Analysis

  • max time kernel
    294s
  • max time network
    307s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2023 06:51

General

  • Target

    x6161540.exe

  • Size

    487KB

  • MD5

    1990265e89bd2fdc7e857cdef4fad2ce

  • SHA1

    3ba988dc7d323f9cdf6745b7e46326e763923507

  • SHA256

    8449031e10e7cd77dd596d4c3c923d1e099662892a6777491d29a540f130485a

  • SHA512

    0fed439071296196ee6abc47f24062ba9e1afd1410fbca41fc17d6bad1f71ff9fdc459369d11f7cb92b4d75deae39ad8774fc5522c81157c26f98ae1a0b26f33

  • SSDEEP

    12288:1MrPy90ZIBqJnrVpTQw/a3uXjyJFwIMp:+yCIuV1yeXmPwz

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x6161540.exe
    "C:\Users\Admin\AppData\Local\Temp\x6161540.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391797.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391797.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6373050.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6373050.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:5092
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4424
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7041528.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7041528.exe
          3⤵
          • Executes dropped EXE
          PID:2960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391797.exe

      Filesize

      321KB

      MD5

      dba7de05cbeabdc859adfc5b6498a558

      SHA1

      653ebef6f9214b020def4354caa166457dcb8bcb

      SHA256

      3f021e6c4a954aa68bfc5acf5a86dad05b1dd124b742ff26392f7cb71edad49c

      SHA512

      dd716f1414c6bbb0a5dadbc3c6e5596f3b25282711c7ecafc6799a9a3c057d01e1aad924ca5348423449e24386c0e22a15321d739e27ae9bee17bcada8d22c5c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9391797.exe

      Filesize

      321KB

      MD5

      dba7de05cbeabdc859adfc5b6498a558

      SHA1

      653ebef6f9214b020def4354caa166457dcb8bcb

      SHA256

      3f021e6c4a954aa68bfc5acf5a86dad05b1dd124b742ff26392f7cb71edad49c

      SHA512

      dd716f1414c6bbb0a5dadbc3c6e5596f3b25282711c7ecafc6799a9a3c057d01e1aad924ca5348423449e24386c0e22a15321d739e27ae9bee17bcada8d22c5c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6373050.exe

      Filesize

      236KB

      MD5

      9dc867c2adacdd76b2324bc47467f83c

      SHA1

      f3decfe079b8dc76d536de7ca9aeec2c0da18d72

      SHA256

      5158a232d953ba32ce82499cdc54e8d7fd113b3672c9b9d82ee5df3f842eb410

      SHA512

      0b7c0c7514e7468cf89e6492608ab2e24054c94ebc77fe571dba7c9aa612f82c3d5d0c3c62f1e9acbfd01229568b83847dd9ff331f618b7bb8cb89d3437aacff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6373050.exe

      Filesize

      236KB

      MD5

      9dc867c2adacdd76b2324bc47467f83c

      SHA1

      f3decfe079b8dc76d536de7ca9aeec2c0da18d72

      SHA256

      5158a232d953ba32ce82499cdc54e8d7fd113b3672c9b9d82ee5df3f842eb410

      SHA512

      0b7c0c7514e7468cf89e6492608ab2e24054c94ebc77fe571dba7c9aa612f82c3d5d0c3c62f1e9acbfd01229568b83847dd9ff331f618b7bb8cb89d3437aacff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7041528.exe

      Filesize

      174KB

      MD5

      17061663123df86496cfa24e531b4127

      SHA1

      446ad405b223ce6e9197ec7ef814516d9d99caa8

      SHA256

      da7d0eb65df4abc42e450a6419eb96af0f77816f0c0cdf3c943cd98f8d6867cd

      SHA512

      b52254ceef131d9d7b8ab5d9f7e0737870575d82f3479fb90f8a19654c8070c431e9be06c6f9df46db01c1b1e4e607458feb93300f43056b872f937723e489e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7041528.exe

      Filesize

      174KB

      MD5

      17061663123df86496cfa24e531b4127

      SHA1

      446ad405b223ce6e9197ec7ef814516d9d99caa8

      SHA256

      da7d0eb65df4abc42e450a6419eb96af0f77816f0c0cdf3c943cd98f8d6867cd

      SHA512

      b52254ceef131d9d7b8ab5d9f7e0737870575d82f3479fb90f8a19654c8070c431e9be06c6f9df46db01c1b1e4e607458feb93300f43056b872f937723e489e4

    • memory/2960-26-0x0000000004E40000-0x0000000004F4A000-memory.dmp

      Filesize

      1.0MB

    • memory/2960-21-0x0000000000260000-0x0000000000290000-memory.dmp

      Filesize

      192KB

    • memory/2960-22-0x0000000073140000-0x000000007382E000-memory.dmp

      Filesize

      6.9MB

    • memory/2960-23-0x00000000025D0000-0x00000000025D6000-memory.dmp

      Filesize

      24KB

    • memory/2960-25-0x0000000005340000-0x0000000005946000-memory.dmp

      Filesize

      6.0MB

    • memory/2960-27-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/2960-28-0x0000000004D30000-0x0000000004D6E000-memory.dmp

      Filesize

      248KB

    • memory/2960-29-0x0000000004D70000-0x0000000004DBB000-memory.dmp

      Filesize

      300KB

    • memory/2960-38-0x0000000073140000-0x000000007382E000-memory.dmp

      Filesize

      6.9MB

    • memory/4424-24-0x0000000073140000-0x000000007382E000-memory.dmp

      Filesize

      6.9MB

    • memory/4424-14-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4424-39-0x0000000073140000-0x000000007382E000-memory.dmp

      Filesize

      6.9MB

    • memory/4424-54-0x0000000073140000-0x000000007382E000-memory.dmp

      Filesize

      6.9MB