Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 11:02

General

  • Target

    9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a.exe

  • Size

    389KB

  • MD5

    8db815190d477d5ff3320f63ee0322af

  • SHA1

    f20c18ef6555549e9d467d3e63258dd51d561b7c

  • SHA256

    9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a

  • SHA512

    69b513a14c430ab26e06de529b07ab58624fb813c25e2b26db3e62db5255f537765c61c9fb0fcc8413ba3b0bc41d0ec3a593656012f8b4eeb63e398fee3057d8

  • SSDEEP

    6144:Kuy+bnr+Hp0yN90QEXnPQvYkWsjZNoBnY6y8byR+cuVsv33+RRSlwlBEfXSm:SMrry90VnPiyY0yR+5Kvn+R8JCm

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a.exe
    "C:\Users\Admin\AppData\Local\Temp\9712f3ca55a69dc82a720b41eeb39aa2d2482719c764715d774a1d1d1d11ea1a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7654585.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7654585.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9256657.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9256657.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8354031.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8354031.exe
        3⤵
        • Executes dropped EXE
        PID:3276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7654585.exe

    Filesize

    206KB

    MD5

    a27cd89a9b3edaa1a4f0e7f11451238e

    SHA1

    be203c693c3ab8b3e9c28ab33eb541e35c9eacbf

    SHA256

    b7fdb34a5765c492b175737d1d88e9ab2911f9fe7b13a93a3ea4cbe0efd6babf

    SHA512

    98b4bbcf7889f32a4110140e3ad8baf96c4451b3bdf8baa2fad7510d58ece5ac58e7058a8f33e754e9cc7200b041f9c423b6dd91d8bbf27cab0bc5c46e66f44a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9256657.exe

    Filesize

    14KB

    MD5

    8a11616e213bdee093a33b9f90b961cd

    SHA1

    2789b9f6b990f2ee80ccb6d955fdfaf23bbc42e2

    SHA256

    bbf171f9906b63b6fe5f6c4efd4bcb47878c93817276ca9abbf719630eb0b85a

    SHA512

    f47e87696740203efaeb912631b9481059a0e3dff4263605788dc4204a50f15b0d9f46f7fb34438b2e53fcd57fe024bc3dd7634f2a09f6f805448ab6e72668d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8354031.exe

    Filesize

    173KB

    MD5

    7db17099ccd4e1be9690412eaacf9a3f

    SHA1

    a9d22067db19d0f7e4bff66597778ff43aa12833

    SHA256

    dd8192ebd57226ded99ea00e4bddda2803fc08cdbfa59245e1c97a1f30bb13c3

    SHA512

    c3b4f0d5a18c0c546d267753687082ff3f5b8da1899549b2948096078e136b36368073fbf796c27f13930c7053f6abf69808024185c5068d9cf3ff4b2ee736a0

  • memory/3276-20-0x0000000000F20000-0x0000000000F50000-memory.dmp

    Filesize

    192KB

  • memory/3276-21-0x0000000003080000-0x0000000003086000-memory.dmp

    Filesize

    24KB

  • memory/3276-22-0x000000000B260000-0x000000000B878000-memory.dmp

    Filesize

    6.1MB

  • memory/3276-23-0x000000000AD90000-0x000000000AE9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3276-24-0x000000000ACD0000-0x000000000ACE2000-memory.dmp

    Filesize

    72KB

  • memory/3276-25-0x000000000AD30000-0x000000000AD6C000-memory.dmp

    Filesize

    240KB

  • memory/3276-26-0x0000000005260000-0x00000000052AC000-memory.dmp

    Filesize

    304KB

  • memory/3612-15-0x0000000000EE0000-0x0000000000EEA000-memory.dmp

    Filesize

    40KB

  • memory/3612-14-0x00007FFAEE1F3000-0x00007FFAEE1F5000-memory.dmp

    Filesize

    8KB