Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 17:31

General

  • Target

    5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe

  • Size

    1.3MB

  • MD5

    f2bd5ad22f1f6df41140df8ae2d87952

  • SHA1

    5ae6b29be07edba61b27a882a77ad784e8fcf430

  • SHA256

    5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122

  • SHA512

    b703b5f0bc813c2ad5542f36f450688d1c9b7c18f62cb2f6005da7e10a872aecfbb3a7bc546cc74cd128108272e43867596216e6a96d577bedaff56fa4dab2ec

  • SSDEEP

    24576:g09VQ6COVYcyZmLT2pHvuGKyKgS0THROl5erNIye15OcQ:g09JLGKy200nete1McQ

Malware Config

Extracted

Family

redline

Botnet

black

C2

77.91.124.82:19071

Attributes
  • auth_value

    c5887216cebc5a219113738140bc3047

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe
    "C:\Users\Admin\AppData\Local\Temp\5b0f370f84fc259d77de80fc3d1449e20c6774b222d70fa1e51adcdbcc7cf122.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4216
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1604
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2964
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2072
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1648
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exe
                  6⤵
                  • Executes dropped EXE
                  PID:4924

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exe

        Filesize

        767KB

        MD5

        90980b85d8807805f0f0f5564dd75a14

        SHA1

        23ba24fedc86a9e98c7267a93a0ed9068d665f58

        SHA256

        e8f0cf5d4cc5ffe75131e9c74313e37114125fbe2087f8e07220e7a2dc8d61a4

        SHA512

        e60859c541f802d3e83b1c30219cbc435fb7fe23bda45ac80d1c0ea0bf99d67fc7a29dc13b4ff54664fa9f2735c6b3d75950cdafa331787cffa13ef8afa356f5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5997426.exe

        Filesize

        767KB

        MD5

        90980b85d8807805f0f0f5564dd75a14

        SHA1

        23ba24fedc86a9e98c7267a93a0ed9068d665f58

        SHA256

        e8f0cf5d4cc5ffe75131e9c74313e37114125fbe2087f8e07220e7a2dc8d61a4

        SHA512

        e60859c541f802d3e83b1c30219cbc435fb7fe23bda45ac80d1c0ea0bf99d67fc7a29dc13b4ff54664fa9f2735c6b3d75950cdafa331787cffa13ef8afa356f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exe

        Filesize

        492KB

        MD5

        48669f8a60be4f400e4b6a54974e71d5

        SHA1

        5d0f115b1605c18826cbc783b89d10da0ea17746

        SHA256

        7cc5b868112164f346327205ce98fcef9fdf0638f6615ef231579252de2ad889

        SHA512

        6efa404f6cf0c92b269975c5714fa8b4ab754f2a385fbd8ae359a0d981d72b733e327cc043bb1355d34ed5c4e4bcdc1ec45f2800f2380d5812f300f4dd28a504

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1766588.exe

        Filesize

        492KB

        MD5

        48669f8a60be4f400e4b6a54974e71d5

        SHA1

        5d0f115b1605c18826cbc783b89d10da0ea17746

        SHA256

        7cc5b868112164f346327205ce98fcef9fdf0638f6615ef231579252de2ad889

        SHA512

        6efa404f6cf0c92b269975c5714fa8b4ab754f2a385fbd8ae359a0d981d72b733e327cc043bb1355d34ed5c4e4bcdc1ec45f2800f2380d5812f300f4dd28a504

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exe

        Filesize

        326KB

        MD5

        1791b0eab27af64304bdc41d9f425908

        SHA1

        ad64dc460b3440d9562d34ae4bf8ac866d0658f4

        SHA256

        12e3503e89c33fc2132506a5479eaed2ee99935941f9df1f70ea6cdc86107a11

        SHA512

        72593b231574cf00c2b4df679008d2e34540fea5d1cd846d0863e66a7d69b6c572dc7cc8323136183cfd55247d6f3ad9fff66e125ad32f618ec99c6fd1dd10e3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8313545.exe

        Filesize

        326KB

        MD5

        1791b0eab27af64304bdc41d9f425908

        SHA1

        ad64dc460b3440d9562d34ae4bf8ac866d0658f4

        SHA256

        12e3503e89c33fc2132506a5479eaed2ee99935941f9df1f70ea6cdc86107a11

        SHA512

        72593b231574cf00c2b4df679008d2e34540fea5d1cd846d0863e66a7d69b6c572dc7cc8323136183cfd55247d6f3ad9fff66e125ad32f618ec99c6fd1dd10e3

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exe

        Filesize

        242KB

        MD5

        d09477c966a58017d908a3d89b0402bd

        SHA1

        77c43dc3e9e0473b64b70f2e90e449c49fbaa1ba

        SHA256

        30f301518192cf1003bf638695aad49853ecc61ebee643df3e70e8bd0292f966

        SHA512

        741b69b617df7438d23bec936b5f29af9c43c35f7f3c6f7c9624e633afaf326151b8827bd50603c8e1d4a921e2a1662c56bfe83d6450a4dac687f8c8e0a5860b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4218416.exe

        Filesize

        242KB

        MD5

        d09477c966a58017d908a3d89b0402bd

        SHA1

        77c43dc3e9e0473b64b70f2e90e449c49fbaa1ba

        SHA256

        30f301518192cf1003bf638695aad49853ecc61ebee643df3e70e8bd0292f966

        SHA512

        741b69b617df7438d23bec936b5f29af9c43c35f7f3c6f7c9624e633afaf326151b8827bd50603c8e1d4a921e2a1662c56bfe83d6450a4dac687f8c8e0a5860b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exe

        Filesize

        174KB

        MD5

        b2116f4207ccd3d2ef8cd8a2b6298c95

        SHA1

        80a84b3f2c0fabf5a78a73f78cc91f482ba9c10a

        SHA256

        058f0ae68a1089f11e63d594acca72560fe10b1f6ea30b8e93ff76f0d2560324

        SHA512

        9fee6c38297bfe5502b4e5a32b6337335320763450f315e46f8816aa44fb6825fd4b5d7c43ab2f878d2190f0e2f24a00809a596393808571abc9939a2b91839e

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1105716.exe

        Filesize

        174KB

        MD5

        b2116f4207ccd3d2ef8cd8a2b6298c95

        SHA1

        80a84b3f2c0fabf5a78a73f78cc91f482ba9c10a

        SHA256

        058f0ae68a1089f11e63d594acca72560fe10b1f6ea30b8e93ff76f0d2560324

        SHA512

        9fee6c38297bfe5502b4e5a32b6337335320763450f315e46f8816aa44fb6825fd4b5d7c43ab2f878d2190f0e2f24a00809a596393808571abc9939a2b91839e

      • memory/1648-32-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1648-50-0x0000000073C50000-0x0000000074400000-memory.dmp

        Filesize

        7.7MB

      • memory/1648-37-0x0000000073C50000-0x0000000074400000-memory.dmp

        Filesize

        7.7MB

      • memory/1648-47-0x0000000073C50000-0x0000000074400000-memory.dmp

        Filesize

        7.7MB

      • memory/3960-40-0x0000000000400000-0x000000000050D000-memory.dmp

        Filesize

        1.1MB

      • memory/3960-2-0x0000000000400000-0x000000000050D000-memory.dmp

        Filesize

        1.1MB

      • memory/3960-1-0x0000000000400000-0x000000000050D000-memory.dmp

        Filesize

        1.1MB

      • memory/3960-0-0x0000000000400000-0x000000000050D000-memory.dmp

        Filesize

        1.1MB

      • memory/3960-3-0x0000000000400000-0x000000000050D000-memory.dmp

        Filesize

        1.1MB

      • memory/4924-41-0x0000000005EC0000-0x00000000064D8000-memory.dmp

        Filesize

        6.1MB

      • memory/4924-39-0x0000000003140000-0x0000000003146000-memory.dmp

        Filesize

        24KB

      • memory/4924-42-0x00000000059B0000-0x0000000005ABA000-memory.dmp

        Filesize

        1.0MB

      • memory/4924-44-0x0000000003230000-0x0000000003240000-memory.dmp

        Filesize

        64KB

      • memory/4924-43-0x00000000058A0000-0x00000000058B2000-memory.dmp

        Filesize

        72KB

      • memory/4924-45-0x0000000005900000-0x000000000593C000-memory.dmp

        Filesize

        240KB

      • memory/4924-46-0x0000000005940000-0x000000000598C000-memory.dmp

        Filesize

        304KB

      • memory/4924-38-0x0000000073C50000-0x0000000074400000-memory.dmp

        Filesize

        7.7MB

      • memory/4924-48-0x0000000073C50000-0x0000000074400000-memory.dmp

        Filesize

        7.7MB

      • memory/4924-36-0x0000000000DC0000-0x0000000000DF0000-memory.dmp

        Filesize

        192KB

      • memory/4924-51-0x0000000003230000-0x0000000003240000-memory.dmp

        Filesize

        64KB