Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 10:57

General

  • Target

    f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe

  • Size

    1014KB

  • MD5

    e793f4d5680695ad632ef1414bbaefbe

  • SHA1

    83dbfdf3a82c810eda811e7107a656ffff138eae

  • SHA256

    f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f

  • SHA512

    8c6bb9ce3c4dec52cd9d46ef51f63f2c5a5ce3d11649b01b967c05c98056c1ab05a05348dc988a8f64bd8731dc6ec0565e353421ecc96b6bc427b79e963858ed

  • SSDEEP

    24576:xWrkfGnbsNujqFLYdDMaZYyMKI7GT0YMOBuZK0Hvsxky8ZHJwgYg:ukubsNujCYtKxSn1uZKKIOsg

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe
    "C:\Users\Admin\AppData\Local\Temp\f08136343f1dc930853ae6506b7b220bc97699314cc215cfbbcc3e85936db64f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:4912
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:5064
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exe
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4016
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4396
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1752
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exe
              5⤵
              • Executes dropped EXE
              PID:708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exe

      Filesize

      492KB

      MD5

      76c2de60bcabc7238be358e32978bd91

      SHA1

      532c252a86644f961d62850ba7be99f89ef3a1ae

      SHA256

      207bd2f85a0071eb0cec560c2ff10d0b7a185092036397b9f60aa012007c7134

      SHA512

      2e88061a64c796398c77e5c5709366d546168d94587e6601c1a78f0cd9a71d3b3f451a394ace3184dcd26e89a90b4fcad8b10ee688e9672468e9b7b86375e8a5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4331605.exe

      Filesize

      492KB

      MD5

      76c2de60bcabc7238be358e32978bd91

      SHA1

      532c252a86644f961d62850ba7be99f89ef3a1ae

      SHA256

      207bd2f85a0071eb0cec560c2ff10d0b7a185092036397b9f60aa012007c7134

      SHA512

      2e88061a64c796398c77e5c5709366d546168d94587e6601c1a78f0cd9a71d3b3f451a394ace3184dcd26e89a90b4fcad8b10ee688e9672468e9b7b86375e8a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exe

      Filesize

      326KB

      MD5

      499cebd63eed8be77f4c45c3c47fdc0b

      SHA1

      c17c2ddc12a9fc32629ba00e5e54112e6d9c79dc

      SHA256

      9354f0098fa532b5dc4607f34cd637217b3e406c5d2bc6671a46c822b036df53

      SHA512

      e26d6de1bfd8e0952eadd57a49adf7b7fa2ddb467967e8bcdcd179ea09cccf83ca49c15d8dbd9442aa9fdb2d65792c7b89c4d79329ad39c2fbcebdbe9c9cd9b3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6123848.exe

      Filesize

      326KB

      MD5

      499cebd63eed8be77f4c45c3c47fdc0b

      SHA1

      c17c2ddc12a9fc32629ba00e5e54112e6d9c79dc

      SHA256

      9354f0098fa532b5dc4607f34cd637217b3e406c5d2bc6671a46c822b036df53

      SHA512

      e26d6de1bfd8e0952eadd57a49adf7b7fa2ddb467967e8bcdcd179ea09cccf83ca49c15d8dbd9442aa9fdb2d65792c7b89c4d79329ad39c2fbcebdbe9c9cd9b3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exe

      Filesize

      257KB

      MD5

      5edcce7cdb4a7c05202f9583536899fd

      SHA1

      fa9e33ac62524397230f9d3785843e4fbbfc7bf6

      SHA256

      de9efe7ce1e75a998f0503373e8fc9b7ffd4d06d62175e7f790cf6da1825dafa

      SHA512

      8cc91653f53f319efb722bd892306229accec2aa6f5c8238d85f44999bf3ab4abfecfbf6dc2cc9b640b70ce1e02c183ebe2329a5d61ff7621352d6b0fdb0e096

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9408456.exe

      Filesize

      257KB

      MD5

      5edcce7cdb4a7c05202f9583536899fd

      SHA1

      fa9e33ac62524397230f9d3785843e4fbbfc7bf6

      SHA256

      de9efe7ce1e75a998f0503373e8fc9b7ffd4d06d62175e7f790cf6da1825dafa

      SHA512

      8cc91653f53f319efb722bd892306229accec2aa6f5c8238d85f44999bf3ab4abfecfbf6dc2cc9b640b70ce1e02c183ebe2329a5d61ff7621352d6b0fdb0e096

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exe

      Filesize

      174KB

      MD5

      6a8be65b4cb171cf4fee6e1726d1a76e

      SHA1

      71bb6982bc9eb00e9edb549fe07998195b98f0cb

      SHA256

      bfc6ca76c14a107407de979141630f2fa9a4ccabea53624383ba3dc1a7d543ad

      SHA512

      eeb3e03c0a9a5ecda04f845058c3a9a608f49f5b570903691017192b91edb51be92ea88a5c6f55d64345b1f56f2583deccd3e931eb1352e2127a3f9282cb370a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7556869.exe

      Filesize

      174KB

      MD5

      6a8be65b4cb171cf4fee6e1726d1a76e

      SHA1

      71bb6982bc9eb00e9edb549fe07998195b98f0cb

      SHA256

      bfc6ca76c14a107407de979141630f2fa9a4ccabea53624383ba3dc1a7d543ad

      SHA512

      eeb3e03c0a9a5ecda04f845058c3a9a608f49f5b570903691017192b91edb51be92ea88a5c6f55d64345b1f56f2583deccd3e931eb1352e2127a3f9282cb370a

    • memory/708-29-0x0000000000C80000-0x0000000000CB0000-memory.dmp

      Filesize

      192KB

    • memory/708-37-0x00000000057B0000-0x00000000057EC000-memory.dmp

      Filesize

      240KB

    • memory/708-42-0x00000000057A0000-0x00000000057B0000-memory.dmp

      Filesize

      64KB

    • memory/708-41-0x0000000074210000-0x00000000749C0000-memory.dmp

      Filesize

      7.7MB

    • memory/708-38-0x00000000057F0000-0x000000000583C000-memory.dmp

      Filesize

      304KB

    • memory/708-35-0x00000000057A0000-0x00000000057B0000-memory.dmp

      Filesize

      64KB

    • memory/708-36-0x0000000005740000-0x0000000005752000-memory.dmp

      Filesize

      72KB

    • memory/708-31-0x0000000074210000-0x00000000749C0000-memory.dmp

      Filesize

      7.7MB

    • memory/708-32-0x0000000002F20000-0x0000000002F26000-memory.dmp

      Filesize

      24KB

    • memory/708-33-0x0000000005DD0000-0x00000000063E8000-memory.dmp

      Filesize

      6.1MB

    • memory/708-34-0x00000000058C0000-0x00000000059CA000-memory.dmp

      Filesize

      1.0MB

    • memory/1752-30-0x0000000074210000-0x00000000749C0000-memory.dmp

      Filesize

      7.7MB

    • memory/1752-40-0x0000000074210000-0x00000000749C0000-memory.dmp

      Filesize

      7.7MB

    • memory/1752-25-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1752-44-0x0000000074210000-0x00000000749C0000-memory.dmp

      Filesize

      7.7MB

    • memory/3564-0-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/3564-3-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/3564-1-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/3564-39-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/3564-2-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB