Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2024 21:58

General

  • Target

    a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe

  • Size

    917KB

  • MD5

    6fdfe49a6a2bfde4671bffb38d338f33

  • SHA1

    35f4533d79757b9e614a87f19a7a6124fb2c428a

  • SHA256

    a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57

  • SHA512

    6c8e571007a8c46f729b1269bf184779f3572ec2edcc8e68e8286fd34560726f63ffe90a118ee14680e1573e0b56643a1232e18aeb5b7789918ca9a07f4e57c5

  • SSDEEP

    24576:yySANA2vRMtGsJa0pZjc+whK6qVPvqx6jrTd:Z1NA25MtGsJa0TjNw46OX

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
  • Detects executables packed with ConfuserEx Mod 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe
    "C:\Users\Admin\AppData\Local\Temp\a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3975467.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3975467.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1104218.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1104218.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4824473.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4824473.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4836122.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4836122.exe
          4⤵
          • Executes dropped EXE
          PID:3856
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1712 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1168

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3975467.exe
      Filesize

      638KB

      MD5

      74de358eaea2b08bd289236d327c8b02

      SHA1

      4bd4388da5148cd3175fcfe3822853695bfcc537

      SHA256

      1c8e7cb1fbab7d6fec241c2e36c14113a9a3b5cbf5cb1a86b66ce6d0baa61132

      SHA512

      e048b7098b3a9b8a569db702c890e12cd6dba73123061e1bf06f20393203b62d109dc5265f4640f930fc82304e3467c37ee4ecab570401c40bdbc743a9afdfb4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1104218.exe
      Filesize

      192KB

      MD5

      96f4143eec3ae4cb1306b1057d364183

      SHA1

      45ea4d6aa668ea412d2a9b934c801c4604ff4173

      SHA256

      a9121eabab867b2c02ed2f707dbe01457ce7082808bbcd53395090d4437d8d10

      SHA512

      92e98660d8f6dd5c43c39b42b0506b486db479095695a7a47866cf648a5d433e1b7c79116bb450d81cf93e3b382bb48b2106e16a691bd3455ddfdce8705bcc15

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4824473.exe
      Filesize

      11KB

      MD5

      3e93298d9c8ec3e5bffeaecd73d304fb

      SHA1

      9a80854ab78b82d54911731b6f90b286cf143189

      SHA256

      b6f526e716440c0151c35004d3af2a05cf16cc35317382bc7539617cf52f4f7d

      SHA512

      cd37302c86e51476169f17b3f812e5d1300bd6b2bc7306f67478e40d3707eeb4df580fec2f0394deb7e9db5a18ae9d47ecd48359d11b9a826c9db35d35bb7f6b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4836122.exe
      Filesize

      145KB

      MD5

      1350acd255540c950ab409f52038148f

      SHA1

      341e09d9062c15bf1505dd081a414c681ea223a0

      SHA256

      331ccc9762453574af6c041726c67e784f5b775a6f090c84795c457d7cd6d405

      SHA512

      144ec20b21d0824c8f91b30d1e6c7630e5f0aa38ea0854215633ff8a9b357a0f8541e02c7df4ba59918b0c5f5ebfaa3c917277b044506215cf8e4476f0c90530

    • memory/224-21-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/224-24-0x00007FFE92E60000-0x00007FFE93921000-memory.dmp
      Filesize

      10.8MB

    • memory/224-22-0x00007FFE92E60000-0x00007FFE93921000-memory.dmp
      Filesize

      10.8MB

    • memory/3856-28-0x00000000745E0000-0x0000000074D90000-memory.dmp
      Filesize

      7.7MB

    • memory/3856-29-0x0000000000C60000-0x0000000000C8A000-memory.dmp
      Filesize

      168KB

    • memory/3856-30-0x0000000005BB0000-0x00000000061C8000-memory.dmp
      Filesize

      6.1MB

    • memory/3856-31-0x0000000005730000-0x000000000583A000-memory.dmp
      Filesize

      1.0MB

    • memory/3856-32-0x0000000005660000-0x0000000005672000-memory.dmp
      Filesize

      72KB

    • memory/3856-33-0x00000000056C0000-0x00000000056FC000-memory.dmp
      Filesize

      240KB

    • memory/3856-34-0x0000000005840000-0x000000000588C000-memory.dmp
      Filesize

      304KB

    • memory/3856-35-0x00000000745E0000-0x0000000074D90000-memory.dmp
      Filesize

      7.7MB