Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-07-2023 03:43

General

  • Target

    012e45bf9e254d66e33a51a72a445d515734fbe311a27d03980fc023cae431fa.exe

  • Size

    389KB

  • MD5

    4ddec11ec1718af98cb222f832a0e0a4

  • SHA1

    dccbb9f098a4d3ae90f3a7ca030b19c8ef77539d

  • SHA256

    012e45bf9e254d66e33a51a72a445d515734fbe311a27d03980fc023cae431fa

  • SHA512

    88d58d363e700ac7fc868e6793c9443bed5eaad12c0e2f1eb750d9a43e5e7f16f0d62c8a3859d522d498d674b3c2e559124426ea715e3aab45f2465517d176e3

  • SSDEEP

    6144:Kfy+bnr+ep0yN90QEmsGOwqm0kW6nZNfpnO2J1qcW2fhnMELOOwB8XB98YE8UHtR:JMriy90UsGjqcPvNOOCA/gHVR

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\012e45bf9e254d66e33a51a72a445d515734fbe311a27d03980fc023cae431fa.exe
    "C:\Users\Admin\AppData\Local\Temp\012e45bf9e254d66e33a51a72a445d515734fbe311a27d03980fc023cae431fa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6213354.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6213354.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0693154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0693154.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1510859.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1510859.exe
        3⤵
        • Executes dropped EXE
        PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6213354.exe

    Filesize

    206KB

    MD5

    32f72bfa9338eda2c5e75b080ef5b93a

    SHA1

    24b9b2e8a46d4d499103a2be24308d93ea2a3764

    SHA256

    f5bd444e97f2e77e2085e1a30ea3bde548fec2fd4b5ec1a77df0aa2a0beb3d93

    SHA512

    0484751925f1e15fed7102c4fb1fbba519af2bfc3773c43ce57d58f092ecf0ec8ac03560b1c942c0fac104516c354cd372a835058317c1098c75f75029051075

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6213354.exe

    Filesize

    206KB

    MD5

    32f72bfa9338eda2c5e75b080ef5b93a

    SHA1

    24b9b2e8a46d4d499103a2be24308d93ea2a3764

    SHA256

    f5bd444e97f2e77e2085e1a30ea3bde548fec2fd4b5ec1a77df0aa2a0beb3d93

    SHA512

    0484751925f1e15fed7102c4fb1fbba519af2bfc3773c43ce57d58f092ecf0ec8ac03560b1c942c0fac104516c354cd372a835058317c1098c75f75029051075

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0693154.exe

    Filesize

    14KB

    MD5

    f1d1827a4c79b1a42a8d3085d6a01527

    SHA1

    8ef108eddb49d4c01e2341125df41a4e54b7b573

    SHA256

    2dd571353e890b28cea40a71f85d7b5ccec364c126de2bed8ece6d66a76551b5

    SHA512

    bb1c4aac872c029a7105cc22849bc891edbf67754969a11cd84d1a0ca80bb863ff63df524b7cc25184ac1f14023731afbfd79d3219864a1ebe859af601fd38a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0693154.exe

    Filesize

    14KB

    MD5

    f1d1827a4c79b1a42a8d3085d6a01527

    SHA1

    8ef108eddb49d4c01e2341125df41a4e54b7b573

    SHA256

    2dd571353e890b28cea40a71f85d7b5ccec364c126de2bed8ece6d66a76551b5

    SHA512

    bb1c4aac872c029a7105cc22849bc891edbf67754969a11cd84d1a0ca80bb863ff63df524b7cc25184ac1f14023731afbfd79d3219864a1ebe859af601fd38a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1510859.exe

    Filesize

    173KB

    MD5

    6c760615a9b50dd99982374fec9e9051

    SHA1

    0eea67572454d5f3aba650b52197d3af1f63bb1d

    SHA256

    1a2a162e31ad1dd9bd1130fc8055e0039c25fcd6c714088c578eae915c71eec8

    SHA512

    1e294429505de305afef89322163f6e303354a1051969dde0d5c2309d02f05841e0622c0e5100343093b74ad72c7d949a17ec308788f4fd03b796ee1f324cb30

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1510859.exe

    Filesize

    173KB

    MD5

    6c760615a9b50dd99982374fec9e9051

    SHA1

    0eea67572454d5f3aba650b52197d3af1f63bb1d

    SHA256

    1a2a162e31ad1dd9bd1130fc8055e0039c25fcd6c714088c578eae915c71eec8

    SHA512

    1e294429505de305afef89322163f6e303354a1051969dde0d5c2309d02f05841e0622c0e5100343093b74ad72c7d949a17ec308788f4fd03b796ee1f324cb30

  • memory/1368-142-0x000000000AFD0000-0x000000000B5D6000-memory.dmp

    Filesize

    6.0MB

  • memory/1368-139-0x0000000000CC0000-0x0000000000CF0000-memory.dmp

    Filesize

    192KB

  • memory/1368-140-0x00000000736C0000-0x0000000073DAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1368-141-0x0000000002F40000-0x0000000002F46000-memory.dmp

    Filesize

    24KB

  • memory/1368-143-0x000000000AAD0000-0x000000000ABDA000-memory.dmp

    Filesize

    1.0MB

  • memory/1368-144-0x000000000AA00000-0x000000000AA12000-memory.dmp

    Filesize

    72KB

  • memory/1368-145-0x000000000AA60000-0x000000000AA9E000-memory.dmp

    Filesize

    248KB

  • memory/1368-146-0x000000000ABE0000-0x000000000AC2B000-memory.dmp

    Filesize

    300KB

  • memory/1368-147-0x00000000736C0000-0x0000000073DAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1984-135-0x00007FFDF2640000-0x00007FFDF302C000-memory.dmp

    Filesize

    9.9MB

  • memory/1984-133-0x00007FFDF2640000-0x00007FFDF302C000-memory.dmp

    Filesize

    9.9MB

  • memory/1984-132-0x0000000000940000-0x000000000094A000-memory.dmp

    Filesize

    40KB