Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2023 07:26

General

  • Target

    4b5ac01b9c3209fb0bcddbad0986bb4a.exe

  • Size

    1.2MB

  • MD5

    4b5ac01b9c3209fb0bcddbad0986bb4a

  • SHA1

    65f2ae841ced39a952231d5c948a03656722e518

  • SHA256

    5de64d5ab56bad52329947e26f8110fed2348f921e93665a3999fc44153d6ef8

  • SHA512

    cc70c77b2ba9c02593ba6053a98b31cb024fcf0558df0c33baaca4e814c1f71e83829d653640f229a954c88299bb463edbb64b2c9b1d304bda6d281c2df75c0c

  • SSDEEP

    24576:kyYAb9wJ23e65odkfOhx+JdiKF6aLxOvTv/K1xBha1/jSZ6ZLBv:zX9wZMrlam7s

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b5ac01b9c3209fb0bcddbad0986bb4a.exe
    "C:\Users\Admin\AppData\Local\Temp\4b5ac01b9c3209fb0bcddbad0986bb4a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4396
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4468
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1036
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3920
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exe
            5⤵
            • Executes dropped EXE
            PID:5104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exe

    Filesize

    1.0MB

    MD5

    2554de4f69c715793d302d620a40eb81

    SHA1

    b63ebe514ed1ad9f39a6d40d713e7d43cb58ce51

    SHA256

    8b650875b3a4e3796586bf7368f52b1001d38f58eddd981b8e4e198f111c6292

    SHA512

    6d3cde4ea1a9e51c7cc55d176d13e3714d5d47e0a5547ef21b1feac9bae55a0a80658abad6421d6941de5275f6e66562161de2022aa42a4525321e844f64b0f6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8319158.exe

    Filesize

    1.0MB

    MD5

    2554de4f69c715793d302d620a40eb81

    SHA1

    b63ebe514ed1ad9f39a6d40d713e7d43cb58ce51

    SHA256

    8b650875b3a4e3796586bf7368f52b1001d38f58eddd981b8e4e198f111c6292

    SHA512

    6d3cde4ea1a9e51c7cc55d176d13e3714d5d47e0a5547ef21b1feac9bae55a0a80658abad6421d6941de5275f6e66562161de2022aa42a4525321e844f64b0f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exe

    Filesize

    905KB

    MD5

    bcafa44db7440eb1cd51c2ac880cfae8

    SHA1

    57581738292688e4c38d01fd2f29a454c38bcae2

    SHA256

    53f95ffb4caa69ee7526493140fe6b8ee4aa96563a68d2c920bdd78ae1804277

    SHA512

    b19e9c7da53a3f7369d3c5acf24959055277751e892f1e9d833fcc599e9b0eda0716ad5b917d26b1b7c98af432152b5e374478e69a412010fd010aa3f5b7a883

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0009867.exe

    Filesize

    905KB

    MD5

    bcafa44db7440eb1cd51c2ac880cfae8

    SHA1

    57581738292688e4c38d01fd2f29a454c38bcae2

    SHA256

    53f95ffb4caa69ee7526493140fe6b8ee4aa96563a68d2c920bdd78ae1804277

    SHA512

    b19e9c7da53a3f7369d3c5acf24959055277751e892f1e9d833fcc599e9b0eda0716ad5b917d26b1b7c98af432152b5e374478e69a412010fd010aa3f5b7a883

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exe

    Filesize

    722KB

    MD5

    c53b142269d1d9b131f279236444096e

    SHA1

    b795a3d640b62851405b7d86c3c252f3521edc38

    SHA256

    08dcb4581247485c99b5f3f288d6020accf80b831b030185812f7822e9420f51

    SHA512

    4c235ff91b6f8482c1b18d99c452802b9dda423604c018b086d67c10e11434bf6f298d76861c03bb605b44ab95f498e0fb483cbc568e98222acd1d71a133a78e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827570.exe

    Filesize

    722KB

    MD5

    c53b142269d1d9b131f279236444096e

    SHA1

    b795a3d640b62851405b7d86c3c252f3521edc38

    SHA256

    08dcb4581247485c99b5f3f288d6020accf80b831b030185812f7822e9420f51

    SHA512

    4c235ff91b6f8482c1b18d99c452802b9dda423604c018b086d67c10e11434bf6f298d76861c03bb605b44ab95f498e0fb483cbc568e98222acd1d71a133a78e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exe

    Filesize

    491KB

    MD5

    5259220ec6eae70ea9bee0a661a2a17f

    SHA1

    e3b06b482922efed206c6e353afbfc6c04df9345

    SHA256

    52a95a81b52fdb27422a7c78688e6389ec572f0425bd4361e2c382f0fb6f7efb

    SHA512

    9c91b108d7b75432e0b6c6f43e0a32e9d55162c3bd4e1d0a9ed2b02584264ed4f703480907eab68c3e024d100a705801f3209d9059dfaa6fd55413c45e6cf22e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8893916.exe

    Filesize

    491KB

    MD5

    5259220ec6eae70ea9bee0a661a2a17f

    SHA1

    e3b06b482922efed206c6e353afbfc6c04df9345

    SHA256

    52a95a81b52fdb27422a7c78688e6389ec572f0425bd4361e2c382f0fb6f7efb

    SHA512

    9c91b108d7b75432e0b6c6f43e0a32e9d55162c3bd4e1d0a9ed2b02584264ed4f703480907eab68c3e024d100a705801f3209d9059dfaa6fd55413c45e6cf22e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exe

    Filesize

    323KB

    MD5

    6b3eccbb4d12a45064c6c58f6d77771e

    SHA1

    14ea9a8e9d5c121dd0d3a2e5a421759ee28a14b6

    SHA256

    856e08dc44de6d9ba71d82832cd0f11e057c57bbb21b6480e46cd7117a0f2235

    SHA512

    c24870559328e301ed635996e56aa0d0836845ed4de19e6e8f8409258016cf3de8d86b4af4911d84698510897727c79223b7f52a41e451560cd2f263b4acb220

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0780615.exe

    Filesize

    323KB

    MD5

    6b3eccbb4d12a45064c6c58f6d77771e

    SHA1

    14ea9a8e9d5c121dd0d3a2e5a421759ee28a14b6

    SHA256

    856e08dc44de6d9ba71d82832cd0f11e057c57bbb21b6480e46cd7117a0f2235

    SHA512

    c24870559328e301ed635996e56aa0d0836845ed4de19e6e8f8409258016cf3de8d86b4af4911d84698510897727c79223b7f52a41e451560cd2f263b4acb220

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exe

    Filesize

    292KB

    MD5

    a62d98b28392beea67d7698beb4de235

    SHA1

    05d00045d911869426146752ccd7fdc9a2b5dbbb

    SHA256

    7a63b595dd620367a28894802fe55e3497a26f49c074542db5587a0b193f2ae8

    SHA512

    aecdf139061559195ce1abfed46a11924e3615a65cb84e6d2a5730ce50e12776fe1b2c2e0a0c39c4da383728fdddc473e102bb88d81e6b17e46318794c925080

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4255037.exe

    Filesize

    292KB

    MD5

    a62d98b28392beea67d7698beb4de235

    SHA1

    05d00045d911869426146752ccd7fdc9a2b5dbbb

    SHA256

    7a63b595dd620367a28894802fe55e3497a26f49c074542db5587a0b193f2ae8

    SHA512

    aecdf139061559195ce1abfed46a11924e3615a65cb84e6d2a5730ce50e12776fe1b2c2e0a0c39c4da383728fdddc473e102bb88d81e6b17e46318794c925080

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exe

    Filesize

    11KB

    MD5

    b42bc94c173371cb29363bcec84ea891

    SHA1

    1186105182733ed6be1d1821c87c35dcf5630492

    SHA256

    222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97

    SHA512

    47595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3001931.exe

    Filesize

    11KB

    MD5

    b42bc94c173371cb29363bcec84ea891

    SHA1

    1186105182733ed6be1d1821c87c35dcf5630492

    SHA256

    222e0e2c88d76ef51ace6ca8599eaefe080a3bcb0ed98281ca945df41eca6f97

    SHA512

    47595970fb4e93b6212fcde0fba7e5e0d1a4d70c54b52e5985e4e29da375f9857e198a463b79e0d914d487d6c59b8be5f2897f938859778f8789ea5a044022f6

  • memory/1036-178-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/1036-181-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/1036-177-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/1036-176-0x0000000000490000-0x00000000004CE000-memory.dmp

    Filesize

    248KB

  • memory/1036-175-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/1036-169-0x0000000000490000-0x00000000004CE000-memory.dmp

    Filesize

    248KB

  • memory/1036-168-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/3920-185-0x00000000003F0000-0x00000000003FA000-memory.dmp

    Filesize

    40KB

  • memory/3920-186-0x00007FFAD3480000-0x00007FFAD3F41000-memory.dmp

    Filesize

    10.8MB

  • memory/3920-188-0x00007FFAD3480000-0x00007FFAD3F41000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-192-0x0000000002020000-0x00000000020AC000-memory.dmp

    Filesize

    560KB

  • memory/5104-193-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/5104-200-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-201-0x0000000002020000-0x00000000020AC000-memory.dmp

    Filesize

    560KB

  • memory/5104-203-0x0000000005140000-0x0000000005758000-memory.dmp

    Filesize

    6.1MB

  • memory/5104-204-0x0000000004BB0000-0x0000000004CBA000-memory.dmp

    Filesize

    1.0MB

  • memory/5104-205-0x0000000006CA0000-0x0000000006CB0000-memory.dmp

    Filesize

    64KB

  • memory/5104-206-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

    Filesize

    72KB

  • memory/5104-207-0x0000000004D00000-0x0000000004D3C000-memory.dmp

    Filesize

    240KB

  • memory/5104-208-0x00000000742D0000-0x0000000074A80000-memory.dmp

    Filesize

    7.7MB

  • memory/5104-209-0x0000000006CA0000-0x0000000006CB0000-memory.dmp

    Filesize

    64KB