Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 15:50

General

  • Target

    2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe

  • Size

    930KB

  • MD5

    4400bee0bcfbe06a676769701f5dd8bc

  • SHA1

    5ad061ab5ab3daef886cf82fdfad290e31d69ea6

  • SHA256

    2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126

  • SHA512

    01ae0e9a325b6263c0cfc038ea2773669a35716d624b8750b784dc719f3e9b0ee166b56049c0e12e9d606f774fcfb7f73ba5ee104cd183251f428f9256b20a6c

  • SSDEEP

    24576:WyL2Mm7jnnGy8IlD1Nr/pLMShNbt3COO1:lLReLGy/l5l/yQjy1

Malware Config

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe
    "C:\Users\Admin\AppData\Local\Temp\2895c3bf1877e86d29ef01190550d21daa4594e6d3794f1570f2436ce778e126.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4960
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4288
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1552
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exe
              6⤵
              • Executes dropped EXE
              PID:1936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exe
            5⤵
            • Executes dropped EXE
            PID:4992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exe

          Filesize

          825KB

          MD5

          d28007e2472806bd234c2d5c65949023

          SHA1

          33cba6a87d645ea7095b67906cb6ee5d990f87ab

          SHA256

          8db36d20cc038bed3c925ed6980d02751e8cd7c40b0964eed753f91a7af38ae3

          SHA512

          ac85cadf0f27d7f16bdd6b7b243c7275acf83e289b530c835972d95ffafa31a31bc2d7b55173de434f40f87a8e55bcc38727dda1413ba9bf7a238c023551b118

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2142130.exe

          Filesize

          825KB

          MD5

          d28007e2472806bd234c2d5c65949023

          SHA1

          33cba6a87d645ea7095b67906cb6ee5d990f87ab

          SHA256

          8db36d20cc038bed3c925ed6980d02751e8cd7c40b0964eed753f91a7af38ae3

          SHA512

          ac85cadf0f27d7f16bdd6b7b243c7275acf83e289b530c835972d95ffafa31a31bc2d7b55173de434f40f87a8e55bcc38727dda1413ba9bf7a238c023551b118

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exe

          Filesize

          599KB

          MD5

          aba307fe7a8f894b1b40d0074fa229ee

          SHA1

          0014cb12bf8b6b369f1077962cfdecac29b61da0

          SHA256

          a8c1c0225696bdcd396ffbff29a994bef4cf433f7ccfbfe3b4ae2e5094ec3510

          SHA512

          523695c5ffd7fe4bb674d857d6243a17f901f03bf2dbf96f6c0bf6c4e47d673af20ef66ce2315854eee300bdfdb29b6cb94a69a855e96d1882f3c02ac9a4cc79

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0024363.exe

          Filesize

          599KB

          MD5

          aba307fe7a8f894b1b40d0074fa229ee

          SHA1

          0014cb12bf8b6b369f1077962cfdecac29b61da0

          SHA256

          a8c1c0225696bdcd396ffbff29a994bef4cf433f7ccfbfe3b4ae2e5094ec3510

          SHA512

          523695c5ffd7fe4bb674d857d6243a17f901f03bf2dbf96f6c0bf6c4e47d673af20ef66ce2315854eee300bdfdb29b6cb94a69a855e96d1882f3c02ac9a4cc79

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exe

          Filesize

          373KB

          MD5

          fcd29086bd134b943ee3d2585a0cf653

          SHA1

          6d85cfb5208fd222b05cac29263985e01484a688

          SHA256

          667aff170a5c341853d28dc3e922197cca01e42f4f5ff5cddd97e982e1461858

          SHA512

          87a7da9ee2abed5f3556e97e5f87378998b1d262354983c4f102512d86101363294605e1003e9b367ea9fcab9c99ab68c88fad65d4b3b8633995bdcaa12f064c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2079933.exe

          Filesize

          373KB

          MD5

          fcd29086bd134b943ee3d2585a0cf653

          SHA1

          6d85cfb5208fd222b05cac29263985e01484a688

          SHA256

          667aff170a5c341853d28dc3e922197cca01e42f4f5ff5cddd97e982e1461858

          SHA512

          87a7da9ee2abed5f3556e97e5f87378998b1d262354983c4f102512d86101363294605e1003e9b367ea9fcab9c99ab68c88fad65d4b3b8633995bdcaa12f064c

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exe

          Filesize

          174KB

          MD5

          6b582303829cd9bdf10b0cb6250e6fc5

          SHA1

          0b29fb373bfe6cfdc0300b2dd19b4b268723dee1

          SHA256

          c92c20e9367f46f42237f6e52ff07177f03698517715943bc198b9f4a48d9884

          SHA512

          0b343de067fc5bf2075f9c4728955d2ffcd93394753b27dce8c4b7d5978890c27baa7f73b872a3dce8b08d8fbb5d625908bdf9fce32a9b5023bb125726693f3f

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9128096.exe

          Filesize

          174KB

          MD5

          6b582303829cd9bdf10b0cb6250e6fc5

          SHA1

          0b29fb373bfe6cfdc0300b2dd19b4b268723dee1

          SHA256

          c92c20e9367f46f42237f6e52ff07177f03698517715943bc198b9f4a48d9884

          SHA512

          0b343de067fc5bf2075f9c4728955d2ffcd93394753b27dce8c4b7d5978890c27baa7f73b872a3dce8b08d8fbb5d625908bdf9fce32a9b5023bb125726693f3f

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exe

          Filesize

          217KB

          MD5

          ae1bcb477e961c63952b64fb3c0bafd1

          SHA1

          82c2391d3e80e98fb75dfd6552ecfb1928e9a6a9

          SHA256

          2eae6b34e0e0466a955f775c080528d01252277a9d08443be9c8df0dda22a515

          SHA512

          55ee60c4ff5e96882541e1f8a706dd40f50554d4e67cb250d30a809757ce4d85959bf410e41a0e03c83f1ceec64f09c5cebcaec3245c7429d3ae9c69d0a86bbd

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1853669.exe

          Filesize

          217KB

          MD5

          ae1bcb477e961c63952b64fb3c0bafd1

          SHA1

          82c2391d3e80e98fb75dfd6552ecfb1928e9a6a9

          SHA256

          2eae6b34e0e0466a955f775c080528d01252277a9d08443be9c8df0dda22a515

          SHA512

          55ee60c4ff5e96882541e1f8a706dd40f50554d4e67cb250d30a809757ce4d85959bf410e41a0e03c83f1ceec64f09c5cebcaec3245c7429d3ae9c69d0a86bbd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exe

          Filesize

          14KB

          MD5

          807b2f628e383e31edc7d7425aaed076

          SHA1

          f51b4a42331eb92e44d71eb67ccd3a98469a0e43

          SHA256

          d13dd136d91f3eaa2e2799c2ced36d43048290285ecb3a3e31301fbcee7adb8c

          SHA512

          88cacb4af6d205a37f01e536a1c864f942b0f462a30c64cf601e3442dffda16fb9e0ba0c54549f4cc5b75ca55d4c90e1a8f2e93e41ca2ff96cff49241c2197dc

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8764209.exe

          Filesize

          14KB

          MD5

          807b2f628e383e31edc7d7425aaed076

          SHA1

          f51b4a42331eb92e44d71eb67ccd3a98469a0e43

          SHA256

          d13dd136d91f3eaa2e2799c2ced36d43048290285ecb3a3e31301fbcee7adb8c

          SHA512

          88cacb4af6d205a37f01e536a1c864f942b0f462a30c64cf601e3442dffda16fb9e0ba0c54549f4cc5b75ca55d4c90e1a8f2e93e41ca2ff96cff49241c2197dc

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exe

          Filesize

          141KB

          MD5

          6f4463617d8d91a1865adc08a46a4c69

          SHA1

          6f8f09825b5cb43c39e78be73b339c70c2c7c23c

          SHA256

          eb43910d5a4ca88192763fd4dbfa4e0ac023398f62f5463a6fc55c602545d2ff

          SHA512

          b1e45490cfeec4471b7d6b4c0960ff8e0f2569c740869962cfcca830fc595137d7c9088a987a6220d2c7779dfa8a4576d756b51cd7f5476e8b9a8111b842d324

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6945936.exe

          Filesize

          141KB

          MD5

          6f4463617d8d91a1865adc08a46a4c69

          SHA1

          6f8f09825b5cb43c39e78be73b339c70c2c7c23c

          SHA256

          eb43910d5a4ca88192763fd4dbfa4e0ac023398f62f5463a6fc55c602545d2ff

          SHA512

          b1e45490cfeec4471b7d6b4c0960ff8e0f2569c740869962cfcca830fc595137d7c9088a987a6220d2c7779dfa8a4576d756b51cd7f5476e8b9a8111b842d324

        • memory/1552-38-0x00007FFA3D060000-0x00007FFA3DB21000-memory.dmp

          Filesize

          10.8MB

        • memory/1552-36-0x00007FFA3D060000-0x00007FFA3DB21000-memory.dmp

          Filesize

          10.8MB

        • memory/1552-35-0x0000000000030000-0x000000000003A000-memory.dmp

          Filesize

          40KB

        • memory/4992-45-0x0000000000460000-0x0000000000490000-memory.dmp

          Filesize

          192KB

        • memory/4992-46-0x0000000074100000-0x00000000748B0000-memory.dmp

          Filesize

          7.7MB

        • memory/4992-47-0x00000000054D0000-0x0000000005AE8000-memory.dmp

          Filesize

          6.1MB

        • memory/4992-48-0x0000000004FF0000-0x00000000050FA000-memory.dmp

          Filesize

          1.0MB

        • memory/4992-49-0x00000000027F0000-0x0000000002800000-memory.dmp

          Filesize

          64KB

        • memory/4992-50-0x0000000004F30000-0x0000000004F42000-memory.dmp

          Filesize

          72KB

        • memory/4992-51-0x0000000004F90000-0x0000000004FCC000-memory.dmp

          Filesize

          240KB

        • memory/4992-52-0x0000000074100000-0x00000000748B0000-memory.dmp

          Filesize

          7.7MB

        • memory/4992-53-0x00000000027F0000-0x0000000002800000-memory.dmp

          Filesize

          64KB