Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 08:46

General

  • Target

    332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe

  • Size

    827KB

  • MD5

    72da958183bd9b3679c5a0b9f4f8a73a

  • SHA1

    3bf8a60694c8307e06ea1e8c847d4a6e587e0641

  • SHA256

    332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93

  • SHA512

    f99be6dbd54ee676a5f515804f5869bc5b565106bbb0e68fa84d2065197bb0f53295c5a791d206f0b0c620cdb7ba71c7876d7e56fca9eb4b0842edc1d23b88a3

  • SSDEEP

    12288:QMr6y900NiEIxog5CDALPdtzO0On2VQvDBqVIhohG/tNcNJJneQ7hX142D9Ggsej:6yZmBCDAL/rOZxiOcpbR1JcgS5m

Malware Config

Extracted

Family

redline

Botnet

vaga

C2

77.91.124.73:19071

Attributes
  • auth_value

    393905212ded984248e8e000e612d4fe

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
      PID:2396
    • C:\Users\Admin\AppData\Local\Temp\332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe
      "C:\Users\Admin\AppData\Local\Temp\332c4ad3060f7606f7f18e3a3bebe89794cc9efdb48c00d4b7f5011ff3701c93.exe"
      1⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2284
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:312
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exe
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1656
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exe
                6⤵
                • Executes dropped EXE
                PID:5036
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exe
              5⤵
              • Executes dropped EXE
              PID:1028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exe

      Filesize

      723KB

      MD5

      9783a38a6eae214753b7a553787e87e0

      SHA1

      4f6e8ead7398844ac6280738824218c908970595

      SHA256

      05a2a3ff546a97fc20873b89c91b67ec4ea5a9a7d32f960a9a192e6918be4083

      SHA512

      f5cb2b3abb9a0e2af53dc583684b1b9ce6843c76326387975a9ff2f88bff2db1e9bff9725829757c40f1c445c6c45ee8597aaba77dcabe69c94a43c8449df5b9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3638493.exe

      Filesize

      723KB

      MD5

      9783a38a6eae214753b7a553787e87e0

      SHA1

      4f6e8ead7398844ac6280738824218c908970595

      SHA256

      05a2a3ff546a97fc20873b89c91b67ec4ea5a9a7d32f960a9a192e6918be4083

      SHA512

      f5cb2b3abb9a0e2af53dc583684b1b9ce6843c76326387975a9ff2f88bff2db1e9bff9725829757c40f1c445c6c45ee8597aaba77dcabe69c94a43c8449df5b9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exe

      Filesize

      497KB

      MD5

      f07fb372dee5d85a426774695d146196

      SHA1

      e67b04829903babaf0e5052068cf725acfefc477

      SHA256

      d9e5211db80efd95c732cdc4606dffcac57a7dd872dbbdbe25214183b2e4afff

      SHA512

      ba6cca879cc1d545dff16af0250e3cf61e4ffbcc56f413c82f7b9330273cbddcb27d872ef387b823017735976bf9c5f4898ad794a195a68c0a0e57d4072370f1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2595192.exe

      Filesize

      497KB

      MD5

      f07fb372dee5d85a426774695d146196

      SHA1

      e67b04829903babaf0e5052068cf725acfefc477

      SHA256

      d9e5211db80efd95c732cdc4606dffcac57a7dd872dbbdbe25214183b2e4afff

      SHA512

      ba6cca879cc1d545dff16af0250e3cf61e4ffbcc56f413c82f7b9330273cbddcb27d872ef387b823017735976bf9c5f4898ad794a195a68c0a0e57d4072370f1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exe

      Filesize

      372KB

      MD5

      04f7baf5992b56154b6499f4228a318c

      SHA1

      8e383f91c86639d5c2530614846a15bf4e1b9531

      SHA256

      bbc9b5a958def976e8c22a224412e2506bdfcbfb0dc8dd6585d37bbeb761e8f7

      SHA512

      63b227bdf857d4253a41f873ef57a5a2cf6a6c260069cceb59f927086e5537d7db1045e835ea29d2832d4bb08f3ef8c7b77e041a939e926c7d0670d8b538736e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8799536.exe

      Filesize

      372KB

      MD5

      04f7baf5992b56154b6499f4228a318c

      SHA1

      8e383f91c86639d5c2530614846a15bf4e1b9531

      SHA256

      bbc9b5a958def976e8c22a224412e2506bdfcbfb0dc8dd6585d37bbeb761e8f7

      SHA512

      63b227bdf857d4253a41f873ef57a5a2cf6a6c260069cceb59f927086e5537d7db1045e835ea29d2832d4bb08f3ef8c7b77e041a939e926c7d0670d8b538736e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exe

      Filesize

      174KB

      MD5

      b5a1bc8c1db9111f2e9f7667b625d35b

      SHA1

      0d1a663863cdd774effbc14995f789ec32e73fd5

      SHA256

      f3b8b800d939f895c1f4d2e8df739a1d935e4dbcfc38746161285d010c02d1d6

      SHA512

      999a66a7398c2c7531984f85d705b320a9f82df287a4ef4db6e0ffa349758e58ef55989334a1dba95b2e28d7d2eebff86be4d6f0d9cb82a92e089a84509391a2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8372364.exe

      Filesize

      174KB

      MD5

      b5a1bc8c1db9111f2e9f7667b625d35b

      SHA1

      0d1a663863cdd774effbc14995f789ec32e73fd5

      SHA256

      f3b8b800d939f895c1f4d2e8df739a1d935e4dbcfc38746161285d010c02d1d6

      SHA512

      999a66a7398c2c7531984f85d705b320a9f82df287a4ef4db6e0ffa349758e58ef55989334a1dba95b2e28d7d2eebff86be4d6f0d9cb82a92e089a84509391a2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exe

      Filesize

      217KB

      MD5

      d00fd2fcf182fe5c849ac3531b1cb982

      SHA1

      b305b8e7cf534a11055fe9ebdba67a81c90d0805

      SHA256

      6c0c663dc0211baab7362e7ce9b34816bcc8f9f539fbfdca0aa989defb55f30e

      SHA512

      5ac6d1a2778a4539363e77bf6b19af13b8a9ecd9a34bb235fa45796550ebd5873daf50f3c2276ad1e68505c8b9d464a148e32decfb0afd26d7052adae48df547

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0157484.exe

      Filesize

      217KB

      MD5

      d00fd2fcf182fe5c849ac3531b1cb982

      SHA1

      b305b8e7cf534a11055fe9ebdba67a81c90d0805

      SHA256

      6c0c663dc0211baab7362e7ce9b34816bcc8f9f539fbfdca0aa989defb55f30e

      SHA512

      5ac6d1a2778a4539363e77bf6b19af13b8a9ecd9a34bb235fa45796550ebd5873daf50f3c2276ad1e68505c8b9d464a148e32decfb0afd26d7052adae48df547

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exe

      Filesize

      13KB

      MD5

      f98487dee6cf7670315b6b28be6b2569

      SHA1

      78bd3f5158012d74ee522ce08b776da83a4e8b16

      SHA256

      1358714c5b601268cbd85105a0769af0da33c5cd1e0e293b724841b6ff74e021

      SHA512

      c21a58196b6e6f2927bb4fa71d279ec32216148a39e7c75d1d3bbcbca61702a462078d98a3f8da38e7765c752ab61636af9502d65647fa30507a48014935c4ae

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6322156.exe

      Filesize

      13KB

      MD5

      f98487dee6cf7670315b6b28be6b2569

      SHA1

      78bd3f5158012d74ee522ce08b776da83a4e8b16

      SHA256

      1358714c5b601268cbd85105a0769af0da33c5cd1e0e293b724841b6ff74e021

      SHA512

      c21a58196b6e6f2927bb4fa71d279ec32216148a39e7c75d1d3bbcbca61702a462078d98a3f8da38e7765c752ab61636af9502d65647fa30507a48014935c4ae

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exe

      Filesize

      140KB

      MD5

      274ee844f3f0d06509ba702fb8b10aef

      SHA1

      03afb16b6513f498beae7e3bf5536d59d35441ba

      SHA256

      752291f14408e3aca55a076786955dafa977178355687c58b3fe0bc2d9e618e0

      SHA512

      49774e352f8b523686bb8691cf23471d7ba2de8e6a92ffa2561d60ca9ad054811b2b83a61f7481e1bb5e322a7bc2853d684919d2e15728cbca5fac2402a17e49

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9934605.exe

      Filesize

      140KB

      MD5

      274ee844f3f0d06509ba702fb8b10aef

      SHA1

      03afb16b6513f498beae7e3bf5536d59d35441ba

      SHA256

      752291f14408e3aca55a076786955dafa977178355687c58b3fe0bc2d9e618e0

      SHA512

      49774e352f8b523686bb8691cf23471d7ba2de8e6a92ffa2561d60ca9ad054811b2b83a61f7481e1bb5e322a7bc2853d684919d2e15728cbca5fac2402a17e49

    • memory/1028-52-0x00000000009D0000-0x0000000000A00000-memory.dmp

      Filesize

      192KB

    • memory/1028-51-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/1028-53-0x000000000AEC0000-0x000000000B4D8000-memory.dmp

      Filesize

      6.1MB

    • memory/1028-54-0x000000000A9B0000-0x000000000AABA000-memory.dmp

      Filesize

      1.0MB

    • memory/1028-55-0x0000000005410000-0x0000000005420000-memory.dmp

      Filesize

      64KB

    • memory/1028-56-0x000000000A8C0000-0x000000000A8D2000-memory.dmp

      Filesize

      72KB

    • memory/1028-57-0x000000000A920000-0x000000000A95C000-memory.dmp

      Filesize

      240KB

    • memory/1028-58-0x0000000074920000-0x00000000750D0000-memory.dmp

      Filesize

      7.7MB

    • memory/1028-59-0x0000000005410000-0x0000000005420000-memory.dmp

      Filesize

      64KB

    • memory/1656-44-0x00007FF9733C0000-0x00007FF973E81000-memory.dmp

      Filesize

      10.8MB

    • memory/1656-42-0x00007FF9733C0000-0x00007FF973E81000-memory.dmp

      Filesize

      10.8MB

    • memory/1656-41-0x0000000000E20000-0x0000000000E2A000-memory.dmp

      Filesize

      40KB