Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2023 11:11

General

  • Target

    8e7aa14ae6de45aa7791a8a9f.exe

  • Size

    523KB

  • MD5

    8e7aa14ae6de45aa7791a8a9fb084b03

  • SHA1

    e8a539e2a76943d119e30fe34a603debb76695f4

  • SHA256

    f8f268ebe8022cf4828db949730df87ae23860ff2a7e9a84eba1496488ff4f3d

  • SHA512

    9c5ce26d5af283df7fe23f7d99272ef02ab5d5a22140cc453939f04a27886ee04f60eb0416d731b672e4e792651f39581188b80c611cf3526381c701bfe4a1d6

  • SSDEEP

    12288:vwhd2zjfvGaRdnQgj7X9eHawcnvHtqjBfooM9xmqkW:vo2z7vG82gj7X9zwcn1f77kW

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e7aa14ae6de45aa7791a8a9f.exe
    "C:\Users\Admin\AppData\Local\Temp\8e7aa14ae6de45aa7791a8a9f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exe
        3⤵
        • Executes dropped EXE
        PID:1308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exe

    Filesize

    257KB

    MD5

    565ab185652f527c6b5dc36e92d6b339

    SHA1

    6a95d612d958ab87c64c9581a449f7fd1379c210

    SHA256

    9bf9535ed85015a7a796bf0caaa3be82ccd09184573c9f99e8d3459bd40bd665

    SHA512

    70c56a20bb8f2250ac6b6df8b762ad0f99ca26c806d9cd5eefb035d10f60f20740ede4fdee1e4eff8f6a2214709e18cfb106dc0353a5658700a43d68b5e02a88

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4095027.exe

    Filesize

    257KB

    MD5

    565ab185652f527c6b5dc36e92d6b339

    SHA1

    6a95d612d958ab87c64c9581a449f7fd1379c210

    SHA256

    9bf9535ed85015a7a796bf0caaa3be82ccd09184573c9f99e8d3459bd40bd665

    SHA512

    70c56a20bb8f2250ac6b6df8b762ad0f99ca26c806d9cd5eefb035d10f60f20740ede4fdee1e4eff8f6a2214709e18cfb106dc0353a5658700a43d68b5e02a88

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exe

    Filesize

    94KB

    MD5

    e2885d6438af4c491c77f3d345fa787c

    SHA1

    86ee7a5ffc8e66fba5c4e28f49e8e778ac97d5f7

    SHA256

    2d3d6e82d3413262d1ff4f76c4d35188632035ee67371d92fee48fedaac0cb1a

    SHA512

    3d603abbcbb57c0706af7583474ed783c158377c459980e5b05f27c8677b89001b6835863504d884273c6b186aaf14961e87eeb76390422cf22f8984074be568

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7601719.exe

    Filesize

    94KB

    MD5

    e2885d6438af4c491c77f3d345fa787c

    SHA1

    86ee7a5ffc8e66fba5c4e28f49e8e778ac97d5f7

    SHA256

    2d3d6e82d3413262d1ff4f76c4d35188632035ee67371d92fee48fedaac0cb1a

    SHA512

    3d603abbcbb57c0706af7583474ed783c158377c459980e5b05f27c8677b89001b6835863504d884273c6b186aaf14961e87eeb76390422cf22f8984074be568

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exe

    Filesize

    255KB

    MD5

    8e42f5b985627102d46e04c9326e1152

    SHA1

    d213257c6d43ee7e8aca49399aadde7428ae39f2

    SHA256

    d22a43c0ee31f5da3ac1482a39d1a1342f805c2a2a151b6e004977d925e842f6

    SHA512

    eb1a67452cc9e855ebc92c592cea9a6765844462d9df1d4bcfd9e3170fa0d54257748266140a9eac8cd9493567d1ae7cc64d65e336a74939ebdf18339bf3bb53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7550787.exe

    Filesize

    255KB

    MD5

    8e42f5b985627102d46e04c9326e1152

    SHA1

    d213257c6d43ee7e8aca49399aadde7428ae39f2

    SHA256

    d22a43c0ee31f5da3ac1482a39d1a1342f805c2a2a151b6e004977d925e842f6

    SHA512

    eb1a67452cc9e855ebc92c592cea9a6765844462d9df1d4bcfd9e3170fa0d54257748266140a9eac8cd9493567d1ae7cc64d65e336a74939ebdf18339bf3bb53

  • memory/1092-133-0x0000000000490000-0x0000000000503000-memory.dmp

    Filesize

    460KB

  • memory/1308-162-0x0000000000440000-0x0000000000470000-memory.dmp

    Filesize

    192KB

  • memory/1308-167-0x000000000A450000-0x000000000AA68000-memory.dmp

    Filesize

    6.1MB

  • memory/1308-168-0x0000000009EB0000-0x0000000009FBA000-memory.dmp

    Filesize

    1.0MB

  • memory/1308-169-0x0000000009FF0000-0x000000000A002000-memory.dmp

    Filesize

    72KB

  • memory/1308-170-0x000000000A010000-0x000000000A04C000-memory.dmp

    Filesize

    240KB

  • memory/1308-171-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/1308-172-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/2704-153-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB