Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2023, 02:56

General

  • Target

    19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe

  • Size

    827KB

  • MD5

    3700c868e24e15b4d2fb4fe4afcdd66a

  • SHA1

    481b50a21e2b4319a4b159866d1ab536e75fac07

  • SHA256

    19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755

  • SHA512

    7a27788513ef44e2533460a11444bbe31ea66ce2f9930424e5e60d9d699c752acb717a9c04f8097237a7eb7c3b7e3a42e9be311c20f3b30431d5e977b42df6ef

  • SSDEEP

    24576:8y3txcVb7D5zxVnWwubuiCWsomazd9Awa:r7cVnD3Yx4JaL

Malware Config

Extracted

Family

redline

Botnet

rwan

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c40eda5da4f888d6f61befbf947d9fe

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe
    "C:\Users\Admin\AppData\Local\Temp\19e46080c51b650ab50a5f4265dd0cac6c84e2813eea74f2d5d8e085b5f17755.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4848
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2388
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3788
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exe
              6⤵
              • Executes dropped EXE
              PID:4840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exe
            5⤵
            • Executes dropped EXE
            PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exe

    Filesize

    723KB

    MD5

    0978729b425be98377cf88a30fe108ae

    SHA1

    1acfa1720e1c6f3bd4aa34c438bfae07c2b54e17

    SHA256

    a8c27fcbc218abf26a2c49aadde6e72feecd410cf3dbe78db4857a3682f285d8

    SHA512

    d28df4508d0211b0d43e6c656e615923caca8f1e256b967d13c47559c327615ac77f0f65fedacf34e6a4650ea6887fa5e7377d0d86879dd95730ba5996179fbb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3718794.exe

    Filesize

    723KB

    MD5

    0978729b425be98377cf88a30fe108ae

    SHA1

    1acfa1720e1c6f3bd4aa34c438bfae07c2b54e17

    SHA256

    a8c27fcbc218abf26a2c49aadde6e72feecd410cf3dbe78db4857a3682f285d8

    SHA512

    d28df4508d0211b0d43e6c656e615923caca8f1e256b967d13c47559c327615ac77f0f65fedacf34e6a4650ea6887fa5e7377d0d86879dd95730ba5996179fbb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exe

    Filesize

    497KB

    MD5

    63f0b43f212fbf90142774434847af74

    SHA1

    10363f351d2bd755babefec499bb6b51d097b890

    SHA256

    ddac4d0e04984cdbe4bea80fc8074e95e78ad3a45fb54c3d13e11d66bab03718

    SHA512

    0e948f666fc641fbd591c2d25ecc5e0539f3f88bafbb5aa9623123db82a99df49f7654f3ce6fe5c39716c3bdcb7f2afe4b436c2df63d6961b7d8943b804874ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8007264.exe

    Filesize

    497KB

    MD5

    63f0b43f212fbf90142774434847af74

    SHA1

    10363f351d2bd755babefec499bb6b51d097b890

    SHA256

    ddac4d0e04984cdbe4bea80fc8074e95e78ad3a45fb54c3d13e11d66bab03718

    SHA512

    0e948f666fc641fbd591c2d25ecc5e0539f3f88bafbb5aa9623123db82a99df49f7654f3ce6fe5c39716c3bdcb7f2afe4b436c2df63d6961b7d8943b804874ff

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exe

    Filesize

    372KB

    MD5

    e86fcbf16d8671fd67814122edd77837

    SHA1

    1d98dfdd6a3fc1486da007402de53ab809cb5f7e

    SHA256

    ff4eeeffcc74a903874c7df76227effd0c0bdd7fd1a85d340749b086b583802b

    SHA512

    4f5ef8248bac54ae4f6f809fc94e9a1fa617a4dbde06ed3144ccee68b53e9bdc9fbf33e63a2ca5ec59b9b0f2ef2df9d7a99e61062f5612ff41561eda4a93c46a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5036474.exe

    Filesize

    372KB

    MD5

    e86fcbf16d8671fd67814122edd77837

    SHA1

    1d98dfdd6a3fc1486da007402de53ab809cb5f7e

    SHA256

    ff4eeeffcc74a903874c7df76227effd0c0bdd7fd1a85d340749b086b583802b

    SHA512

    4f5ef8248bac54ae4f6f809fc94e9a1fa617a4dbde06ed3144ccee68b53e9bdc9fbf33e63a2ca5ec59b9b0f2ef2df9d7a99e61062f5612ff41561eda4a93c46a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exe

    Filesize

    174KB

    MD5

    8cd788d57111c2a583c54bcaed30f56c

    SHA1

    1e68a2981dba7e60c7347f516c4a2c36be6a97ca

    SHA256

    52fe8e18c31e9b2aa99e39e302f43af330ffbcef3de46cce645154cc72938703

    SHA512

    c64ed6ae0346f0fb95dcc4db76306d37247e0281b1d9f3ea994501b87f0a43143a5ef0cfb7a6c946c34be8e2d39f5790c82719a595b9bd7a4ac6404f5986bf6d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4946403.exe

    Filesize

    174KB

    MD5

    8cd788d57111c2a583c54bcaed30f56c

    SHA1

    1e68a2981dba7e60c7347f516c4a2c36be6a97ca

    SHA256

    52fe8e18c31e9b2aa99e39e302f43af330ffbcef3de46cce645154cc72938703

    SHA512

    c64ed6ae0346f0fb95dcc4db76306d37247e0281b1d9f3ea994501b87f0a43143a5ef0cfb7a6c946c34be8e2d39f5790c82719a595b9bd7a4ac6404f5986bf6d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exe

    Filesize

    217KB

    MD5

    1cc6762b29686a885152f8717c0e9d72

    SHA1

    735f88f21dfbb98e12202f81eff23e9ba706cd6d

    SHA256

    fcf9bbd470580a489b2ab1fa301dde7fab5a9c0c0f99ad67e36d1454a6332b9f

    SHA512

    c2ea32056ac2e45875afa7dcfc86c25e2a9510c59b7ca9ab050043c55f0692acc10855b7107309b62b8591276d19bed84e5a090b9a4c76d7c7fc7002b2fa8170

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8475337.exe

    Filesize

    217KB

    MD5

    1cc6762b29686a885152f8717c0e9d72

    SHA1

    735f88f21dfbb98e12202f81eff23e9ba706cd6d

    SHA256

    fcf9bbd470580a489b2ab1fa301dde7fab5a9c0c0f99ad67e36d1454a6332b9f

    SHA512

    c2ea32056ac2e45875afa7dcfc86c25e2a9510c59b7ca9ab050043c55f0692acc10855b7107309b62b8591276d19bed84e5a090b9a4c76d7c7fc7002b2fa8170

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exe

    Filesize

    13KB

    MD5

    e02a910c5a245d112bfb2294cb9b7d1e

    SHA1

    89876ad6aba4148b1d78c05b86402e8df5ae20a4

    SHA256

    72b97fd95e8454ac5c870b2b5ce8625cb216cdb0813001e03f645c65fe3795af

    SHA512

    9e7bce930acb70d81b9a8979295b93fbe49006ed808dae933614407729bc36e443dda8c221e751b599dee24fbb0a656a53ca60022ccf89412d54288ff773b4b4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4543260.exe

    Filesize

    13KB

    MD5

    e02a910c5a245d112bfb2294cb9b7d1e

    SHA1

    89876ad6aba4148b1d78c05b86402e8df5ae20a4

    SHA256

    72b97fd95e8454ac5c870b2b5ce8625cb216cdb0813001e03f645c65fe3795af

    SHA512

    9e7bce930acb70d81b9a8979295b93fbe49006ed808dae933614407729bc36e443dda8c221e751b599dee24fbb0a656a53ca60022ccf89412d54288ff773b4b4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exe

    Filesize

    140KB

    MD5

    7f8b89757b716d68c6d9fb8df1d2e1d7

    SHA1

    d9d96b77d83f98a6f7bd7b5e8478fa439d1314e8

    SHA256

    36375064763445be94f6649fa621006966a24ca9e98a987afcad582c1f47c488

    SHA512

    275f99e95005ba004e015d91b128f5a6593e8a82d3306bd71b6091e42393f26ca25317d6c42c04265321f6c580e67b2645be138164d745573502b7d57b38986a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8123870.exe

    Filesize

    140KB

    MD5

    7f8b89757b716d68c6d9fb8df1d2e1d7

    SHA1

    d9d96b77d83f98a6f7bd7b5e8478fa439d1314e8

    SHA256

    36375064763445be94f6649fa621006966a24ca9e98a987afcad582c1f47c488

    SHA512

    275f99e95005ba004e015d91b128f5a6593e8a82d3306bd71b6091e42393f26ca25317d6c42c04265321f6c580e67b2645be138164d745573502b7d57b38986a

  • memory/2256-46-0x0000000000EF0000-0x0000000000F20000-memory.dmp

    Filesize

    192KB

  • memory/2256-47-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/2256-48-0x0000000005F30000-0x0000000006548000-memory.dmp

    Filesize

    6.1MB

  • memory/2256-49-0x0000000005A20000-0x0000000005B2A000-memory.dmp

    Filesize

    1.0MB

  • memory/2256-51-0x0000000005800000-0x0000000005810000-memory.dmp

    Filesize

    64KB

  • memory/2256-50-0x0000000005770000-0x0000000005782000-memory.dmp

    Filesize

    72KB

  • memory/2256-52-0x0000000005910000-0x000000000594C000-memory.dmp

    Filesize

    240KB

  • memory/2256-53-0x0000000074A60000-0x0000000075210000-memory.dmp

    Filesize

    7.7MB

  • memory/2256-54-0x0000000005800000-0x0000000005810000-memory.dmp

    Filesize

    64KB

  • memory/3788-39-0x00007FFD51EA0000-0x00007FFD52961000-memory.dmp

    Filesize

    10.8MB

  • memory/3788-37-0x00007FFD51EA0000-0x00007FFD52961000-memory.dmp

    Filesize

    10.8MB

  • memory/3788-36-0x00007FFD51EA0000-0x00007FFD52961000-memory.dmp

    Filesize

    10.8MB

  • memory/3788-35-0x0000000000690000-0x000000000069A000-memory.dmp

    Filesize

    40KB