Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2023 07:32

General

  • Target

    b4c1293dce1605a1556693303e88cd64.exe

  • Size

    389KB

  • MD5

    b4c1293dce1605a1556693303e88cd64

  • SHA1

    5b36befa445ad4a4407d146f65fa73481c4e7fb5

  • SHA256

    6388154b88d7e6430e048e6b44ae647527fea9bb48918f678b04600396fd9095

  • SHA512

    8dfd45f57faa3b2140675eb081d87823643a0024a544575a9d7803414ec7100bc1ad39e2b03fdcad04d6cc8293bbc86bc5bae9fa4452165c18160108915925fb

  • SSDEEP

    12288:EMrUy90DroP4MYhD3nlF4ifHyA3s+MQh3d:wyi0xYhDX8HkTht

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c1293dce1605a1556693303e88cd64.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c1293dce1605a1556693303e88cd64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exe
        3⤵
        • Executes dropped EXE
        PID:3476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exe

    Filesize

    206KB

    MD5

    8ca0a12f0ae366aa1a0376551d08ebd9

    SHA1

    3449da575e4965dd1887828d88e557e79794aabf

    SHA256

    4e5e20cd5b854ab4d217f6d7866b472fbbac74b6168298e88b2580d330ed36a2

    SHA512

    fcd4f8b557e1878835107c626e8ecec40bc8cfb00456115de1a84430568e49b5b56d3818578eaf06a262b8acc15065a9ae721499669e12d9d58279025ebfa4ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0632674.exe

    Filesize

    206KB

    MD5

    8ca0a12f0ae366aa1a0376551d08ebd9

    SHA1

    3449da575e4965dd1887828d88e557e79794aabf

    SHA256

    4e5e20cd5b854ab4d217f6d7866b472fbbac74b6168298e88b2580d330ed36a2

    SHA512

    fcd4f8b557e1878835107c626e8ecec40bc8cfb00456115de1a84430568e49b5b56d3818578eaf06a262b8acc15065a9ae721499669e12d9d58279025ebfa4ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exe

    Filesize

    14KB

    MD5

    706a2ee7c943943f563411c91f8d7cce

    SHA1

    29880e82414e8963a34dc70a7e67f794ced8e121

    SHA256

    7d0ddac09ef5391e69ac6183eefcf5e5cdb29b8e2a866a6746ae3c9ff00f6c1f

    SHA512

    076e429862726912767d9aa5224850d22cfa8a1f98d69116963d04ac6a85543a9fde9aa53a0eb2306bef2e8f686a328b6a1e991d82fe65bde0556202f738ecd7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p8137477.exe

    Filesize

    14KB

    MD5

    706a2ee7c943943f563411c91f8d7cce

    SHA1

    29880e82414e8963a34dc70a7e67f794ced8e121

    SHA256

    7d0ddac09ef5391e69ac6183eefcf5e5cdb29b8e2a866a6746ae3c9ff00f6c1f

    SHA512

    076e429862726912767d9aa5224850d22cfa8a1f98d69116963d04ac6a85543a9fde9aa53a0eb2306bef2e8f686a328b6a1e991d82fe65bde0556202f738ecd7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exe

    Filesize

    173KB

    MD5

    170149de9393a2ae1a97b321a674ec9c

    SHA1

    ed906575b5f1dd8b0b2a2d187a86b9ebac1b5483

    SHA256

    227bf7cdc5170f203ae0046af121ca26ae4cbf3919a620b1c30a82b4aee77122

    SHA512

    973dc3001cf3b4a77a0d01c5dc3e96687e968a2b1b5aafa795658c5b86e9c1c88cdd5e56d38cd9b1be239cbca95e6114e2d4d3d0f0ef81941bc54b7b296c0554

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5541124.exe

    Filesize

    173KB

    MD5

    170149de9393a2ae1a97b321a674ec9c

    SHA1

    ed906575b5f1dd8b0b2a2d187a86b9ebac1b5483

    SHA256

    227bf7cdc5170f203ae0046af121ca26ae4cbf3919a620b1c30a82b4aee77122

    SHA512

    973dc3001cf3b4a77a0d01c5dc3e96687e968a2b1b5aafa795658c5b86e9c1c88cdd5e56d38cd9b1be239cbca95e6114e2d4d3d0f0ef81941bc54b7b296c0554

  • memory/3476-157-0x000000000A980000-0x000000000AA8A000-memory.dmp

    Filesize

    1.0MB

  • memory/3476-154-0x00000000009D0000-0x0000000000A00000-memory.dmp

    Filesize

    192KB

  • memory/3476-155-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-156-0x000000000AE10000-0x000000000B428000-memory.dmp

    Filesize

    6.1MB

  • memory/3476-158-0x00000000052E0000-0x00000000052F0000-memory.dmp

    Filesize

    64KB

  • memory/3476-159-0x000000000A8C0000-0x000000000A8D2000-memory.dmp

    Filesize

    72KB

  • memory/3476-160-0x000000000A920000-0x000000000A95C000-memory.dmp

    Filesize

    240KB

  • memory/3476-161-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-162-0x00000000052E0000-0x00000000052F0000-memory.dmp

    Filesize

    64KB

  • memory/3632-150-0x00007FF84F4E0000-0x00007FF84FFA1000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-148-0x00007FF84F4E0000-0x00007FF84FFA1000-memory.dmp

    Filesize

    10.8MB

  • memory/3632-147-0x0000000000E00000-0x0000000000E0A000-memory.dmp

    Filesize

    40KB