Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-08-2023 11:06

General

  • Target

    aaaf7c775b68d2863b13e2fe299661e9ae6f97d422b03062699d879b0bb5f526.exe

  • Size

    564KB

  • MD5

    4b528358798f8e1a406dc666b0c50b92

  • SHA1

    c87ab4e7b93caab728a4f3a724144cff8d58662e

  • SHA256

    aaaf7c775b68d2863b13e2fe299661e9ae6f97d422b03062699d879b0bb5f526

  • SHA512

    4cffd85961fc08507e11f2deaac40c900697da80a0ba2d055cc549ed6b317765b71d083d2fb06de5330a1d08c84669db42211085cef6a07ce20de671a3141cdb

  • SSDEEP

    12288:aMrby90QxNSvqlEmgT87QbRt6dk+kN00l0qrq:pyDxMvqaTG6tck+K0/x

Malware Config

Extracted

Family

redline

Botnet

maga

C2

77.91.124.54:19071

Attributes
  • auth_value

    9dd7a0be219be9b6228dc9b4e112b812

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaaf7c775b68d2863b13e2fe299661e9ae6f97d422b03062699d879b0bb5f526.exe
    "C:\Users\Admin\AppData\Local\Temp\aaaf7c775b68d2863b13e2fe299661e9ae6f97d422b03062699d879b0bb5f526.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4281107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4281107.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2978494.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2978494.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2767785.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2767785.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s5743423.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s5743423.exe
          4⤵
          • Executes dropped EXE
          PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4281107.exe

    Filesize

    431KB

    MD5

    64f2d01554c4d5d4ec5153618b51b6a0

    SHA1

    7743ac8ff5b182a8ce3dd88c7670cfc8466be445

    SHA256

    b3f5e779e76cbf6d513124ffb0ddf95f21904f082fc5181e3366fc843823215b

    SHA512

    a9af2a7ea601e05e1ec13960bbb535b258665c76ab17954a6268f63a5e8028490e3b120ab5040fc8e71771071e2f718ffaad79d544782909a045597123976f05

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4281107.exe

    Filesize

    431KB

    MD5

    64f2d01554c4d5d4ec5153618b51b6a0

    SHA1

    7743ac8ff5b182a8ce3dd88c7670cfc8466be445

    SHA256

    b3f5e779e76cbf6d513124ffb0ddf95f21904f082fc5181e3366fc843823215b

    SHA512

    a9af2a7ea601e05e1ec13960bbb535b258665c76ab17954a6268f63a5e8028490e3b120ab5040fc8e71771071e2f718ffaad79d544782909a045597123976f05

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2978494.exe

    Filesize

    206KB

    MD5

    849a8576d6ee0e3b783d90457e812f3f

    SHA1

    1dfbb45c15b436b8354bba4b6b93eadae02e4951

    SHA256

    28e26094c1bd4c6c93b4c011351391c109e4a5e1e60d1dac5f9b769f817c2b92

    SHA512

    7612b6eefee651f4106115ee5064c65eee54b1c4125b6d0dbd15d6d6e52276d8717b7b52ea1c628b30d10995e5692cb4a8fc6db6763c7be6012eec59ff9dc4e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2978494.exe

    Filesize

    206KB

    MD5

    849a8576d6ee0e3b783d90457e812f3f

    SHA1

    1dfbb45c15b436b8354bba4b6b93eadae02e4951

    SHA256

    28e26094c1bd4c6c93b4c011351391c109e4a5e1e60d1dac5f9b769f817c2b92

    SHA512

    7612b6eefee651f4106115ee5064c65eee54b1c4125b6d0dbd15d6d6e52276d8717b7b52ea1c628b30d10995e5692cb4a8fc6db6763c7be6012eec59ff9dc4e6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2767785.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r2767785.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s5743423.exe

    Filesize

    174KB

    MD5

    c589a2892deb8511cb773c751b1f3e87

    SHA1

    bec401a3553e249a7538a5e9a9122deed71b61ce

    SHA256

    a7172f7f88ad5dd9d4d7287b181f6c18c2bede457b7f54c1a188289340987399

    SHA512

    888262be66ec6e6be572c0825173245e410e97c8306c4ea408d0478a925975f62cf08d342edaf6a8bbbcbcba0cc067a65df14764dacc4a81650a50817a24cabe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s5743423.exe

    Filesize

    174KB

    MD5

    c589a2892deb8511cb773c751b1f3e87

    SHA1

    bec401a3553e249a7538a5e9a9122deed71b61ce

    SHA256

    a7172f7f88ad5dd9d4d7287b181f6c18c2bede457b7f54c1a188289340987399

    SHA512

    888262be66ec6e6be572c0825173245e410e97c8306c4ea408d0478a925975f62cf08d342edaf6a8bbbcbcba0cc067a65df14764dacc4a81650a50817a24cabe

  • memory/1824-144-0x00007FFC00080000-0x00007FFC00A6C000-memory.dmp

    Filesize

    9.9MB

  • memory/1824-142-0x00007FFC00080000-0x00007FFC00A6C000-memory.dmp

    Filesize

    9.9MB

  • memory/1824-141-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3032-148-0x0000000000CA0000-0x0000000000CD0000-memory.dmp

    Filesize

    192KB

  • memory/3032-149-0x0000000073440000-0x0000000073B2E000-memory.dmp

    Filesize

    6.9MB

  • memory/3032-150-0x0000000001380000-0x0000000001386000-memory.dmp

    Filesize

    24KB

  • memory/3032-151-0x000000000AF30000-0x000000000B536000-memory.dmp

    Filesize

    6.0MB

  • memory/3032-152-0x000000000AAB0000-0x000000000ABBA000-memory.dmp

    Filesize

    1.0MB

  • memory/3032-153-0x000000000A9E0000-0x000000000A9F2000-memory.dmp

    Filesize

    72KB

  • memory/3032-154-0x000000000AA40000-0x000000000AA7E000-memory.dmp

    Filesize

    248KB

  • memory/3032-155-0x000000000ABC0000-0x000000000AC0B000-memory.dmp

    Filesize

    300KB

  • memory/3032-156-0x0000000073440000-0x0000000073B2E000-memory.dmp

    Filesize

    6.9MB