Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 14:36

General

  • Target

    e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe

  • Size

    1.3MB

  • MD5

    da1333144d8b061a48cb0401f52f2d3e

  • SHA1

    cedec8d21fdf51a8f95eee01f41fae764f5711f5

  • SHA256

    e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930

  • SHA512

    65d679934febb8fccceedfb5436fa535482f8e1c43adf1b712481deed328a628fac1188ec8ff743996e3e9099f0bde8b7dfa1721e4cdc55b042c6337ed9d07fd

  • SSDEEP

    24576:3Ld650qMgM/k/Q1ZaKjeeNfmdPvnQD9hUUpeN2RK9kvI7AfCSrHqMdxQs:s50q/M/k/oZaKjeeA9vQD7Dq2RJ2AfCY

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe
    "C:\Users\Admin\AppData\Local\Temp\e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3924
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:884
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:1344
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4436
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4760
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:3852
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4084
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1768
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2620
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe
                    6⤵
                    • Executes dropped EXE
                    PID:1068

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe

                Filesize

                777KB

                MD5

                01f7bc13f5bf98743a4ac244cfb26624

                SHA1

                71c07cc8abd45a4023caaef4815cafd1fadad48d

                SHA256

                57cc193a0e2c8ba945044078c2d6466ec6b02d699c1a56febc82b434cecbebf9

                SHA512

                01e36caf5781973052968a3af8db846291e584476dd1376b971437c0319e9cfe8ee7e0a5223f1f6082f7040524811b08944ea0bcc0cf3181e126f605a045ea2f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe

                Filesize

                777KB

                MD5

                01f7bc13f5bf98743a4ac244cfb26624

                SHA1

                71c07cc8abd45a4023caaef4815cafd1fadad48d

                SHA256

                57cc193a0e2c8ba945044078c2d6466ec6b02d699c1a56febc82b434cecbebf9

                SHA512

                01e36caf5781973052968a3af8db846291e584476dd1376b971437c0319e9cfe8ee7e0a5223f1f6082f7040524811b08944ea0bcc0cf3181e126f605a045ea2f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe

                Filesize

                506KB

                MD5

                479a912291b87a4b075447e395e24151

                SHA1

                910bff7b031c30edea77eef3468f8288a1746ca9

                SHA256

                1556232e47857f9971b8232151e21c19f0477c097aa6b4bf4ba72f64e0ffd3e8

                SHA512

                0ddb9ef30ae6831c9783e7ff0e1286c22c4723769836799292f94a76aa813056b8483edc90f07d0cc19a22d7784c56f622fa596d0b35cbc93438e3a372707ca2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe

                Filesize

                506KB

                MD5

                479a912291b87a4b075447e395e24151

                SHA1

                910bff7b031c30edea77eef3468f8288a1746ca9

                SHA256

                1556232e47857f9971b8232151e21c19f0477c097aa6b4bf4ba72f64e0ffd3e8

                SHA512

                0ddb9ef30ae6831c9783e7ff0e1286c22c4723769836799292f94a76aa813056b8483edc90f07d0cc19a22d7784c56f622fa596d0b35cbc93438e3a372707ca2

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe

                Filesize

                321KB

                MD5

                692987fa95ff799a4b41215ee12c63c0

                SHA1

                7330e53387046362ea8e673a4ff884c26bcb1da4

                SHA256

                5605028707cb5b50d1bad8475a951d75e1860cd696b546479b794d065ff8e742

                SHA512

                a651ab1b1fd5081185c8da4a132663c069077e0127dd68e8db575d09d282e00ea19cd1de98d2ad761c752a4ca37d7c7639744aa626a37be23729e02290e5131b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe

                Filesize

                321KB

                MD5

                692987fa95ff799a4b41215ee12c63c0

                SHA1

                7330e53387046362ea8e673a4ff884c26bcb1da4

                SHA256

                5605028707cb5b50d1bad8475a951d75e1860cd696b546479b794d065ff8e742

                SHA512

                a651ab1b1fd5081185c8da4a132663c069077e0127dd68e8db575d09d282e00ea19cd1de98d2ad761c752a4ca37d7c7639744aa626a37be23729e02290e5131b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe

                Filesize

                236KB

                MD5

                08c4b9d37d6e589942205e077b026052

                SHA1

                20f37b62395dbae53c2cccf2b3541e545c52a41f

                SHA256

                3e9cce257ffb96907a3e4bae0659148ceb219ee7722aae4d77b32a1a780b5353

                SHA512

                c5fbd4fc7a1ed9ee3aa280b84f459a2f848af3b706a68730c5e9dc772d974a2410ebdf27b461679e7f1a1e9b783c44369d61917c4be646a0476ee33652523465

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe

                Filesize

                236KB

                MD5

                08c4b9d37d6e589942205e077b026052

                SHA1

                20f37b62395dbae53c2cccf2b3541e545c52a41f

                SHA256

                3e9cce257ffb96907a3e4bae0659148ceb219ee7722aae4d77b32a1a780b5353

                SHA512

                c5fbd4fc7a1ed9ee3aa280b84f459a2f848af3b706a68730c5e9dc772d974a2410ebdf27b461679e7f1a1e9b783c44369d61917c4be646a0476ee33652523465

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe

                Filesize

                174KB

                MD5

                3553e2fecd9db0114f98bd28aba3644f

                SHA1

                46a98ab55c8c56b85671b7755fbafae1135c2894

                SHA256

                9f7383e9dce1775de7f4797b7be31c33477d4eaf600cf3b5105ec2c5b9947900

                SHA512

                74a37a71521084a3d566cb5b89b45f0c37ae081a3d1e74efc933403d853da723d31e667f300703180c9d2d732aacc4d63ac0be003841854665e91b42f863caef

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe

                Filesize

                174KB

                MD5

                3553e2fecd9db0114f98bd28aba3644f

                SHA1

                46a98ab55c8c56b85671b7755fbafae1135c2894

                SHA256

                9f7383e9dce1775de7f4797b7be31c33477d4eaf600cf3b5105ec2c5b9947900

                SHA512

                74a37a71521084a3d566cb5b89b45f0c37ae081a3d1e74efc933403d853da723d31e667f300703180c9d2d732aacc4d63ac0be003841854665e91b42f863caef

              • memory/1068-41-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

                Filesize

                1.0MB

              • memory/1068-44-0x0000000004DF0000-0x0000000004E2C000-memory.dmp

                Filesize

                240KB

              • memory/1068-51-0x0000000004C80000-0x0000000004C90000-memory.dmp

                Filesize

                64KB

              • memory/1068-47-0x0000000074150000-0x0000000074900000-memory.dmp

                Filesize

                7.7MB

              • memory/1068-45-0x0000000004E30000-0x0000000004E7C000-memory.dmp

                Filesize

                304KB

              • memory/1068-36-0x00000000002B0000-0x00000000002E0000-memory.dmp

                Filesize

                192KB

              • memory/1068-37-0x0000000074150000-0x0000000074900000-memory.dmp

                Filesize

                7.7MB

              • memory/1068-38-0x0000000000930000-0x0000000000936000-memory.dmp

                Filesize

                24KB

              • memory/1068-40-0x00000000053B0000-0x00000000059C8000-memory.dmp

                Filesize

                6.1MB

              • memory/1068-43-0x0000000004C80000-0x0000000004C90000-memory.dmp

                Filesize

                64KB

              • memory/1068-42-0x0000000004D90000-0x0000000004DA2000-memory.dmp

                Filesize

                72KB

              • memory/2620-39-0x0000000074150000-0x0000000074900000-memory.dmp

                Filesize

                7.7MB

              • memory/2620-48-0x0000000074150000-0x0000000074900000-memory.dmp

                Filesize

                7.7MB

              • memory/2620-50-0x0000000074150000-0x0000000074900000-memory.dmp

                Filesize

                7.7MB

              • memory/2620-32-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4436-2-0x0000000000400000-0x0000000000513000-memory.dmp

                Filesize

                1.1MB

              • memory/4436-3-0x0000000000400000-0x0000000000513000-memory.dmp

                Filesize

                1.1MB

              • memory/4436-0-0x0000000000400000-0x0000000000513000-memory.dmp

                Filesize

                1.1MB

              • memory/4436-46-0x0000000000400000-0x0000000000513000-memory.dmp

                Filesize

                1.1MB

              • memory/4436-1-0x0000000000400000-0x0000000000513000-memory.dmp

                Filesize

                1.1MB