Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 01:46

General

  • Target

    bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe

  • Size

    930KB

  • MD5

    3460167c1d4aa82be63e7d58086d4dc3

  • SHA1

    698a2c76dca22b0434f435fa686b8e16d3c09e07

  • SHA256

    bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa

  • SHA512

    79ab6533342e459d8d2c9602938541fdd9388dfa0fdd74c3d7ce2ac429a3a30da1b9cfc185312614e176ea8ec70540f729b92e651dce570baf0808f3f22441ac

  • SSDEEP

    12288:d6//yfYb5BIQZVte2f8sD5ARNRDDyBPd0mWuh1eueMbQkXwSUqf7ZOqPMeIX9iDF:giuBtZsDM0fuuuw9qZFbANhTil+85

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe
    "C:\Users\Admin\AppData\Local\Temp\bdd0c0769a20ac72ca52ebc4800706d55c5420e91c7150c2ed03c9093f2d7aaa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3772
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:932
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4676
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exe
            5⤵
            • Executes dropped EXE
            PID:4556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exe

    Filesize

    472KB

    MD5

    e1d705a1796454f75a22a8bd66d476d9

    SHA1

    285f4c74aee6d727071539e652608a8127ca1275

    SHA256

    3570daade39c9da56787ee7151b4b0cabc1d1626f29d5c0f0011ad3f076ada0b

    SHA512

    fa1e4c4ab17bde8d7b0a5de2ac9fca84a42a36784abffeaa4791d86c7fbaed7be14181165aead4759498ee81a8e970c716f8348a96effcb75ae210790961604b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4178977.exe

    Filesize

    472KB

    MD5

    e1d705a1796454f75a22a8bd66d476d9

    SHA1

    285f4c74aee6d727071539e652608a8127ca1275

    SHA256

    3570daade39c9da56787ee7151b4b0cabc1d1626f29d5c0f0011ad3f076ada0b

    SHA512

    fa1e4c4ab17bde8d7b0a5de2ac9fca84a42a36784abffeaa4791d86c7fbaed7be14181165aead4759498ee81a8e970c716f8348a96effcb75ae210790961604b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exe

    Filesize

    306KB

    MD5

    b750d904b6ff2158540d535b8a0ed03f

    SHA1

    648e95b90eb1208896f13fa26e72959a7c775065

    SHA256

    3316f2bc38e015fb6d8944c29e09fddcb5f797705418498745bc78ed44d6cd9f

    SHA512

    d0b9a2a48e304507e74bfc83174113e9f54b88d3c0bd54738af3e74801d24c811ed32a539d130f69c90ea6adfe3ad7ef9bbe8f0dc9843ac91e4cda2880b1c1f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7139549.exe

    Filesize

    306KB

    MD5

    b750d904b6ff2158540d535b8a0ed03f

    SHA1

    648e95b90eb1208896f13fa26e72959a7c775065

    SHA256

    3316f2bc38e015fb6d8944c29e09fddcb5f797705418498745bc78ed44d6cd9f

    SHA512

    d0b9a2a48e304507e74bfc83174113e9f54b88d3c0bd54738af3e74801d24c811ed32a539d130f69c90ea6adfe3ad7ef9bbe8f0dc9843ac91e4cda2880b1c1f7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exe

    Filesize

    213KB

    MD5

    702c7568161266ab21e42901c92a6d3c

    SHA1

    287e205d3bff2942f7daf5c0ce8d0cb1c9fdafb6

    SHA256

    0e20beced9cfe7c2390ad1df6a0ba123b8221e234b09bcc95d4115c943e48380

    SHA512

    66d9f48482ecdb643dd6e2e7d78083046b58f390db77120142d2e9cb6b51b2f16c9f7b8b3e108cf3dee27cd691514e3f12e422971bb5b105a1b14bc56ad89715

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7790623.exe

    Filesize

    213KB

    MD5

    702c7568161266ab21e42901c92a6d3c

    SHA1

    287e205d3bff2942f7daf5c0ce8d0cb1c9fdafb6

    SHA256

    0e20beced9cfe7c2390ad1df6a0ba123b8221e234b09bcc95d4115c943e48380

    SHA512

    66d9f48482ecdb643dd6e2e7d78083046b58f390db77120142d2e9cb6b51b2f16c9f7b8b3e108cf3dee27cd691514e3f12e422971bb5b105a1b14bc56ad89715

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exe

    Filesize

    175KB

    MD5

    9cb2a7b776a7844ae8e0f31370e51a81

    SHA1

    4c9e92ee1308de714cccfb548d3ed58cf4eb81d2

    SHA256

    5b20722fe46207296f73aed10bd1657a52bf939abb1c234c523bc8cb0a14a78a

    SHA512

    d544a899957e7ee6fd1d8148fcfa89eab3f4a512b80826aa92c3ccd9cad5443fc352ea0dde54abbf1ea49238f3ad8cb0f74885bd2b426fd6f93bc01f670b0670

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9921014.exe

    Filesize

    175KB

    MD5

    9cb2a7b776a7844ae8e0f31370e51a81

    SHA1

    4c9e92ee1308de714cccfb548d3ed58cf4eb81d2

    SHA256

    5b20722fe46207296f73aed10bd1657a52bf939abb1c234c523bc8cb0a14a78a

    SHA512

    d544a899957e7ee6fd1d8148fcfa89eab3f4a512b80826aa92c3ccd9cad5443fc352ea0dde54abbf1ea49238f3ad8cb0f74885bd2b426fd6f93bc01f670b0670

  • memory/3004-3-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3004-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3004-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3004-0-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3004-39-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/4556-37-0x0000000004D10000-0x0000000004D4C000-memory.dmp

    Filesize

    240KB

  • memory/4556-36-0x0000000004770000-0x0000000004782000-memory.dmp

    Filesize

    72KB

  • memory/4556-31-0x0000000000B60000-0x0000000000B66000-memory.dmp

    Filesize

    24KB

  • memory/4556-32-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB

  • memory/4556-33-0x00000000053E0000-0x00000000059F8000-memory.dmp

    Filesize

    6.1MB

  • memory/4556-34-0x0000000004ED0000-0x0000000004FDA000-memory.dmp

    Filesize

    1.0MB

  • memory/4556-35-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4556-44-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4556-29-0x00000000001F0000-0x0000000000220000-memory.dmp

    Filesize

    192KB

  • memory/4556-38-0x0000000004D50000-0x0000000004D9C000-memory.dmp

    Filesize

    304KB

  • memory/4556-41-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB

  • memory/4676-40-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB

  • memory/4676-25-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4676-43-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB

  • memory/4676-30-0x0000000073CA0000-0x0000000074450000-memory.dmp

    Filesize

    7.7MB