Analysis

  • max time kernel
    163s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 01:51

General

  • Target

    f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe

  • Size

    707KB

  • MD5

    af2e92d8bc98c86c3230c8cfa9356da5

  • SHA1

    896650bbd6962cee4ebe06ae03d95b2a80c4bb56

  • SHA256

    f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932

  • SHA512

    f621514c3bfd06f12e46868e2135cac382a97a31b480b6a76bcf2a44c8dd8619fc79a5d9e3df06faaa44831d8136fbef18f66f97454cb58a8b53fab173b946e9

  • SSDEEP

    12288:6MrEy90tKhfjzGbx8A9eX3CqNmg7ow8EizLEzePJS5aLoey1FY4Js8aRdZ:ay+KFjzAOAIX9Nmioeiz+ehS5xWEafZ

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe
    "C:\Users\Admin\AppData\Local\Temp\f97b5d9bc0d66e3044eced2b5fde780e033e0ba9555bab50773a4aad26d8a932.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1280
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1600
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 572
              5⤵
              • Program crash
              PID:4832
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:1640
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:2868
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 192
                    6⤵
                    • Program crash
                    PID:3548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 572
                  5⤵
                  • Program crash
                  PID:2108
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4588
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:4452
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 552
                  4⤵
                  • Program crash
                  PID:4980
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exe
              2⤵
              • Executes dropped EXE
              PID:2912
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 4784
            1⤵
              PID:2924
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4840 -ip 4840
              1⤵
                PID:1776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2868 -ip 2868
                1⤵
                  PID:1900
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4588 -ip 4588
                  1⤵
                    PID:4080

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                    Filesize

                    226B

                    MD5

                    916851e072fbabc4796d8916c5131092

                    SHA1

                    d48a602229a690c512d5fdaf4c8d77547a88e7a2

                    SHA256

                    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                    SHA512

                    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exe

                    Filesize

                    19KB

                    MD5

                    a2e2e30f5eb57cb3077f72f9723ebd24

                    SHA1

                    20742d5adff3f08f3193a39164122a5016ac65a3

                    SHA256

                    452aaf291cf1001cb353bed758571fb3c2b5ce1c1a11044b43581ebfeedd1998

                    SHA512

                    9a5de96a09bf70d67e78f102ce09a9a15cd36511ac1cd89c3142d083271e8ecded76da9da1e30ec5fcdbd491c6189a952daeb44a80bcd869432f551df40d6260

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2211551.exe

                    Filesize

                    19KB

                    MD5

                    a2e2e30f5eb57cb3077f72f9723ebd24

                    SHA1

                    20742d5adff3f08f3193a39164122a5016ac65a3

                    SHA256

                    452aaf291cf1001cb353bed758571fb3c2b5ce1c1a11044b43581ebfeedd1998

                    SHA512

                    9a5de96a09bf70d67e78f102ce09a9a15cd36511ac1cd89c3142d083271e8ecded76da9da1e30ec5fcdbd491c6189a952daeb44a80bcd869432f551df40d6260

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exe

                    Filesize

                    605KB

                    MD5

                    d18d3f7e37e341e6206497ce5e16070d

                    SHA1

                    8e60bd9ca0f26ee9aff5df47b42f522c9035f9bb

                    SHA256

                    ce95e9a205c0fef32d85d389c7c62fccd69a60fa02896913bf22ea20b74ee19b

                    SHA512

                    94ae2f032535bc34eea4d9a21cef1f98776e6c5df735da225892a7a55cddfc9ac56610843e2128cec65a43cc67a296f7108040e685cb9df405114f0b869fb36a

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2683329.exe

                    Filesize

                    605KB

                    MD5

                    d18d3f7e37e341e6206497ce5e16070d

                    SHA1

                    8e60bd9ca0f26ee9aff5df47b42f522c9035f9bb

                    SHA256

                    ce95e9a205c0fef32d85d389c7c62fccd69a60fa02896913bf22ea20b74ee19b

                    SHA512

                    94ae2f032535bc34eea4d9a21cef1f98776e6c5df735da225892a7a55cddfc9ac56610843e2128cec65a43cc67a296f7108040e685cb9df405114f0b869fb36a

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exe

                    Filesize

                    383KB

                    MD5

                    21e99b5de4bdf0faee3f07cfa02013c2

                    SHA1

                    a1edc793c101d8103e3d559b64008b3a9fe9f8a3

                    SHA256

                    548c5f61414b41b9be0f839ccf799e2d0a7b004afbe859472816093105e822de

                    SHA512

                    502df432ddfa9dfcd38ec006d3602c705474ee4bfb8090f4e77e4ea22b98bc8dffd81da949c7bcc9a5a352ef54774427e12c7e67c23984cbd73417465ab266a5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5813676.exe

                    Filesize

                    383KB

                    MD5

                    21e99b5de4bdf0faee3f07cfa02013c2

                    SHA1

                    a1edc793c101d8103e3d559b64008b3a9fe9f8a3

                    SHA256

                    548c5f61414b41b9be0f839ccf799e2d0a7b004afbe859472816093105e822de

                    SHA512

                    502df432ddfa9dfcd38ec006d3602c705474ee4bfb8090f4e77e4ea22b98bc8dffd81da949c7bcc9a5a352ef54774427e12c7e67c23984cbd73417465ab266a5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exe

                    Filesize

                    345KB

                    MD5

                    73e9dc1d4918d4fe10aeba6f95578003

                    SHA1

                    c762b80aadcbff851f42d2207b7000bf14fde7bc

                    SHA256

                    ed0553998627d8ff4d608eaebb98b4c294545c88143f6dc05e90fa41cbdc6ad3

                    SHA512

                    26ced4b1d9d92f1d8881cdf7037996ce17c531358df632aa9a664691a152d106d5bc31b24d1646bd5770490e5c651b86f9450c5248cafdb2dd4296427b065be7

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4521125.exe

                    Filesize

                    345KB

                    MD5

                    73e9dc1d4918d4fe10aeba6f95578003

                    SHA1

                    c762b80aadcbff851f42d2207b7000bf14fde7bc

                    SHA256

                    ed0553998627d8ff4d608eaebb98b4c294545c88143f6dc05e90fa41cbdc6ad3

                    SHA512

                    26ced4b1d9d92f1d8881cdf7037996ce17c531358df632aa9a664691a152d106d5bc31b24d1646bd5770490e5c651b86f9450c5248cafdb2dd4296427b065be7

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exe

                    Filesize

                    220KB

                    MD5

                    3f7239fd0eec63dbbc6e0e25072052ac

                    SHA1

                    62f12b4920760841a2fa35960537d446a4613cf4

                    SHA256

                    3586e424b4431dbb96377f60a603979205201b6128e189091dd3efaf9a4b1aae

                    SHA512

                    870e678610524d8edcdd20c4c26b18c876700354142f049c4aedc69790d170db156ea91dce46743570e2479edebf6a1ff668bf41efc7989213d7a6b856efea82

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2687109.exe

                    Filesize

                    220KB

                    MD5

                    3f7239fd0eec63dbbc6e0e25072052ac

                    SHA1

                    62f12b4920760841a2fa35960537d446a4613cf4

                    SHA256

                    3586e424b4431dbb96377f60a603979205201b6128e189091dd3efaf9a4b1aae

                    SHA512

                    870e678610524d8edcdd20c4c26b18c876700354142f049c4aedc69790d170db156ea91dce46743570e2479edebf6a1ff668bf41efc7989213d7a6b856efea82

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exe

                    Filesize

                    364KB

                    MD5

                    beacaccc7027eeb103f12a8c5fbb4490

                    SHA1

                    b6424bff86e8220777d0ecb15f1e30088832e15a

                    SHA256

                    49aa5deb0b75b0ebc1c4052ba7a23dc6ebfe2693fb1dfe6e951a1af700318201

                    SHA512

                    c32fa3cfc1309a8090c0a8d0893d9a9dc388aa8904a5e7a540596b2060f00eb956e7d32d5533496ba1e8808d68b457bfc0696b58ad06aae48c2b0ce1a6849386

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4661470.exe

                    Filesize

                    364KB

                    MD5

                    beacaccc7027eeb103f12a8c5fbb4490

                    SHA1

                    b6424bff86e8220777d0ecb15f1e30088832e15a

                    SHA256

                    49aa5deb0b75b0ebc1c4052ba7a23dc6ebfe2693fb1dfe6e951a1af700318201

                    SHA512

                    c32fa3cfc1309a8090c0a8d0893d9a9dc388aa8904a5e7a540596b2060f00eb956e7d32d5533496ba1e8808d68b457bfc0696b58ad06aae48c2b0ce1a6849386

                  • memory/1600-21-0x0000000000400000-0x000000000040A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1600-22-0x0000000074050000-0x0000000074800000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1600-27-0x0000000074050000-0x0000000074800000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1600-36-0x0000000074050000-0x0000000074800000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2868-26-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/2868-29-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/2868-28-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/2868-31-0x0000000000400000-0x000000000042C000-memory.dmp

                    Filesize

                    176KB

                  • memory/4452-40-0x0000000073BB0000-0x0000000074360000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4452-37-0x0000000000400000-0x0000000000430000-memory.dmp

                    Filesize

                    192KB

                  • memory/4452-43-0x000000000B240000-0x000000000B858000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4452-39-0x0000000005860000-0x0000000005866000-memory.dmp

                    Filesize

                    24KB

                  • memory/4452-45-0x000000000ADB0000-0x000000000AEBA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4452-46-0x0000000005890000-0x00000000058A0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4452-47-0x000000000ACF0000-0x000000000AD02000-memory.dmp

                    Filesize

                    72KB

                  • memory/4452-48-0x000000000AD50000-0x000000000AD8C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4452-49-0x000000000AEC0000-0x000000000AF0C000-memory.dmp

                    Filesize

                    304KB

                  • memory/4452-50-0x0000000073BB0000-0x0000000074360000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4452-51-0x0000000005890000-0x00000000058A0000-memory.dmp

                    Filesize

                    64KB