Analysis

  • max time kernel
    160s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 21:14

General

  • Target

    156f81e6d48e16ee1ee49abd80e98a723c860a403f2d1faa60e435ffeaec4abb.exe

  • Size

    1.2MB

  • MD5

    057a0f1fbedc775aacf74f713f7fd426

  • SHA1

    6e58f222f68fe7ef3b2f6bb355e0799137fedced

  • SHA256

    156f81e6d48e16ee1ee49abd80e98a723c860a403f2d1faa60e435ffeaec4abb

  • SHA512

    2970bd0353388e0f3ec6de955fb8c5a2d47f753041e0234730dfc210758d9e46b7691555292b366bff740cfdb7bb4b7ed0d686e1ce519af15b62f066c9f6bc42

  • SSDEEP

    24576:731rUbB61caZU1YezvhG2gT1jYvqfmBEPC/i:b1r+Icags281jWEPC/i

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

77.91.124.82:19071

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\156f81e6d48e16ee1ee49abd80e98a723c860a403f2d1faa60e435ffeaec4abb.exe
    "C:\Users\Admin\AppData\Local\Temp\156f81e6d48e16ee1ee49abd80e98a723c860a403f2d1faa60e435ffeaec4abb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7368988.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7368988.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3624
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5724934.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5724934.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3996
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4029619.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4029619.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3756
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1052984.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1052984.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4296
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2352
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:1632
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:3840
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1868
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885793.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885793.exe
                    6⤵
                    • Executes dropped EXE
                    PID:2088

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7368988.exe

          Filesize

          757KB

          MD5

          87672fedd21766deb026b4897b077a38

          SHA1

          e9e1ef933f9a5cc11e0ee5aa92d638e4097345be

          SHA256

          7b47f051db4324761dd065162565f89c42376bc5266e2d85c3010bbeccf9117d

          SHA512

          dd99a71a41375ee5b355fc5283cb0806a20a4fc85e995fd00cce3aa85fdc9e651d7e3c34aa6d2a1430a7858340d7a04769a2a905a83307443a7ee4044dcbe4b8

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7368988.exe

          Filesize

          757KB

          MD5

          87672fedd21766deb026b4897b077a38

          SHA1

          e9e1ef933f9a5cc11e0ee5aa92d638e4097345be

          SHA256

          7b47f051db4324761dd065162565f89c42376bc5266e2d85c3010bbeccf9117d

          SHA512

          dd99a71a41375ee5b355fc5283cb0806a20a4fc85e995fd00cce3aa85fdc9e651d7e3c34aa6d2a1430a7858340d7a04769a2a905a83307443a7ee4044dcbe4b8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5724934.exe

          Filesize

          487KB

          MD5

          6e79735daab64f6d33c0cea2b1616759

          SHA1

          0e4d00ee2efa86b2e23651997526d58a22b6a259

          SHA256

          a1419ad873c8f7ffa617752d258d264b39f3d99b5c36a92feee30eba1c85514a

          SHA512

          f157d7eb383a861d800603372cf6946fa0ee35044f94920688bbd18fc3759fee62e185958ddcebabc65adb1ea133e360d679c68ca430a7e3cd93359270ab901c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5724934.exe

          Filesize

          487KB

          MD5

          6e79735daab64f6d33c0cea2b1616759

          SHA1

          0e4d00ee2efa86b2e23651997526d58a22b6a259

          SHA256

          a1419ad873c8f7ffa617752d258d264b39f3d99b5c36a92feee30eba1c85514a

          SHA512

          f157d7eb383a861d800603372cf6946fa0ee35044f94920688bbd18fc3759fee62e185958ddcebabc65adb1ea133e360d679c68ca430a7e3cd93359270ab901c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4029619.exe

          Filesize

          321KB

          MD5

          610473f90224fa23d6d3587596396aa9

          SHA1

          bf4182a6f4058b95789dc5394cc1d87a0ce532f8

          SHA256

          52ba4310f3c515237bc92ad8202322a2f8d7ffaae3e604537a27a73e006c8630

          SHA512

          38c9592c556ba6b8a9b449edc2f430b015c2b99d6d42d68496e702860b407a0374698a7b568feb58a262a0a5b9683d1d0b37e8a16b9300d49f780f3cf00fb17a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4029619.exe

          Filesize

          321KB

          MD5

          610473f90224fa23d6d3587596396aa9

          SHA1

          bf4182a6f4058b95789dc5394cc1d87a0ce532f8

          SHA256

          52ba4310f3c515237bc92ad8202322a2f8d7ffaae3e604537a27a73e006c8630

          SHA512

          38c9592c556ba6b8a9b449edc2f430b015c2b99d6d42d68496e702860b407a0374698a7b568feb58a262a0a5b9683d1d0b37e8a16b9300d49f780f3cf00fb17a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1052984.exe

          Filesize

          243KB

          MD5

          2fa3249778b9238045410b448caf578a

          SHA1

          fa3110cadb8723fd54a09078eda813a9175281de

          SHA256

          c0b6a06752d45d47bf7c6737d69a88896fadc34b515d09fd3ae4472848044f96

          SHA512

          98a1de84e17c7bdddbc417371cd78f0555cf44c131f110b196acd78ad583b58c2ae646d089ecc8b841f34a24fbab8d84e99532c66dd67bf42d90b26f967a89c3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1052984.exe

          Filesize

          243KB

          MD5

          2fa3249778b9238045410b448caf578a

          SHA1

          fa3110cadb8723fd54a09078eda813a9175281de

          SHA256

          c0b6a06752d45d47bf7c6737d69a88896fadc34b515d09fd3ae4472848044f96

          SHA512

          98a1de84e17c7bdddbc417371cd78f0555cf44c131f110b196acd78ad583b58c2ae646d089ecc8b841f34a24fbab8d84e99532c66dd67bf42d90b26f967a89c3

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885793.exe

          Filesize

          174KB

          MD5

          89432741e7e15d007ae30553122b044b

          SHA1

          b36242478f05d4b405f96361f41093f32e6d2f80

          SHA256

          42cf1bef4aa04d4ff59669e2f909040bf277d6fc4fd14e9c6568c9e19fe781bf

          SHA512

          e4293982f1d5367001c792bd1c16f4a61d1e6f0cddd33106d83d2c066d4d27328d1bcc9e9bb8071fe43b16d5ceba31cb5a79072b7b009c8313d7dccdbeeb3936

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7885793.exe

          Filesize

          174KB

          MD5

          89432741e7e15d007ae30553122b044b

          SHA1

          b36242478f05d4b405f96361f41093f32e6d2f80

          SHA256

          42cf1bef4aa04d4ff59669e2f909040bf277d6fc4fd14e9c6568c9e19fe781bf

          SHA512

          e4293982f1d5367001c792bd1c16f4a61d1e6f0cddd33106d83d2c066d4d27328d1bcc9e9bb8071fe43b16d5ceba31cb5a79072b7b009c8313d7dccdbeeb3936

        • memory/628-8-0x0000000000400000-0x0000000000509000-memory.dmp

          Filesize

          1.0MB

        • memory/628-3-0x0000000000400000-0x0000000000509000-memory.dmp

          Filesize

          1.0MB

        • memory/628-2-0x0000000000400000-0x0000000000509000-memory.dmp

          Filesize

          1.0MB

        • memory/628-1-0x0000000000400000-0x0000000000509000-memory.dmp

          Filesize

          1.0MB

        • memory/628-0-0x0000000000400000-0x0000000000509000-memory.dmp

          Filesize

          1.0MB

        • memory/1868-33-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1868-44-0x0000000073FD0000-0x0000000074780000-memory.dmp

          Filesize

          7.7MB

        • memory/1868-38-0x0000000073FD0000-0x0000000074780000-memory.dmp

          Filesize

          7.7MB

        • memory/1868-42-0x0000000073FD0000-0x0000000074780000-memory.dmp

          Filesize

          7.7MB

        • memory/2088-40-0x0000000002730000-0x0000000002736000-memory.dmp

          Filesize

          24KB

        • memory/2088-41-0x0000000073FD0000-0x0000000074780000-memory.dmp

          Filesize

          7.7MB

        • memory/2088-39-0x0000000000530000-0x0000000000560000-memory.dmp

          Filesize

          192KB

        • memory/2088-37-0x0000000073FD0000-0x0000000074780000-memory.dmp

          Filesize

          7.7MB

        • memory/2088-45-0x000000000A8B0000-0x000000000AEC8000-memory.dmp

          Filesize

          6.1MB

        • memory/2088-46-0x000000000A3A0000-0x000000000A4AA000-memory.dmp

          Filesize

          1.0MB

        • memory/2088-47-0x0000000004E00000-0x0000000004E10000-memory.dmp

          Filesize

          64KB

        • memory/2088-48-0x000000000A360000-0x000000000A372000-memory.dmp

          Filesize

          72KB

        • memory/2088-49-0x000000000A6F0000-0x000000000A72C000-memory.dmp

          Filesize

          240KB

        • memory/2088-50-0x000000000A730000-0x000000000A77C000-memory.dmp

          Filesize

          304KB

        • memory/2088-51-0x0000000004E00000-0x0000000004E10000-memory.dmp

          Filesize

          64KB