59010f4b12573fb76c2e0987b520e2027e5627cedbbbcf07edcdcb8e9be

          SHA512

          62d4bae15f7f2ddea4e0936f37170f7d9730e98fed66d2c5516f884d035d3ef6f6e0b6ace5f6a2256c20f5b90e679acd0ae3479c98d31dbc50e138e925fe1c8b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8864241.exe

          Filesize

          255KB

          MD5

          ec41c1bb2ec8ed7d3812f7b1710eee8e

          SHA1

          9ccabd158c1851ede1f9aa785156d213b5bda1f0

          SHA256

          8d66bb5e1d11e2131a912d889d7b94b075e97c08ef3cb0b2406659a1ee621ccb

          SHA512

          25af273ffad2814734c8267de08309060cd8d93759d22b8e8df7623d8a0457e21ca9308e37ee578ead882f8b566513d614cd88d265d2d0ebd8c2b8b584249bc2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7893018.exe

          Filesize

          195KB

          MD5

          3638347f545a94c85244dbd1907d32e4

          SHA1

          81c0f7b0d11e76be4e84474e249964f7097fa5e8

          SHA256

          d3619103e3bbeeef5bb6a48f6f8c5b59fac798632ad2ad0f155018ab711c483a

          SHA512

          6770da8bc67db436c72b459e4da323e0e1b02705b91a06436047eee8786d768e682f59883c41ca8c1647aaa1dcadc22571bf5bd966c62824da9c86f7c8c86407

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5855193.exe

          Filesize

          93KB

          MD5

          28a2c57644dc67b06bca7b2781030729

          SHA1

          28536e8f9d28e5f2898d68ee483fbdf119d6704b

          SHA256

          cd16ea0e82b8d9017b0e924b2b5de5cfa8472b9c3924d2c760908f10bad4ce73

          SHA512

          4d006f7f76e00ee706c94dcc7a1d8fc15bbe927a1d7aa33d6bfe3ecbb34917716ab0241e3352ce47cc6b689aec5a5dc668fa16d36108d8c9d80ac73f05ebda97

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6782949.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/368-181-0x0000000000440000-0x0000000000470000-memory.dmp

          Filesize

          192KB

        • memory/368-186-0x0000000009F60000-0x000000000A578000-memory.dmp

          Filesize

          6.1MB

        • memory/368-187-0x000000000A610000-0x000000000A71A000-memory.dmp

          Filesize

          1.0MB

        • memory/368-188-0x000000000A750000-0x000000000A762000-memory.dmp

          Filesize

          72KB

        • memory/368-189-0x0000000004970000-0x0000000004980000-memory.dmp

          Filesize

          64KB

        • memory/368-190-0x000000000A770000-0x000000000A7AC000-memory.dmp

          Filesize

          240KB

        • memory/368-191-0x0000000004970000-0x0000000004980000-memory.dmp

          Filesize

          64KB

        • memory/1376-133-0x0000000000780000-0x0000000000834000-memory.dmp

          Filesize

          720KB

        • memory/1404-176-0x0000000000C70000-0x0000000000C7A000-memory.dmp

          Filesize

          40KB

        • memory/2660-167-0x00000000001F0000-0x00000000001FA000-memory.dmp

          Filesize

          40KB