Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2023, 07:49

General

  • Target

    65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe

  • Size

    1.6MB

  • MD5

    62f7b478ecbf64ad2098582048dac2f5

  • SHA1

    2ecb59b1b3eafac90e1c092a1b021cd0c2ccb40d

  • SHA256

    65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa

  • SHA512

    3ef340f793fc6bafe8ca53a1bcaf516c9ffb527f81b985d4dbe9fc08c05fecb635375bcf800c138deba70cd1f9e601ff8707ea6eb3a37c5432ea532357331985

  • SSDEEP

    49152:fvkaLBcURUnf2WakIFYvX0qYdFz97uBXll:zBcUaf2jkpvSdT7GVl

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe
    "C:\Users\Admin\AppData\Local\Temp\65f579813381e7bec616bebe2d40888324fafdacd2cc0c3fe776731a06bc6dfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exe
          4⤵
          • Executes dropped EXE
          PID:3552

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

          Filesize

          226B

          MD5

          916851e072fbabc4796d8916c5131092

          SHA1

          d48a602229a690c512d5fdaf4c8d77547a88e7a2

          SHA256

          7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

          SHA512

          07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exe

          Filesize

          1.4MB

          MD5

          4529795a97051fd0a167aea74476be69

          SHA1

          32a366607ec5b11f5e345dabeee18e8628dec92e

          SHA256

          8193cdcf54b3728ca29152e9a5f4b90c2011f366150133c95f33004919069594

          SHA512

          aeeea902661b09b0062590c7b2f622f282cae4259c91403365e07c250744607c87dcca71ff90cf3743c8545fb1ba4c3ab684b80a1df33174a25f9a04a56495e0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6335898.exe

          Filesize

          1.4MB

          MD5

          4529795a97051fd0a167aea74476be69

          SHA1

          32a366607ec5b11f5e345dabeee18e8628dec92e

          SHA256

          8193cdcf54b3728ca29152e9a5f4b90c2011f366150133c95f33004919069594

          SHA512

          aeeea902661b09b0062590c7b2f622f282cae4259c91403365e07c250744607c87dcca71ff90cf3743c8545fb1ba4c3ab684b80a1df33174a25f9a04a56495e0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exe

          Filesize

          1.3MB

          MD5

          63b38449240a5e0c3de1d6d18dd51ff6

          SHA1

          be2fa917a5ae22430cfa5651b812ca039f88a741

          SHA256

          b8a35758ad5fa7291c94cebf2f2934480360ec671d30dae3bf5e37bddba7e91e

          SHA512

          331cc7efb75a84d484caa6eaa654cb7f2f6a6fb66794e112cdad387ab3c6ae59b9f10c4f58daed30227950ef836ec9674c8e7efcea8005631bf254b1fb0d8d44

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4152780.exe

          Filesize

          1.3MB

          MD5

          63b38449240a5e0c3de1d6d18dd51ff6

          SHA1

          be2fa917a5ae22430cfa5651b812ca039f88a741

          SHA256

          b8a35758ad5fa7291c94cebf2f2934480360ec671d30dae3bf5e37bddba7e91e

          SHA512

          331cc7efb75a84d484caa6eaa654cb7f2f6a6fb66794e112cdad387ab3c6ae59b9f10c4f58daed30227950ef836ec9674c8e7efcea8005631bf254b1fb0d8d44

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exe

          Filesize

          729KB

          MD5

          ecccbc301e5704fc71c5da8ba533f1fc

          SHA1

          a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1

          SHA256

          6b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f

          SHA512

          ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2710999.exe

          Filesize

          729KB

          MD5

          ecccbc301e5704fc71c5da8ba533f1fc

          SHA1

          a43359d47087e00305d9e3a3bdd2c2ff73cc5ea1

          SHA256

          6b2aff585ec782a7845a515a6887c086856847f384320d132c405cb593311d5f

          SHA512

          ef8aad7f762016c5387e3cb7c958302afa8fec963ba47c06b3b50f7c8e4cdb713bca4c56fea3c3379f922db4cebfccf356ad88bd483fdab5c979d552377c8aac

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exe

          Filesize

          640KB

          MD5

          3b8f4f29934062a12f16be8f68c1129a

          SHA1

          c40ff5746c7855627e918fd69b2112dc7e399652

          SHA256

          78fcd5b781a1623d910ea58fcd5addb4437ff9404f48b1361ee3112500acb243

          SHA512

          c45b1f089e4428d8c5021e2388c495129dc0d6bcce35a7405bd19c8a2bbb5bfc513ce0a1c7e3b453d191a926ba962948118f3e21fbba8a807061c3c91b11be74

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6483864.exe

          Filesize

          640KB

          MD5

          3b8f4f29934062a12f16be8f68c1129a

          SHA1

          c40ff5746c7855627e918fd69b2112dc7e399652

          SHA256

          78fcd5b781a1623d910ea58fcd5addb4437ff9404f48b1361ee3112500acb243

          SHA512

          c45b1f089e4428d8c5021e2388c495129dc0d6bcce35a7405bd19c8a2bbb5bfc513ce0a1c7e3b453d191a926ba962948118f3e21fbba8a807061c3c91b11be74

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exe

          Filesize

          568KB

          MD5

          0552ef0d19d28032376d8e6e743736b3

          SHA1

          5e4dab54018b916b30afa87e818572b74002f344

          SHA256

          3f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9

          SHA512

          15f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1131121.exe

          Filesize

          568KB

          MD5

          0552ef0d19d28032376d8e6e743736b3

          SHA1

          5e4dab54018b916b30afa87e818572b74002f344

          SHA256

          3f000389b55cea68ed4e66754a82f0292cba31b4c1d712ec679795c03bcbe1a9

          SHA512

          15f6d65ca018daa5aed13da54f2baf3ddb4026b2d34c903f7b465c5995f99cc83b033ad291a29d41245e190e2554683b23ffd919642e7fef5cf7f333b8db4f74

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7793375.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • memory/880-175-0x00007FFCC65C0000-0x00007FFCC7081000-memory.dmp

          Filesize

          10.8MB

        • memory/880-177-0x00007FFCC65C0000-0x00007FFCC7081000-memory.dmp

          Filesize

          10.8MB

        • memory/880-174-0x0000000000540000-0x000000000054A000-memory.dmp

          Filesize

          40KB

        • memory/3552-188-0x0000000004BB0000-0x00000000051C8000-memory.dmp

          Filesize

          6.1MB

        • memory/3552-187-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/3552-195-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

          Filesize

          64KB

        • memory/3552-194-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/3552-181-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3552-182-0x0000000000520000-0x0000000000550000-memory.dmp

          Filesize

          192KB

        • memory/3552-193-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/3552-192-0x0000000005380000-0x00000000053BC000-memory.dmp

          Filesize

          240KB

        • memory/3552-191-0x0000000005360000-0x0000000005372000-memory.dmp

          Filesize

          72KB

        • memory/3552-189-0x0000000005220000-0x000000000532A000-memory.dmp

          Filesize

          1.0MB

        • memory/3552-190-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

          Filesize

          64KB

        • memory/4968-161-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4968-170-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/4968-162-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/4968-166-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB

        • memory/4968-167-0x0000000074190000-0x0000000074940000-memory.dmp

          Filesize

          7.7MB