Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 11:25

General

  • Target

    f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe

  • Size

    930KB

  • MD5

    69d4b134b45ae8c32164982f0a0a0250

  • SHA1

    a34f7ef8737dbdf249cebe9841ab9db7bb6a1cfa

  • SHA256

    f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9

  • SHA512

    da0c6ea98b396811e7f8969a00a8a167326ff510a6130b6c533965b9f9cce787f1c899b516cad99f0aff05151081bd8aa8894487c66b797da92f71ed86a27e24

  • SSDEEP

    24576:ByCWsJ/fZliIwzPbOXLBGkF7S4YFGDvT73nwY:0CbJ5ot7bObBNF7STEvvw

Malware Config

Extracted

Family

redline

Botnet

nrava

C2

77.91.124.82:19071

Attributes
  • auth_value

    43fe50e9ee6afb85588e03ac9676e2f7

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:4368
  • C:\Users\Admin\AppData\Local\Temp\f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe
    "C:\Users\Admin\AppData\Local\Temp\f580e6f232f3ab8a2fbe21792e6453a162881318904c208aa4d5b2f8fbed96f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2524
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exe
              6⤵
              • Executes dropped EXE
              PID:2424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exe
            5⤵
            • Executes dropped EXE
            PID:5092

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exe

          Filesize

          824KB

          MD5

          d37f800b32300edf877b6fcc0408ce22

          SHA1

          2e835a866def53bb01c3bf4406f00bd7655322f2

          SHA256

          8ae7635664e410f39666f717e55c62cbe37efdd39d962bdc8412041b54b84058

          SHA512

          776e63d0ab7d57348a488810020388b9b4b753842de1defd4f891ae3cdc4b50bcb15b472119ea984f400daece9d029d2bab243dd7b2e501e721547472d122d0a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6468234.exe

          Filesize

          824KB

          MD5

          d37f800b32300edf877b6fcc0408ce22

          SHA1

          2e835a866def53bb01c3bf4406f00bd7655322f2

          SHA256

          8ae7635664e410f39666f717e55c62cbe37efdd39d962bdc8412041b54b84058

          SHA512

          776e63d0ab7d57348a488810020388b9b4b753842de1defd4f891ae3cdc4b50bcb15b472119ea984f400daece9d029d2bab243dd7b2e501e721547472d122d0a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exe

          Filesize

          599KB

          MD5

          430fe3b7964e72062f1594f6169f5996

          SHA1

          f447b07e8fec806ee5d1ba1a22882f67bb546aa2

          SHA256

          705f1b68af2796a6aa691c7f277853b60d949b9fdfd2c7d3f973743dab4951ef

          SHA512

          0e2843ad3525b1da727d33131ab14ab17ea199dbdd694c985fda4c045e77e4156eb7c2b4fe57a6bab18087994d26d0c070984dbdada8779e3d7e9b4daeb29f1c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9662450.exe

          Filesize

          599KB

          MD5

          430fe3b7964e72062f1594f6169f5996

          SHA1

          f447b07e8fec806ee5d1ba1a22882f67bb546aa2

          SHA256

          705f1b68af2796a6aa691c7f277853b60d949b9fdfd2c7d3f973743dab4951ef

          SHA512

          0e2843ad3525b1da727d33131ab14ab17ea199dbdd694c985fda4c045e77e4156eb7c2b4fe57a6bab18087994d26d0c070984dbdada8779e3d7e9b4daeb29f1c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exe

          Filesize

          373KB

          MD5

          32972610848d7a00ce1515c51cb9cecb

          SHA1

          1a20b3acfd815062c90077f0386fa5066fd8867f

          SHA256

          4e9d3521223d0f12dbe68f514ffee86257f75cecac990e2cf05bd92668b1bd1d

          SHA512

          4d22d1edbec1932975970849caea7eb79c1f2fa6e42f75ab9a6c44643e9730a27ce09a772eb6fc066501155e1a2086b5c3117af0ecb75306970edfa597983ced

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6126497.exe

          Filesize

          373KB

          MD5

          32972610848d7a00ce1515c51cb9cecb

          SHA1

          1a20b3acfd815062c90077f0386fa5066fd8867f

          SHA256

          4e9d3521223d0f12dbe68f514ffee86257f75cecac990e2cf05bd92668b1bd1d

          SHA512

          4d22d1edbec1932975970849caea7eb79c1f2fa6e42f75ab9a6c44643e9730a27ce09a772eb6fc066501155e1a2086b5c3117af0ecb75306970edfa597983ced

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exe

          Filesize

          173KB

          MD5

          9cd4c778e89290f473d51c11947d97c9

          SHA1

          60b7f2759cf01a0042684040adc5b232013fe6c8

          SHA256

          a2944bc5de67986dca5d3f114b57d89ade306e1947a0840241ed6d9d756e6969

          SHA512

          95a695f4d8c6e7a58b37f2a2ec123439a9d9854f956b4f934c92d6ceacc6e00608a7e4d60fef1d7769dfa88d2126df4d0e736e47e0d48bff667764da47313cee

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6769305.exe

          Filesize

          173KB

          MD5

          9cd4c778e89290f473d51c11947d97c9

          SHA1

          60b7f2759cf01a0042684040adc5b232013fe6c8

          SHA256

          a2944bc5de67986dca5d3f114b57d89ade306e1947a0840241ed6d9d756e6969

          SHA512

          95a695f4d8c6e7a58b37f2a2ec123439a9d9854f956b4f934c92d6ceacc6e00608a7e4d60fef1d7769dfa88d2126df4d0e736e47e0d48bff667764da47313cee

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exe

          Filesize

          217KB

          MD5

          85518164760ba147a4dd09b4c4011fd7

          SHA1

          e5e08e2ed28e7966931d4c069e0e73b830244a23

          SHA256

          772797bc05db3a299e407d6944dc481b565c97088e5fe2320e90f5b333159287

          SHA512

          f0623e2f1b06aed180972304c0388a568459cbc95806790bae77a4c12b1f0b1f21a688d7fd6ca19ac011eec544a5beb89d5cf22f836e3385b502e33c199b40dd

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1703867.exe

          Filesize

          217KB

          MD5

          85518164760ba147a4dd09b4c4011fd7

          SHA1

          e5e08e2ed28e7966931d4c069e0e73b830244a23

          SHA256

          772797bc05db3a299e407d6944dc481b565c97088e5fe2320e90f5b333159287

          SHA512

          f0623e2f1b06aed180972304c0388a568459cbc95806790bae77a4c12b1f0b1f21a688d7fd6ca19ac011eec544a5beb89d5cf22f836e3385b502e33c199b40dd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exe

          Filesize

          15KB

          MD5

          24ef40c91bcac69546c630b0f2326b85

          SHA1

          deaea8f10a57eec9b0bacc40502f568ef2a78463

          SHA256

          615294e14994d620b91c73870bc3e08d500b1beeca8a8e7265da4656e728ce16

          SHA512

          2aca6ed6754d4c9b4df6accce2f0129d043359e752ac578d549becb69a7ca82be0392a2b9eab071bcaf518fb480d046cf3e0a5f40c768b4be18ee112b0343c98

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4633353.exe

          Filesize

          15KB

          MD5

          24ef40c91bcac69546c630b0f2326b85

          SHA1

          deaea8f10a57eec9b0bacc40502f568ef2a78463

          SHA256

          615294e14994d620b91c73870bc3e08d500b1beeca8a8e7265da4656e728ce16

          SHA512

          2aca6ed6754d4c9b4df6accce2f0129d043359e752ac578d549becb69a7ca82be0392a2b9eab071bcaf518fb480d046cf3e0a5f40c768b4be18ee112b0343c98

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exe

          Filesize

          140KB

          MD5

          da1525d8beb1918972eac5008d878415

          SHA1

          dc3078bd3d358fc73d7f40d4ec5c6e24a47b700e

          SHA256

          e707a5f88b54f3f55a4c7c150143d2d62846607b11c0660b75108ffdaa9b69fe

          SHA512

          8f4850631ef586863d146d6d63ee17eaed23497e352d1837ecdb8b66b6bd5ff6c94431614f9f1e500d65f3d60def0d0fa3909e082d9ca31898c5b06065d32398

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8501792.exe

          Filesize

          140KB

          MD5

          da1525d8beb1918972eac5008d878415

          SHA1

          dc3078bd3d358fc73d7f40d4ec5c6e24a47b700e

          SHA256

          e707a5f88b54f3f55a4c7c150143d2d62846607b11c0660b75108ffdaa9b69fe

          SHA512

          8f4850631ef586863d146d6d63ee17eaed23497e352d1837ecdb8b66b6bd5ff6c94431614f9f1e500d65f3d60def0d0fa3909e082d9ca31898c5b06065d32398

        • memory/2524-45-0x00007FFFD0E80000-0x00007FFFD1941000-memory.dmp

          Filesize

          10.8MB

        • memory/2524-43-0x00007FFFD0E80000-0x00007FFFD1941000-memory.dmp

          Filesize

          10.8MB

        • memory/2524-42-0x0000000000500000-0x000000000050A000-memory.dmp

          Filesize

          40KB

        • memory/5092-52-0x00000000749C0000-0x0000000075170000-memory.dmp

          Filesize

          7.7MB

        • memory/5092-53-0x00000000009E0000-0x0000000000A10000-memory.dmp

          Filesize

          192KB

        • memory/5092-54-0x0000000005A70000-0x0000000006088000-memory.dmp

          Filesize

          6.1MB

        • memory/5092-55-0x0000000005560000-0x000000000566A000-memory.dmp

          Filesize

          1.0MB

        • memory/5092-57-0x00000000054A0000-0x00000000054B2000-memory.dmp

          Filesize

          72KB

        • memory/5092-56-0x0000000005340000-0x0000000005350000-memory.dmp

          Filesize

          64KB

        • memory/5092-58-0x0000000005500000-0x000000000553C000-memory.dmp

          Filesize

          240KB

        • memory/5092-59-0x00000000749C0000-0x0000000075170000-memory.dmp

          Filesize

          7.7MB

        • memory/5092-60-0x0000000005340000-0x0000000005350000-memory.dmp

          Filesize

          64KB