Analysis

  • max time kernel
    139s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 11:59

General

  • Target

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe

  • Size

    2.6MB

  • MD5

    417d0554c7f79458682763044a771084

  • SHA1

    31386b623d1c36613dcd48bdc2ab5a1edf19edf4

  • SHA256

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

  • SHA512

    07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b

  • SSDEEP

    49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
    "C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:4516
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2488
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3424
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4828
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2240
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 152
                  7⤵
                  • Program crash
                  PID:4816
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exe
                6⤵
                • Executes dropped EXE
                PID:1756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 272
        2⤵
        • Program crash
        PID:4840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4580 -ip 4580
      1⤵
        PID:1808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4828 -ip 4828
        1⤵
          PID:3236

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

          Filesize

          1.0MB

          MD5

          8a68e904f64205e2ec90e43db3a7a1e8

          SHA1

          9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

          SHA256

          01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

          SHA512

          f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

          Filesize

          1.0MB

          MD5

          8a68e904f64205e2ec90e43db3a7a1e8

          SHA1

          9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

          SHA256

          01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

          SHA512

          f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

          Filesize

          651KB

          MD5

          cd7d55036ef681f7602230d5979b2879

          SHA1

          f0f46779d35477fe49115f2ef026cfcf88aa6a77

          SHA256

          cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

          SHA512

          bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

          Filesize

          651KB

          MD5

          cd7d55036ef681f7602230d5979b2879

          SHA1

          f0f46779d35477fe49115f2ef026cfcf88aa6a77

          SHA256

          cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

          SHA512

          bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

          Filesize

          465KB

          MD5

          8c768f79fb1012d8ec1474d97960b8cd

          SHA1

          b6427a45aec52e24a1efd5130ddba5e2ae17511d

          SHA256

          66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

          SHA512

          56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

          Filesize

          465KB

          MD5

          8c768f79fb1012d8ec1474d97960b8cd

          SHA1

          b6427a45aec52e24a1efd5130ddba5e2ae17511d

          SHA256

          66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

          SHA512

          56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

          Filesize

          899KB

          MD5

          89c946869f131eb7d37e928860bfeff8

          SHA1

          90237a4510913c03d142c917988dfa46081661d2

          SHA256

          d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

          SHA512

          5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

          Filesize

          899KB

          MD5

          89c946869f131eb7d37e928860bfeff8

          SHA1

          90237a4510913c03d142c917988dfa46081661d2

          SHA256

          d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

          SHA512

          5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exe

          Filesize

          174KB

          MD5

          d5decef6cd97c2bbb09f35e42f06bb07

          SHA1

          07efb6a6144ba23d021c950474ce5a85789bf747

          SHA256

          710048306084b0505e6bf8a4819fd8154d803de45fd8813eabc27af06c2ac17a

          SHA512

          1ff5911d22560ded709a719b8208f0ac609ddf7dd7f148a8d7e21c0a7962d861afd94d306bb402548d15eeccfd4dbcf5137c35c4e318ef19236b794b50538f6b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6840198.exe

          Filesize

          174KB

          MD5

          d5decef6cd97c2bbb09f35e42f06bb07

          SHA1

          07efb6a6144ba23d021c950474ce5a85789bf747

          SHA256

          710048306084b0505e6bf8a4819fd8154d803de45fd8813eabc27af06c2ac17a

          SHA512

          1ff5911d22560ded709a719b8208f0ac609ddf7dd7f148a8d7e21c0a7962d861afd94d306bb402548d15eeccfd4dbcf5137c35c4e318ef19236b794b50538f6b

        • memory/1756-46-0x000000000A250000-0x000000000A29C000-memory.dmp

          Filesize

          304KB

        • memory/1756-44-0x000000000A1B0000-0x000000000A1C2000-memory.dmp

          Filesize

          72KB

        • memory/1756-39-0x00000000025F0000-0x00000000025F6000-memory.dmp

          Filesize

          24KB

        • memory/1756-40-0x000000000A7B0000-0x000000000ADC8000-memory.dmp

          Filesize

          6.1MB

        • memory/1756-47-0x0000000072F10000-0x00000000736C0000-memory.dmp

          Filesize

          7.7MB

        • memory/1756-36-0x0000000072F10000-0x00000000736C0000-memory.dmp

          Filesize

          7.7MB

        • memory/1756-45-0x000000000A210000-0x000000000A24C000-memory.dmp

          Filesize

          240KB

        • memory/1756-43-0x0000000004D00000-0x0000000004D10000-memory.dmp

          Filesize

          64KB

        • memory/1756-51-0x0000000004D00000-0x0000000004D10000-memory.dmp

          Filesize

          64KB

        • memory/1756-42-0x000000000A2A0000-0x000000000A3AA000-memory.dmp

          Filesize

          1.0MB

        • memory/1756-38-0x00000000002C0000-0x00000000002F0000-memory.dmp

          Filesize

          192KB

        • memory/2240-48-0x0000000072F10000-0x00000000736C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2240-37-0x0000000072F10000-0x00000000736C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2240-50-0x0000000072F10000-0x00000000736C0000-memory.dmp

          Filesize

          7.7MB

        • memory/2240-32-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/3736-41-0x0000000000400000-0x0000000000580000-memory.dmp

          Filesize

          1.5MB

        • memory/3736-2-0x0000000000400000-0x0000000000580000-memory.dmp

          Filesize

          1.5MB

        • memory/3736-3-0x0000000000400000-0x0000000000580000-memory.dmp

          Filesize

          1.5MB

        • memory/3736-0-0x0000000000400000-0x0000000000580000-memory.dmp

          Filesize

          1.5MB

        • memory/3736-1-0x0000000000400000-0x0000000000580000-memory.dmp

          Filesize

          1.5MB