Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2024 17:34

General

  • Target

    0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe

  • Size

    892KB

  • MD5

    cef429558df1ed7d9eeba231f786c9ca

  • SHA1

    507689b64ea314a4124ca7d2b2f03696d1ad424c

  • SHA256

    0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca

  • SHA512

    bce0bff3f159844c8d9cc0f736e554db21ee3b9e79c2d0f982b116797952f5eddf062a6311c1c335684f752cf644b33c41faed2cd74fc47d38865f9a7714ceb3

  • SSDEEP

    24576:OyqHyhl84FXEvcXTAJfQGQZmHAgn5sQycdt:dqHyDOKsWRmHAgn/7d

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe
    "C:\Users\Admin\AppData\Local\Temp\0a1fe5e3718f91442f7012ee0c41c9d79a6df83d49e7051a41b16cd808f334ca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plZA31LB38.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plZA31LB38.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plsp92Cu08.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plsp92Cu08.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buOF05nB53.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buOF05nB53.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cato69Uw10.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cato69Uw10.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plZA31LB38.exe

    Filesize

    666KB

    MD5

    86d80efcf39ac0644815a6a7793b4e07

    SHA1

    abf36fbcb4de003a0c4acb063a3752ebfd849298

    SHA256

    794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0

    SHA512

    b223b880c06f5ea76c80833d83d57b57b71e4c78b77c8641162fd5c12805bcc406ce7ab5929bb216de7da9813d63f422050912d91eae32afce1702a17502ee8b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plsp92Cu08.exe

    Filesize

    391KB

    MD5

    b4944bc275ae14c46b017da4121ca43b

    SHA1

    f791c3ac27e502e2aa6b4c6b0abbd116ac96c6f3

    SHA256

    62a2b9cf24ec16917202c5938495357bdc6b4861a77520225388ee25370d1ce8

    SHA512

    b82bc47d7fa503ba545b74796695edb7db82535c181b19b33242cb67fb87e79bedb79da6b64cbb43978290879e9923b7f010ccf78e4027847166c0d1cdddc5f0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\buOF05nB53.exe

    Filesize

    11KB

    MD5

    3b416a1b882466bd99311dbab98fb42d

    SHA1

    286eaf9931732e12f2ba571d44e4bb20e20d0022

    SHA256

    9810f5b05ccbee3d0d4dc6368bbafdb3fd80eb506f5f443969dd98747febe29d

    SHA512

    5903569d34bced97c27426313c309f243d5eb145bf496eccd2ee598a61154da0057b4753a6a1de1fa9a8f76bb51b6a7c53937d91456abda15cce93ac9554baad

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cato69Uw10.exe

    Filesize

    304KB

    MD5

    fc9d1d13726797f824009a1594b5a9c3

    SHA1

    447b53284c76edef32a942621ad7fdfd0f3ce704

    SHA256

    872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276

    SHA512

    e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729

  • memory/912-31-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/912-30-0x00000000021E0000-0x000000000222B000-memory.dmp

    Filesize

    300KB

  • memory/912-29-0x0000000000730000-0x0000000000830000-memory.dmp

    Filesize

    1024KB

  • memory/912-32-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/912-34-0x0000000002350000-0x0000000002396000-memory.dmp

    Filesize

    280KB

  • memory/912-33-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-36-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-35-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-38-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/912-37-0x0000000004C10000-0x00000000051B4000-memory.dmp

    Filesize

    5.6MB

  • memory/912-54-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-60-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-64-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-70-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-84-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-96-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-102-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-100-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-98-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-94-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-92-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-90-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-88-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-86-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-80-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-78-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-68-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-62-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-58-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-52-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-50-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-46-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-40-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-39-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/912-946-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/912-945-0x00000000051C0000-0x00000000057D8000-memory.dmp

    Filesize

    6.1MB

  • memory/912-948-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-947-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/912-949-0x00000000059C0000-0x00000000059FC000-memory.dmp

    Filesize

    240KB

  • memory/912-950-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB

  • memory/912-952-0x0000000073D80000-0x0000000074530000-memory.dmp

    Filesize

    7.7MB

  • memory/912-953-0x0000000000730000-0x0000000000830000-memory.dmp

    Filesize

    1024KB

  • memory/912-954-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-956-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-957-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/912-958-0x0000000004C00000-0x0000000004C10000-memory.dmp

    Filesize

    64KB

  • memory/4012-21-0x0000000000F90000-0x0000000000F9A000-memory.dmp

    Filesize

    40KB

  • memory/4012-22-0x00007FFDFB280000-0x00007FFDFBD41000-memory.dmp

    Filesize

    10.8MB

  • memory/4012-24-0x00007FFDFB280000-0x00007FFDFBD41000-memory.dmp

    Filesize

    10.8MB