Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2023, 01:53

General

  • Target

    file.exe

  • Size

    1.5MB

  • MD5

    6ba00ad9a91f15dd444ad429ac2c2247

  • SHA1

    23f67b9d77ed808f1a3b22a7a48a70bf931ee11f

  • SHA256

    dda511575fe2d4e8cc7e7dfbf500a529cbd2a5acc24299b8217d603401322c2f

  • SHA512

    2bc5fa1df9db17837c37d37773447c485676f0deb06600b6d9d5b82e7a6cb605d175a7121a1688ce875337bd76d0cc18b3e90398a050f451acad22844f7a5261

  • SSDEEP

    49152:xuMNfHwZ5+uSS08H6gD5CoqkmaBshMG6yVn:Z+5+ulaQ5hcaBTG

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exe
          4⤵
          • Executes dropped EXE
          PID:1852

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

          Filesize

          226B

          MD5

          916851e072fbabc4796d8916c5131092

          SHA1

          d48a602229a690c512d5fdaf4c8d77547a88e7a2

          SHA256

          7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

          SHA512

          07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exe

          Filesize

          1.4MB

          MD5

          dea8d48570a6cf242e686705d5366155

          SHA1

          d9673b14317a59c0b3c4d40f91479d96cc25ce45

          SHA256

          4903f699f8739354bdabec16602287d76f25393efa935a4d39ae7da674358666

          SHA512

          19485ba2d4cd138ae632ded1ed01aeb444fea5780398cb25fc754da8771ba77f49436d898b23d05cde2b1d58ca44539fc8daf14d4dc4727543c059dd74d65673

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2384274.exe

          Filesize

          1.4MB

          MD5

          dea8d48570a6cf242e686705d5366155

          SHA1

          d9673b14317a59c0b3c4d40f91479d96cc25ce45

          SHA256

          4903f699f8739354bdabec16602287d76f25393efa935a4d39ae7da674358666

          SHA512

          19485ba2d4cd138ae632ded1ed01aeb444fea5780398cb25fc754da8771ba77f49436d898b23d05cde2b1d58ca44539fc8daf14d4dc4727543c059dd74d65673

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exe

          Filesize

          1.2MB

          MD5

          146b7099c5884a806e8f819a9aaa6b7d

          SHA1

          8e92bb549be422d30fde8bac34236aa57aed6773

          SHA256

          824d07da890962147a3476a815337e841d60ed064b269a53ee19b6a1c3676862

          SHA512

          6a3aeeb5d39506dd49f26566435c1af762529b37ab1550a493049fb0d16fbe3bf2a4ea182f222242e530aa725792711084691352aa1b376a06a1e938713b9303

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7256150.exe

          Filesize

          1.2MB

          MD5

          146b7099c5884a806e8f819a9aaa6b7d

          SHA1

          8e92bb549be422d30fde8bac34236aa57aed6773

          SHA256

          824d07da890962147a3476a815337e841d60ed064b269a53ee19b6a1c3676862

          SHA512

          6a3aeeb5d39506dd49f26566435c1af762529b37ab1550a493049fb0d16fbe3bf2a4ea182f222242e530aa725792711084691352aa1b376a06a1e938713b9303

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exe

          Filesize

          692KB

          MD5

          9699573ffff38da7f8b9ef26ce81e27c

          SHA1

          db43ae44cff6b444623b04228161746fa3edfd9d

          SHA256

          6b4d70ab1a1f37e7f700f9610ce3e986f2ce0734925ad450770cb4f9d30baa21

          SHA512

          a1596dc3e519908f47962fd88b61d39df4c396991494424f79ae3380e1134bed240085cc486d4da793473af89375375c236095ca0219edf24d5373814d347eea

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0607620.exe

          Filesize

          692KB

          MD5

          9699573ffff38da7f8b9ef26ce81e27c

          SHA1

          db43ae44cff6b444623b04228161746fa3edfd9d

          SHA256

          6b4d70ab1a1f37e7f700f9610ce3e986f2ce0734925ad450770cb4f9d30baa21

          SHA512

          a1596dc3e519908f47962fd88b61d39df4c396991494424f79ae3380e1134bed240085cc486d4da793473af89375375c236095ca0219edf24d5373814d347eea

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exe

          Filesize

          620KB

          MD5

          a11d85bdc8f6f8adec34b76ba50f0e92

          SHA1

          59aff71b384589fdbb9a61da4a1b8fd77733b434

          SHA256

          fbcfdf2126226fcf0775f497d438afa877b06a87aea3aca0766a202ff592a767

          SHA512

          18447d53187eecca5a198246e2173d80d9de60e5836588389603ef24c58fa11b33cd3459fc2833b783e79b113fc4c704c555b5a85697054ef300b1c403d3da2f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4512196.exe

          Filesize

          620KB

          MD5

          a11d85bdc8f6f8adec34b76ba50f0e92

          SHA1

          59aff71b384589fdbb9a61da4a1b8fd77733b434

          SHA256

          fbcfdf2126226fcf0775f497d438afa877b06a87aea3aca0766a202ff592a767

          SHA512

          18447d53187eecca5a198246e2173d80d9de60e5836588389603ef24c58fa11b33cd3459fc2833b783e79b113fc4c704c555b5a85697054ef300b1c403d3da2f

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exe

          Filesize

          530KB

          MD5

          fbb4ddee8fb3844b5f9686bd91fbc6de

          SHA1

          3fed5342bfea1d77de1fa6a2053e1c895c51550b

          SHA256

          707b6a7b7d679407ddf194e800bd9c6e211d239a196f384ac6228e30cd71079f

          SHA512

          c2ef9274e53dea16f34f362ff49e4d7ceff252a14864a5ef8294298c0ac5620ba8c5fde0a46578487516d761e91b7b9592542d6f25cc49744d4a3b8ea568d71a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1880968.exe

          Filesize

          530KB

          MD5

          fbb4ddee8fb3844b5f9686bd91fbc6de

          SHA1

          3fed5342bfea1d77de1fa6a2053e1c895c51550b

          SHA256

          707b6a7b7d679407ddf194e800bd9c6e211d239a196f384ac6228e30cd71079f

          SHA512

          c2ef9274e53dea16f34f362ff49e4d7ceff252a14864a5ef8294298c0ac5620ba8c5fde0a46578487516d761e91b7b9592542d6f25cc49744d4a3b8ea568d71a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3166025.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/1548-170-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1852-175-0x0000000000440000-0x0000000000470000-memory.dmp

          Filesize

          192KB

        • memory/1852-180-0x0000000009F20000-0x000000000A538000-memory.dmp

          Filesize

          6.1MB

        • memory/1852-181-0x000000000A540000-0x000000000A64A000-memory.dmp

          Filesize

          1.0MB

        • memory/1852-182-0x0000000004A50000-0x0000000004A62000-memory.dmp

          Filesize

          72KB

        • memory/1852-183-0x000000000A650000-0x000000000A68C000-memory.dmp

          Filesize

          240KB

        • memory/1852-184-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/1852-185-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/2108-161-0x00000000001F0000-0x00000000001FA000-memory.dmp

          Filesize

          40KB