Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:50

General

  • Target

    dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe

  • Size

    1.2MB

  • MD5

    f215a407d62bede3ecfafc09413bb626

  • SHA1

    a274120159dbea3514d321c0286b85c52afdc4d7

  • SHA256

    dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8

  • SHA512

    870e80132d2386972f74cac4dfc307594e8f8db5ae591164a04e98245bae64cdcf1267067f9406cfb3ec3892cb82ae9fac4bb204531abbc7d5d46e20a0e1da58

  • SSDEEP

    24576:t/84HRkUaFT/oghGcA6v1VYIDcS6lSYtjWAiOlSJsKAZZ9t+cThWBtG:F84HubpA6v11IPoYtFiASJA91hWBtG

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe
    "C:\Users\Admin\AppData\Local\Temp\dc0d1ffe97e22b832e373ccf5a3cef04a17a7d1da6618050f32cb3f5ce3703c8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3988
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4620
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4236
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4584
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4948
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exe
                6⤵
                • Executes dropped EXE
                PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exe

      Filesize

      745KB

      MD5

      8a9c486034e3fe9bdd60ebfec340690d

      SHA1

      ad1368129dd9bd7f01ee2ab0fa6ca5486c40b6cd

      SHA256

      37191dd960f97dc301ebd6d44e38aa28c756d246c5a1a63650e472b8ca14fc48

      SHA512

      a44379a8515899e7b32236279b73134a93699500064f30ee05deccd14284f82683ccae936cb4e2504fcb17340b0e9196f42e6ffed87afb8e9d6af905b67947e7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0146992.exe

      Filesize

      745KB

      MD5

      8a9c486034e3fe9bdd60ebfec340690d

      SHA1

      ad1368129dd9bd7f01ee2ab0fa6ca5486c40b6cd

      SHA256

      37191dd960f97dc301ebd6d44e38aa28c756d246c5a1a63650e472b8ca14fc48

      SHA512

      a44379a8515899e7b32236279b73134a93699500064f30ee05deccd14284f82683ccae936cb4e2504fcb17340b0e9196f42e6ffed87afb8e9d6af905b67947e7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exe

      Filesize

      480KB

      MD5

      fcfc8f71a242817e694d29429c123375

      SHA1

      8d7a781962986c7db6f35f8123b19c1d16663fbf

      SHA256

      615c04a9d72d8c8bdc4665f5e0964be25fc8d8fe37ae5a27cff6109acaba7c4f

      SHA512

      3ec70e3c1bdce7ef9c835aa88996d79ac9a4d21b2fc85ebf2c2f0218b609bc3249865ce00f2556a7c35468953aa0123abeabbd66179133615b08ab4708a037ca

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9141899.exe

      Filesize

      480KB

      MD5

      fcfc8f71a242817e694d29429c123375

      SHA1

      8d7a781962986c7db6f35f8123b19c1d16663fbf

      SHA256

      615c04a9d72d8c8bdc4665f5e0964be25fc8d8fe37ae5a27cff6109acaba7c4f

      SHA512

      3ec70e3c1bdce7ef9c835aa88996d79ac9a4d21b2fc85ebf2c2f0218b609bc3249865ce00f2556a7c35468953aa0123abeabbd66179133615b08ab4708a037ca

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exe

      Filesize

      314KB

      MD5

      89ea3d05834101380750597dbf3b4515

      SHA1

      418483968f60006e46bf76facec4637d2ecf7688

      SHA256

      312db8f1cdd4c7a3757563d838a7dd230f196d9a34c2ec87cbb56b0738e0155b

      SHA512

      0d7cb48bf1d5e5714b6ecd4ab481c27f6e917db436a98a6aa83291795f7562f02f261ec3a94468f68b3970ccdae8ee4601fd80492e62875a6ed566c8ea190709

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3876609.exe

      Filesize

      314KB

      MD5

      89ea3d05834101380750597dbf3b4515

      SHA1

      418483968f60006e46bf76facec4637d2ecf7688

      SHA256

      312db8f1cdd4c7a3757563d838a7dd230f196d9a34c2ec87cbb56b0738e0155b

      SHA512

      0d7cb48bf1d5e5714b6ecd4ab481c27f6e917db436a98a6aa83291795f7562f02f261ec3a94468f68b3970ccdae8ee4601fd80492e62875a6ed566c8ea190709

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exe

      Filesize

      229KB

      MD5

      5fc2ceaca915afa951492d02bdf84645

      SHA1

      af0b656b869fb1f77fe961155ae038c1ef889cd2

      SHA256

      d0919e54965cfd3722b29786dee3dc62b26323064ffa2fc4b41e6c77a347c2f5

      SHA512

      c836ef2aae3baf9c6fa1ea3c7a389bad2ba547a227b0f22e931d57080e53557a92be444320472aa2970b2fe0afd2e4a0750c1491ca18d4670584148aa9672df1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1881221.exe

      Filesize

      229KB

      MD5

      5fc2ceaca915afa951492d02bdf84645

      SHA1

      af0b656b869fb1f77fe961155ae038c1ef889cd2

      SHA256

      d0919e54965cfd3722b29786dee3dc62b26323064ffa2fc4b41e6c77a347c2f5

      SHA512

      c836ef2aae3baf9c6fa1ea3c7a389bad2ba547a227b0f22e931d57080e53557a92be444320472aa2970b2fe0afd2e4a0750c1491ca18d4670584148aa9672df1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exe

      Filesize

      174KB

      MD5

      d9e6250d5c586ad6f535c996d9f83b14

      SHA1

      eb77e9cfb8f7b51953c9e838dbecd276add6885f

      SHA256

      bb4e960ea9f7541f953b483cae09cceba14e603df04eb484351fcc286c7fb1e3

      SHA512

      d2461b92cf1ed6e1dd22cb280963b2640ce6837e9caf252b9e5cebed3bd64614042093eda1fbae6b1d0e652c3bbfbc188e03bc98334f1f30ed8ded17cc65f3a9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3996221.exe

      Filesize

      174KB

      MD5

      d9e6250d5c586ad6f535c996d9f83b14

      SHA1

      eb77e9cfb8f7b51953c9e838dbecd276add6885f

      SHA256

      bb4e960ea9f7541f953b483cae09cceba14e603df04eb484351fcc286c7fb1e3

      SHA512

      d2461b92cf1ed6e1dd22cb280963b2640ce6837e9caf252b9e5cebed3bd64614042093eda1fbae6b1d0e652c3bbfbc188e03bc98334f1f30ed8ded17cc65f3a9

    • memory/2732-41-0x00000000055E0000-0x00000000056EA000-memory.dmp

      Filesize

      1.0MB

    • memory/2732-44-0x0000000005580000-0x00000000055BC000-memory.dmp

      Filesize

      240KB

    • memory/2732-51-0x0000000005490000-0x00000000054A0000-memory.dmp

      Filesize

      64KB

    • memory/2732-47-0x0000000073C30000-0x00000000743E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2732-45-0x00000000056F0000-0x000000000573C000-memory.dmp

      Filesize

      304KB

    • memory/2732-36-0x0000000000B90000-0x0000000000BC0000-memory.dmp

      Filesize

      192KB

    • memory/2732-37-0x0000000073C30000-0x00000000743E0000-memory.dmp

      Filesize

      7.7MB

    • memory/2732-38-0x0000000002D30000-0x0000000002D36000-memory.dmp

      Filesize

      24KB

    • memory/2732-40-0x0000000005AC0000-0x00000000060D8000-memory.dmp

      Filesize

      6.1MB

    • memory/2732-42-0x0000000005490000-0x00000000054A0000-memory.dmp

      Filesize

      64KB

    • memory/2732-43-0x0000000005520000-0x0000000005532000-memory.dmp

      Filesize

      72KB

    • memory/4920-2-0x0000000000400000-0x0000000000505000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-3-0x0000000000400000-0x0000000000505000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-0-0x0000000000400000-0x0000000000505000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-46-0x0000000000400000-0x0000000000505000-memory.dmp

      Filesize

      1.0MB

    • memory/4920-1-0x0000000000400000-0x0000000000505000-memory.dmp

      Filesize

      1.0MB

    • memory/4948-39-0x0000000073C30000-0x00000000743E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4948-48-0x0000000073C30000-0x00000000743E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4948-50-0x0000000073C30000-0x00000000743E0000-memory.dmp

      Filesize

      7.7MB

    • memory/4948-32-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB