Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2023 02:09

General

  • Target

    5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe

  • Size

    1.0MB

  • MD5

    be45be16fad4076558fd205a0488ea94

  • SHA1

    32391c45d423601da805187a50f7bcfc65f0e665

  • SHA256

    5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e

  • SHA512

    d3def8cd19c40ffb0354aee030aafc07b49fb947f5628d5f88ef99ad578df719e256d3801c3ff989a019177c85f9976135b06bd11996ef1d84b27d41342e3722

  • SSDEEP

    24576:Fy1urNNX55bhJo9JwLkOjwQXIxyT5SWehFTqZpY9mSf+cf:gwrNpbhJl6yT56FTqvY9l+

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe
    "C:\Users\Admin\AppData\Local\Temp\5bda6ef8ff80757552db19d62fad1ff7a5fce6bd9c9a870f17a3a7b7b6a5ca4e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:216
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exe
          4⤵
          • Executes dropped EXE
          PID:4784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exe

    Filesize

    908KB

    MD5

    7da10baea42b6ad3a0f29ba9556785bf

    SHA1

    563d63699736e79b4ed6a8ec5a33d3dd675d3358

    SHA256

    aea2526dc083c98ca6b34f421929283edf6a7d7e8e3cd010af39cfe42a659c8d

    SHA512

    650625661a711f10ad7c2d22256e78b758067c8d900183853fb865071974f391684773f13ee5b6d7ad1763d6b13e0ae53ff0c8ec5633f6c87f91d1763ac1290b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8231498.exe

    Filesize

    908KB

    MD5

    7da10baea42b6ad3a0f29ba9556785bf

    SHA1

    563d63699736e79b4ed6a8ec5a33d3dd675d3358

    SHA256

    aea2526dc083c98ca6b34f421929283edf6a7d7e8e3cd010af39cfe42a659c8d

    SHA512

    650625661a711f10ad7c2d22256e78b758067c8d900183853fb865071974f391684773f13ee5b6d7ad1763d6b13e0ae53ff0c8ec5633f6c87f91d1763ac1290b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exe

    Filesize

    725KB

    MD5

    71957528baae993b1641ee223ee2774b

    SHA1

    39bd4bc03e866253508a192c06ea2c2769802b70

    SHA256

    446d83382fcf57da6c2d413035519d2b858f27e6323ce5663d2cebed095a6a7e

    SHA512

    82584c6a8bb62cc9f6eb760f8e7196af731174bf9659649be6ae9b6eaf7e39172843c312fa7c7dfe8554430213c71bbdbde39353b5065b924f9cb7fb8e88ba02

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5975842.exe

    Filesize

    725KB

    MD5

    71957528baae993b1641ee223ee2774b

    SHA1

    39bd4bc03e866253508a192c06ea2c2769802b70

    SHA256

    446d83382fcf57da6c2d413035519d2b858f27e6323ce5663d2cebed095a6a7e

    SHA512

    82584c6a8bb62cc9f6eb760f8e7196af731174bf9659649be6ae9b6eaf7e39172843c312fa7c7dfe8554430213c71bbdbde39353b5065b924f9cb7fb8e88ba02

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exe

    Filesize

    492KB

    MD5

    89687151e74829c67e476f4ba00c11a6

    SHA1

    e741203b32de50840b90861ad47e26a32c9e62f2

    SHA256

    1a56f5014451cf43a25675759b26bd1a3f83c212bfcb81211a87dd0bebc5a608

    SHA512

    31ca138e78d52a8ead71509acb2a723c61896e6645c43e205cc4e3a320741c71fac7fb0e0b0bad50f351e7c9caa7ea57cb3c8cb1ae5bbef823972a8d1dd997c7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1391808.exe

    Filesize

    492KB

    MD5

    89687151e74829c67e476f4ba00c11a6

    SHA1

    e741203b32de50840b90861ad47e26a32c9e62f2

    SHA256

    1a56f5014451cf43a25675759b26bd1a3f83c212bfcb81211a87dd0bebc5a608

    SHA512

    31ca138e78d52a8ead71509acb2a723c61896e6645c43e205cc4e3a320741c71fac7fb0e0b0bad50f351e7c9caa7ea57cb3c8cb1ae5bbef823972a8d1dd997c7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exe

    Filesize

    325KB

    MD5

    95b9bc86e89f7d03faa3647558ade3a8

    SHA1

    df9b5e4c873383c6c90e64dd876a8aa78913783d

    SHA256

    6d6ceb69521c9428046213af9e53033156dcac00adfb52d51acbb126913e2149

    SHA512

    4dc78d2a0b904c199983e404812026b126ec78b83919cf4299dfdc7b2c2c94d92c2d1faf2504d413a1c9db24aa8bebbb59272488ac6065a87ba3ab79c897ab54

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8767608.exe

    Filesize

    325KB

    MD5

    95b9bc86e89f7d03faa3647558ade3a8

    SHA1

    df9b5e4c873383c6c90e64dd876a8aa78913783d

    SHA256

    6d6ceb69521c9428046213af9e53033156dcac00adfb52d51acbb126913e2149

    SHA512

    4dc78d2a0b904c199983e404812026b126ec78b83919cf4299dfdc7b2c2c94d92c2d1faf2504d413a1c9db24aa8bebbb59272488ac6065a87ba3ab79c897ab54

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exe

    Filesize

    294KB

    MD5

    270c0a34d0fa2f168743874e8b8a0e43

    SHA1

    9c3acc955ed84ab55f3062d0cdfee1dc0a66529e

    SHA256

    183c9a06508edd7185e50d3ef0e55afd850f14de3e82bfdd0a6e1e27e9e5c987

    SHA512

    96c5a5900c46e9c3144cd9bba497dc556461e8612f246334697f2c7d4f058e73cce4bd2e1cbef7e90908f45106e8c56b154cdcd2b362d77eed44a186762e697b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9586554.exe

    Filesize

    294KB

    MD5

    270c0a34d0fa2f168743874e8b8a0e43

    SHA1

    9c3acc955ed84ab55f3062d0cdfee1dc0a66529e

    SHA256

    183c9a06508edd7185e50d3ef0e55afd850f14de3e82bfdd0a6e1e27e9e5c987

    SHA512

    96c5a5900c46e9c3144cd9bba497dc556461e8612f246334697f2c7d4f058e73cce4bd2e1cbef7e90908f45106e8c56b154cdcd2b362d77eed44a186762e697b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8229368.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/216-171-0x0000000074100000-0x00000000748B0000-memory.dmp

    Filesize

    7.7MB

  • memory/216-174-0x0000000074100000-0x00000000748B0000-memory.dmp

    Filesize

    7.7MB

  • memory/216-170-0x00000000025A0000-0x00000000025A1000-memory.dmp

    Filesize

    4KB

  • memory/216-169-0x0000000000560000-0x000000000059E000-memory.dmp

    Filesize

    248KB

  • memory/216-168-0x0000000074100000-0x00000000748B0000-memory.dmp

    Filesize

    7.7MB

  • memory/216-162-0x0000000000560000-0x000000000059E000-memory.dmp

    Filesize

    248KB

  • memory/216-161-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2148-178-0x00000000008C0000-0x00000000008CA000-memory.dmp

    Filesize

    40KB

  • memory/2148-179-0x00007FFA3BE60000-0x00007FFA3C921000-memory.dmp

    Filesize

    10.8MB

  • memory/2148-181-0x00007FFA3BE60000-0x00007FFA3C921000-memory.dmp

    Filesize

    10.8MB

  • memory/4784-186-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4784-185-0x0000000000590000-0x000000000061C000-memory.dmp

    Filesize

    560KB

  • memory/4784-193-0x0000000074100000-0x00000000748B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4784-194-0x0000000000590000-0x000000000061C000-memory.dmp

    Filesize

    560KB

  • memory/4784-196-0x0000000008030000-0x0000000008648000-memory.dmp

    Filesize

    6.1MB

  • memory/4784-197-0x00000000086C0000-0x00000000087CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4784-198-0x0000000006BA0000-0x0000000006BB0000-memory.dmp

    Filesize

    64KB

  • memory/4784-199-0x00000000087F0000-0x0000000008802000-memory.dmp

    Filesize

    72KB

  • memory/4784-200-0x0000000008810000-0x000000000884C000-memory.dmp

    Filesize

    240KB

  • memory/4784-201-0x0000000074100000-0x00000000748B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4784-202-0x0000000006BA0000-0x0000000006BB0000-memory.dmp

    Filesize

    64KB