Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2023 21:24

General

  • Target

    4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe

  • Size

    1.3MB

  • MD5

    38c0044f99107f194b63f9fe29f45f58

  • SHA1

    252b6a6edfc1b97ceb999d563201ece039a11164

  • SHA256

    4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb

  • SHA512

    e0724ee785f86706e6c041d8709d9de34a4536844942f558973cb24f231be2f0118b6ad3a67381b5545a266aabc0d8236237846295609406194f5924b4e32974

  • SSDEEP

    24576:px6d5CI3xqGvBSVbGM76eTSAdKIvY8Ss5VtX6rjs:G5CIBqkkN6eTSAQIQJKV4js

Malware Config

Extracted

Family

redline

Botnet

nash

C2

77.91.124.82:19071

Attributes
  • auth_value

    35b6b5194b4fd1ef78124b2387f0c668

Extracted

Family

redline

Botnet

monik

C2

77.91.124.82:19071

Attributes
  • auth_value

    da7d9ea0878f5901f1f8319d34bdccea

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe
    "C:\Users\Admin\AppData\Local\Temp\4243b819a4cacf20d035b5ea54043c3ca3e74f1ad4c5b00a36e7ff2972ffcacb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:1544
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:580
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1440
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4536
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:1140
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:848
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:2456
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        7⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1444
                    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
                      6⤵
                      • Executes dropped EXE
                      PID:3892
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 928
                        7⤵
                        • Program crash
                        PID:1764
                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
                    5⤵
                    • Executes dropped EXE
                    PID:2148
                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3764
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    5⤵
                      PID:3324
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1256
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    4⤵
                      PID:1540
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      4⤵
                        PID:5024
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3892 -ip 3892
                  1⤵
                    PID:5072

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Persistence

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  1
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Privilege Escalation

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  1
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Defense Evasion

                  Modify Registry

                  2
                  T1112

                  Impair Defenses

                  1
                  T1562

                  Disable or Modify Tools

                  1
                  T1562.001

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\4375vtb45tv8225nv4285n2.txt
                    Filesize

                    82B

                    MD5

                    1c2d4b43162663afa4f1f409ed8596d1

                    SHA1

                    410ad9790d5e3852b46119a18ac14ccde1ed7dca

                    SHA256

                    690707b2bcf265fd5a8524ef306f11c37cb4fe1e9c4567c9df48131fa9d22192

                    SHA512

                    2187ff7f91e64bc3ff94c72c9859419dfe4960518fac2952412f7068e98e04a9d41309511bf94b4f1244bb1d9631523684141fd8db9c400b2d6872aa1bad8278

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
                    Filesize

                    393KB

                    MD5

                    5b1f38496c0d9caaa74be03cfa5ca5e2

                    SHA1

                    e35647c714d3a847fca50277bbc1dec95ca8b961

                    SHA256

                    f9043b151a72e633ff11832602b405a6f63643eaa5e48ec69140851b4b61c3fb

                    SHA512

                    0da136a9005795ffd0b8ec226e78833b751fba74c41ce3ec5beae0f8aeab4a90c76c7da0b58ce3ac3f486092544f01bc767fd139fad03e10fe3f7ba6eb26719d

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3264434.exe
                    Filesize

                    393KB

                    MD5

                    5b1f38496c0d9caaa74be03cfa5ca5e2

                    SHA1

                    e35647c714d3a847fca50277bbc1dec95ca8b961

                    SHA256

                    f9043b151a72e633ff11832602b405a6f63643eaa5e48ec69140851b4b61c3fb

                    SHA512

                    0da136a9005795ffd0b8ec226e78833b751fba74c41ce3ec5beae0f8aeab4a90c76c7da0b58ce3ac3f486092544f01bc767fd139fad03e10fe3f7ba6eb26719d

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
                    Filesize

                    776KB

                    MD5

                    9412c3a1ecdfef27330b63af40e69aca

                    SHA1

                    5d3488821b72e8128e418db3a4fad2a2c6ffcbb6

                    SHA256

                    6bb7c3e1ef81a57e4228d3c2dc26bdca5760294c77b7aeb49b0887a2af2a0510

                    SHA512

                    165fbde49877580e9b1b080508fcb61ced06d993f998b877358ad09e0cca8f426cf6a2f0d412b9e9b9c6873e09f099bb60dd318024cf31b15fab623e6a22e9cf

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7101419.exe
                    Filesize

                    776KB

                    MD5

                    9412c3a1ecdfef27330b63af40e69aca

                    SHA1

                    5d3488821b72e8128e418db3a4fad2a2c6ffcbb6

                    SHA256

                    6bb7c3e1ef81a57e4228d3c2dc26bdca5760294c77b7aeb49b0887a2af2a0510

                    SHA512

                    165fbde49877580e9b1b080508fcb61ced06d993f998b877358ad09e0cca8f426cf6a2f0d412b9e9b9c6873e09f099bb60dd318024cf31b15fab623e6a22e9cf

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
                    Filesize

                    399KB

                    MD5

                    c98377ad81fd1968f314cea4cdd8f1a9

                    SHA1

                    2c77d82abfaf2ae85b82dd31efa4f403e706a2d2

                    SHA256

                    a194434158485b7611f4300ccac11b07464db89cc5bf09cc26601d872d393a07

                    SHA512

                    dd77775d71f83324fcce6a1cbaa3301251ee0e580c70c31c42cd921716a85303a37c4a22f31f4e4b029edeaa69d7fc27763b1d2a6008aff27688ee440e76ba0b

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\j2227000.exe
                    Filesize

                    399KB

                    MD5

                    c98377ad81fd1968f314cea4cdd8f1a9

                    SHA1

                    2c77d82abfaf2ae85b82dd31efa4f403e706a2d2

                    SHA256

                    a194434158485b7611f4300ccac11b07464db89cc5bf09cc26601d872d393a07

                    SHA512

                    dd77775d71f83324fcce6a1cbaa3301251ee0e580c70c31c42cd921716a85303a37c4a22f31f4e4b029edeaa69d7fc27763b1d2a6008aff27688ee440e76ba0b

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
                    Filesize

                    506KB

                    MD5

                    226dc41115838be6d98ecca6bc6ed7e6

                    SHA1

                    c7794d15e9ccea846ce7ff12dabceac36e2e1106

                    SHA256

                    514f889e17eb1fddb34ef4f57a15ac4725e9d4636b75a3548c21e2920031a15f

                    SHA512

                    613cb861d0fee178e717330bbd9df12071074e988b804f3b6e2ce8f6c577c0e5985c16ad11c37db9b4a451c53276d3792a55a614205d2dddfc681d0b0e17040c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8413719.exe
                    Filesize

                    506KB

                    MD5

                    226dc41115838be6d98ecca6bc6ed7e6

                    SHA1

                    c7794d15e9ccea846ce7ff12dabceac36e2e1106

                    SHA256

                    514f889e17eb1fddb34ef4f57a15ac4725e9d4636b75a3548c21e2920031a15f

                    SHA512

                    613cb861d0fee178e717330bbd9df12071074e988b804f3b6e2ce8f6c577c0e5985c16ad11c37db9b4a451c53276d3792a55a614205d2dddfc681d0b0e17040c

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
                    Filesize

                    168KB

                    MD5

                    4d5049062d20b7ff9e78c3dadec7ccb8

                    SHA1

                    fcfc7aeab4ab58d4db2df38f113b5984526bcd8f

                    SHA256

                    21a8db193093caf6acbcd14ba64c98a1c9f16998cade8f60fa0fb4dc63e33bd2

                    SHA512

                    df93b50c075eb5fd8ae1e1db0426bb5144fda44044cac1f5541387b415caa583ed481d818fcc929577ac4d6105ff3cf3e466859fbad1d888a97d3f33f6339dc1

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2748625.exe
                    Filesize

                    168KB

                    MD5

                    4d5049062d20b7ff9e78c3dadec7ccb8

                    SHA1

                    fcfc7aeab4ab58d4db2df38f113b5984526bcd8f

                    SHA256

                    21a8db193093caf6acbcd14ba64c98a1c9f16998cade8f60fa0fb4dc63e33bd2

                    SHA512

                    df93b50c075eb5fd8ae1e1db0426bb5144fda44044cac1f5541387b415caa583ed481d818fcc929577ac4d6105ff3cf3e466859fbad1d888a97d3f33f6339dc1

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
                    Filesize

                    320KB

                    MD5

                    42eff475d26211e1c98b9e2ba75fcfc7

                    SHA1

                    2df6a35b333563b34327e1bba7a45d1d525cef30

                    SHA256

                    cbd35bb66458d53bab6b7c0c5787938f1c4e0c093b4d51be0fb34ab5f8b814f6

                    SHA512

                    b40d35a68df0e4f2137bed6f16943b46e75ad6af21dad48fba59940bab4dc47153463975f9dbc863a934d331b3aa62cd798e2a716db81361d59407527a989932

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1442850.exe
                    Filesize

                    320KB

                    MD5

                    42eff475d26211e1c98b9e2ba75fcfc7

                    SHA1

                    2df6a35b333563b34327e1bba7a45d1d525cef30

                    SHA256

                    cbd35bb66458d53bab6b7c0c5787938f1c4e0c093b4d51be0fb34ab5f8b814f6

                    SHA512

                    b40d35a68df0e4f2137bed6f16943b46e75ad6af21dad48fba59940bab4dc47153463975f9dbc863a934d331b3aa62cd798e2a716db81361d59407527a989932

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
                    Filesize

                    236KB

                    MD5

                    07cc5cdde3f150f19f5431eff5b9cc3a

                    SHA1

                    70a059fac76cdb915a97e027d2ba4dc7b698dc7c

                    SHA256

                    9820df5483863f0748fabfadc44cc1da25bd16a0e299f277faa10a1e1f11f0db

                    SHA512

                    b2670b8b503892f849c69f61d1949750453579fb6d665e41328556bed5e0bdd3bc5f8f570864f84723ade92fd63c615df5d31ef180721a6f5f9151d580bfe1f7

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1223665.exe
                    Filesize

                    236KB

                    MD5

                    07cc5cdde3f150f19f5431eff5b9cc3a

                    SHA1

                    70a059fac76cdb915a97e027d2ba4dc7b698dc7c

                    SHA256

                    9820df5483863f0748fabfadc44cc1da25bd16a0e299f277faa10a1e1f11f0db

                    SHA512

                    b2670b8b503892f849c69f61d1949750453579fb6d665e41328556bed5e0bdd3bc5f8f570864f84723ade92fd63c615df5d31ef180721a6f5f9151d580bfe1f7

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
                    Filesize

                    173KB

                    MD5

                    6071879e8e1728df0141a799620f170a

                    SHA1

                    3b5df5c8007aef70bd105ed805e77787cf977149

                    SHA256

                    2cefb530e32d1be974b017745bcc0ab98d1da31c2d3a503af75cf3698448c612

                    SHA512

                    51d5d2c047b94245067155b9743f9f1ca0b4ced4369d105b6c5f03df414c8382d66d0091a659ad5adfffe4a9d68697b44a2fc95178202755086bfff676b84ae9

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3262544.exe
                    Filesize

                    173KB

                    MD5

                    6071879e8e1728df0141a799620f170a

                    SHA1

                    3b5df5c8007aef70bd105ed805e77787cf977149

                    SHA256

                    2cefb530e32d1be974b017745bcc0ab98d1da31c2d3a503af75cf3698448c612

                    SHA512

                    51d5d2c047b94245067155b9743f9f1ca0b4ced4369d105b6c5f03df414c8382d66d0091a659ad5adfffe4a9d68697b44a2fc95178202755086bfff676b84ae9

                  • memory/1444-32-0x0000000000400000-0x000000000040A000-memory.dmp
                    Filesize

                    40KB

                  • memory/1444-68-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1444-38-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/1444-66-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/3324-49-0x0000000001030000-0x0000000001036000-memory.dmp
                    Filesize

                    24KB

                  • memory/3324-56-0x0000000005120000-0x0000000005130000-memory.dmp
                    Filesize

                    64KB

                  • memory/3324-46-0x0000000000400000-0x0000000000430000-memory.dmp
                    Filesize

                    192KB

                  • memory/3324-70-0x0000000005120000-0x0000000005130000-memory.dmp
                    Filesize

                    64KB

                  • memory/3324-58-0x000000000A6F0000-0x000000000A73C000-memory.dmp
                    Filesize

                    304KB

                  • memory/3324-50-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/3324-69-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/3324-52-0x000000000AAD0000-0x000000000B0E8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/3324-53-0x000000000A5E0000-0x000000000A6EA000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/3324-54-0x000000000A520000-0x000000000A532000-memory.dmp
                    Filesize

                    72KB

                  • memory/3324-57-0x000000000A580000-0x000000000A5BC000-memory.dmp
                    Filesize

                    240KB

                  • memory/3892-39-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/3892-37-0x00000000744E0000-0x0000000074C90000-memory.dmp
                    Filesize

                    7.7MB

                  • memory/3892-36-0x0000000000980000-0x00000000009B0000-memory.dmp
                    Filesize

                    192KB

                  • memory/4976-0-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/4976-62-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/4976-1-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/4976-55-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/4976-2-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/4976-3-0x0000000000400000-0x0000000000513000-memory.dmp
                    Filesize

                    1.1MB

                  • memory/5024-60-0x0000000000400000-0x000000000042F000-memory.dmp
                    Filesize

                    188KB

                  • memory/5024-61-0x0000000000400000-0x000000000042F000-memory.dmp
                    Filesize

                    188KB

                  • memory/5024-64-0x0000000000400000-0x000000000042F000-memory.dmp
                    Filesize

                    188KB

                  • memory/5024-65-0x0000000000400000-0x000000000042F000-memory.dmp
                    Filesize

                    188KB

                  • memory/5024-59-0x0000000000400000-0x000000000042F000-memory.dmp
                    Filesize

                    188KB