Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2023 23:41

General

  • Target

    4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe

  • Size

    388KB

  • MD5

    c41e7a606209a663480235a4de8e23da

  • SHA1

    58edfca9ee2e14e7cc17f68f85af8a5e73e84ce1

  • SHA256

    4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf

  • SHA512

    0d26a65ee4c431221d47078d9ce55dfcbedc709e0cb9033db86339802377706432cfc49713e9eab4fe7ee0268047fe3c5cab642622e2d0e073e65ab709bd0f60

  • SSDEEP

    12288:SMr9y90oq3fLDAnSdctvKZLZO5G5mA4T:/y9cfLEnSmZKZb57s

Malware Config

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe
    "C:\Users\Admin\AppData\Local\Temp\4eea2f9c6d4661e8e1b5a3f2fe5dd7595cb67adc46859ce23b6fd2dfe08b8eaf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exe
        3⤵
        • Executes dropped EXE
        PID:2184
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exe

    Filesize

    206KB

    MD5

    dd893a6c42d6a057e46968af0755d3e5

    SHA1

    4c4788974b6a9dd278924e03a0e4118695de9242

    SHA256

    754998efa966f18bbfc6f844a4f6f18b57da6dd8213b0d8123376417452161ba

    SHA512

    80810d5b7741ed23fa73e1face4bc9dd78c9ebde930f01958ab3223201a066346f79e6f2c363c2a1dc50343f50ac8e8885fe3c30c71c6d9e67876008aecb8e51

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7361623.exe

    Filesize

    206KB

    MD5

    dd893a6c42d6a057e46968af0755d3e5

    SHA1

    4c4788974b6a9dd278924e03a0e4118695de9242

    SHA256

    754998efa966f18bbfc6f844a4f6f18b57da6dd8213b0d8123376417452161ba

    SHA512

    80810d5b7741ed23fa73e1face4bc9dd78c9ebde930f01958ab3223201a066346f79e6f2c363c2a1dc50343f50ac8e8885fe3c30c71c6d9e67876008aecb8e51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exe

    Filesize

    13KB

    MD5

    50d726d53175bcd47ed344a3e0ad68ca

    SHA1

    52c24c53c292b79cea0b53ce2d5a45801975ef87

    SHA256

    00b1fdd8427a2e6af082ce1156a7cdc2acdf6d24cd1b9cfdc255f88e3327c154

    SHA512

    b9cba9fa8bb8143d5f48166e6e2f9ef981175450a7c3f12e74d496913f1002db7d5fbcfab475bf9318ccf1d2e76556cb5ae59ce7317474f1fae696f99e2dcc67

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6016279.exe

    Filesize

    13KB

    MD5

    50d726d53175bcd47ed344a3e0ad68ca

    SHA1

    52c24c53c292b79cea0b53ce2d5a45801975ef87

    SHA256

    00b1fdd8427a2e6af082ce1156a7cdc2acdf6d24cd1b9cfdc255f88e3327c154

    SHA512

    b9cba9fa8bb8143d5f48166e6e2f9ef981175450a7c3f12e74d496913f1002db7d5fbcfab475bf9318ccf1d2e76556cb5ae59ce7317474f1fae696f99e2dcc67

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exe

    Filesize

    175KB

    MD5

    f5459adae3f9001d7bb87dce48d4f7ad

    SHA1

    6682f18d18bc51464eee9c2e21fbed213afb8bbe

    SHA256

    be107baf51f46b0f4f0a287653866989c4429016fb541f41b092f169aefa8b39

    SHA512

    71e765cc3bb860f783f6d2a682bee5dd25c12b1a1784b27bf9e9a909c52ebcc05a234a88b6a0afe0bbea872e0c13cb856eb71a24a6469bff394cc6f5af6615ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6035712.exe

    Filesize

    175KB

    MD5

    f5459adae3f9001d7bb87dce48d4f7ad

    SHA1

    6682f18d18bc51464eee9c2e21fbed213afb8bbe

    SHA256

    be107baf51f46b0f4f0a287653866989c4429016fb541f41b092f169aefa8b39

    SHA512

    71e765cc3bb860f783f6d2a682bee5dd25c12b1a1784b27bf9e9a909c52ebcc05a234a88b6a0afe0bbea872e0c13cb856eb71a24a6469bff394cc6f5af6615ff

  • memory/1600-147-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/1600-150-0x00007FFA6E5E0000-0x00007FFA6F0A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1600-148-0x00007FFA6E5E0000-0x00007FFA6F0A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2184-154-0x00000000006F0000-0x0000000000720000-memory.dmp

    Filesize

    192KB

  • memory/2184-155-0x00000000743E0000-0x0000000074B90000-memory.dmp

    Filesize

    7.7MB

  • memory/2184-156-0x000000000AB60000-0x000000000B178000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-157-0x000000000A6A0000-0x000000000A7AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2184-158-0x0000000005070000-0x0000000005080000-memory.dmp

    Filesize

    64KB

  • memory/2184-159-0x000000000A5E0000-0x000000000A5F2000-memory.dmp

    Filesize

    72KB

  • memory/2184-160-0x000000000A640000-0x000000000A67C000-memory.dmp

    Filesize

    240KB

  • memory/2184-161-0x00000000743E0000-0x0000000074B90000-memory.dmp

    Filesize

    7.7MB

  • memory/2184-162-0x0000000005070000-0x0000000005080000-memory.dmp

    Filesize

    64KB