Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-08-2023 01:17

General

  • Target

    0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003.exe

  • Size

    564KB

  • MD5

    58399942b8c8fc3360bdaf02eeca3d08

  • SHA1

    9135b166ad6fa57edbbb4a4daa2118b6603b7294

  • SHA256

    0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003

  • SHA512

    2c3f102dd8ca577bdf8e6b9eab1fb763613a76ee2220724bf2e66b74eeed6768571b8d445531559d3c5b7b8d482e08e863a88271143172e5ee6b0c6c1345562d

  • SSDEEP

    12288:QMr7y90VMQmc4excUlpbK2qNhW6uNfmGKAjTxBEOAS:7yBQv2u1chWNNXj3AS

Malware Config

Extracted

Family

redline

Botnet

maga

C2

77.91.124.54:19071

Attributes
  • auth_value

    9dd7a0be219be9b6228dc9b4e112b812

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003.exe
    "C:\Users\Admin\AppData\Local\Temp\0f41373be7558d1e1cd066e8c4e35a0a6c7402cae1e71ae47fae971fce1e4003.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1078934.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1078934.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1110923.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1110923.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r3444483.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r3444483.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s8519639.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s8519639.exe
          4⤵
          • Executes dropped EXE
          PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1078934.exe

    Filesize

    431KB

    MD5

    b0debf0aebcc4ed0ce342ea1be48ec5d

    SHA1

    7148351152c528fe975b4451e9ee5e7bad71541c

    SHA256

    6b5fad648998d4ae56b9a3d57e65c5fe32f91390e8eb7d06327b3a856638c662

    SHA512

    8d9c67a829a8a9af1a87f61bf8a72e6a6254d7bfed6535a246751eda3c3c95535f320325faadcb2e00dcef92a4d7018e1df3667cf41128824d1c8dabadf12b9b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1078934.exe

    Filesize

    431KB

    MD5

    b0debf0aebcc4ed0ce342ea1be48ec5d

    SHA1

    7148351152c528fe975b4451e9ee5e7bad71541c

    SHA256

    6b5fad648998d4ae56b9a3d57e65c5fe32f91390e8eb7d06327b3a856638c662

    SHA512

    8d9c67a829a8a9af1a87f61bf8a72e6a6254d7bfed6535a246751eda3c3c95535f320325faadcb2e00dcef92a4d7018e1df3667cf41128824d1c8dabadf12b9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1110923.exe

    Filesize

    206KB

    MD5

    44034dea50cc4c2ae2925c224270f8d5

    SHA1

    64428843b5dbee521d4902f40f0640d4772cb9e7

    SHA256

    fb1a7fc6cd6dd701affe2716105642404e1910501d3e73f0e1021de7ea4b05a8

    SHA512

    369981b9a8fca9f3a52281dd7fee4e9262be0b23b037e4b09a715658b4316cdd5afe9cadd76804d82d17fc1f187bf027e7e28555e02eb9f46c065bbd96510c60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1110923.exe

    Filesize

    206KB

    MD5

    44034dea50cc4c2ae2925c224270f8d5

    SHA1

    64428843b5dbee521d4902f40f0640d4772cb9e7

    SHA256

    fb1a7fc6cd6dd701affe2716105642404e1910501d3e73f0e1021de7ea4b05a8

    SHA512

    369981b9a8fca9f3a52281dd7fee4e9262be0b23b037e4b09a715658b4316cdd5afe9cadd76804d82d17fc1f187bf027e7e28555e02eb9f46c065bbd96510c60

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r3444483.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r3444483.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s8519639.exe

    Filesize

    174KB

    MD5

    c589a2892deb8511cb773c751b1f3e87

    SHA1

    bec401a3553e249a7538a5e9a9122deed71b61ce

    SHA256

    a7172f7f88ad5dd9d4d7287b181f6c18c2bede457b7f54c1a188289340987399

    SHA512

    888262be66ec6e6be572c0825173245e410e97c8306c4ea408d0478a925975f62cf08d342edaf6a8bbbcbcba0cc067a65df14764dacc4a81650a50817a24cabe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\s8519639.exe

    Filesize

    174KB

    MD5

    c589a2892deb8511cb773c751b1f3e87

    SHA1

    bec401a3553e249a7538a5e9a9122deed71b61ce

    SHA256

    a7172f7f88ad5dd9d4d7287b181f6c18c2bede457b7f54c1a188289340987399

    SHA512

    888262be66ec6e6be572c0825173245e410e97c8306c4ea408d0478a925975f62cf08d342edaf6a8bbbcbcba0cc067a65df14764dacc4a81650a50817a24cabe

  • memory/232-145-0x0000000000230000-0x0000000000260000-memory.dmp

    Filesize

    192KB

  • memory/232-146-0x0000000073950000-0x000000007403E000-memory.dmp

    Filesize

    6.9MB

  • memory/232-147-0x0000000004B30000-0x0000000004B36000-memory.dmp

    Filesize

    24KB

  • memory/232-148-0x000000000A5F0000-0x000000000ABF6000-memory.dmp

    Filesize

    6.0MB

  • memory/232-149-0x000000000A180000-0x000000000A28A000-memory.dmp

    Filesize

    1.0MB

  • memory/232-150-0x000000000A0B0000-0x000000000A0C2000-memory.dmp

    Filesize

    72KB

  • memory/232-151-0x000000000A110000-0x000000000A14E000-memory.dmp

    Filesize

    248KB

  • memory/232-152-0x000000000A290000-0x000000000A2DB000-memory.dmp

    Filesize

    300KB

  • memory/232-153-0x0000000073950000-0x000000007403E000-memory.dmp

    Filesize

    6.9MB

  • memory/4516-141-0x00007FFA48C60000-0x00007FFA4964C000-memory.dmp

    Filesize

    9.9MB

  • memory/4516-139-0x00007FFA48C60000-0x00007FFA4964C000-memory.dmp

    Filesize

    9.9MB

  • memory/4516-138-0x0000000000CB0000-0x0000000000CBA000-memory.dmp

    Filesize

    40KB