Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2024 21:34

General

  • Target

    794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe

  • Size

    666KB

  • MD5

    86d80efcf39ac0644815a6a7793b4e07

  • SHA1

    abf36fbcb4de003a0c4acb063a3752ebfd849298

  • SHA256

    794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0

  • SHA512

    b223b880c06f5ea76c80833d83d57b57b71e4c78b77c8641162fd5c12805bcc406ce7ab5929bb216de7da9813d63f422050912d91eae32afce1702a17502ee8b

  • SSDEEP

    12288:JMrNy9050p+mG2mpcnprJu/v78tWYb0fqH7IIDF0sgKkdyDBZ:EyCg+jcpVAv78IYgCH7IMh3Qyn

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe
    "C:\Users\Admin\AppData\Local\Temp\794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plsp92Cu08.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plsp92Cu08.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cato69Uw10.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cato69Uw10.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plsp92Cu08.exe

    Filesize

    391KB

    MD5

    b4944bc275ae14c46b017da4121ca43b

    SHA1

    f791c3ac27e502e2aa6b4c6b0abbd116ac96c6f3

    SHA256

    62a2b9cf24ec16917202c5938495357bdc6b4861a77520225388ee25370d1ce8

    SHA512

    b82bc47d7fa503ba545b74796695edb7db82535c181b19b33242cb67fb87e79bedb79da6b64cbb43978290879e9923b7f010ccf78e4027847166c0d1cdddc5f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe

    Filesize

    11KB

    MD5

    3b416a1b882466bd99311dbab98fb42d

    SHA1

    286eaf9931732e12f2ba571d44e4bb20e20d0022

    SHA256

    9810f5b05ccbee3d0d4dc6368bbafdb3fd80eb506f5f443969dd98747febe29d

    SHA512

    5903569d34bced97c27426313c309f243d5eb145bf496eccd2ee598a61154da0057b4753a6a1de1fa9a8f76bb51b6a7c53937d91456abda15cce93ac9554baad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cato69Uw10.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • memory/2220-22-0x00000000006C0000-0x00000000007C0000-memory.dmp

    Filesize

    1024KB

  • memory/2220-23-0x00000000021E0000-0x000000000222B000-memory.dmp

    Filesize

    300KB

  • memory/2220-24-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/2220-26-0x0000000073C50000-0x0000000074400000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-25-0x0000000002340000-0x0000000002386000-memory.dmp

    Filesize

    280KB

  • memory/2220-27-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-28-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-29-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-30-0x0000000004D50000-0x00000000052F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2220-31-0x0000000004BB0000-0x0000000004BF4000-memory.dmp

    Filesize

    272KB

  • memory/2220-32-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-33-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-35-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-37-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-39-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-41-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-43-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-45-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-47-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-49-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-51-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-53-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-55-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-57-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-59-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-61-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-63-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-65-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-67-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-69-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-71-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-73-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-75-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-77-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-79-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-81-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-83-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-85-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-87-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-89-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-91-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-93-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-95-0x0000000004BB0000-0x0000000004BEE000-memory.dmp

    Filesize

    248KB

  • memory/2220-938-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/2220-939-0x0000000005920000-0x0000000005A2A000-memory.dmp

    Filesize

    1.0MB

  • memory/2220-940-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

    Filesize

    72KB

  • memory/2220-941-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-942-0x0000000004CC0000-0x0000000004CFC000-memory.dmp

    Filesize

    240KB

  • memory/2220-943-0x0000000005B30000-0x0000000005B7C000-memory.dmp

    Filesize

    304KB

  • memory/2220-945-0x00000000006C0000-0x00000000007C0000-memory.dmp

    Filesize

    1024KB

  • memory/2220-946-0x0000000073C50000-0x0000000074400000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-948-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-949-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-950-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2220-951-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3864-14-0x0000000000B50000-0x0000000000B5A000-memory.dmp

    Filesize

    40KB

  • memory/3864-15-0x00007FF8E48F0000-0x00007FF8E53B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3864-17-0x00007FF8E48F0000-0x00007FF8E53B1000-memory.dmp

    Filesize

    10.8MB