Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 10:39

General

  • Target

    4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe

  • Size

    920KB

  • MD5

    324cb7ed10920e1912c6c390c5179a1d

  • SHA1

    2cb736bf107171b3047cb7b0ae7085a09704e68f

  • SHA256

    4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2

  • SHA512

    7575bdf3c2e403de7deae4f0fc663fb6ccd612365da6c59b98fc47f37d42c1bda0aef9b272edd10ea4105a9fb17c992af21ea38c2acf1ca527620e17d795a6cf

  • SSDEEP

    12288:8Mr5y90BC08ZhZRpWsDWMuTYKrTDcVl4JRh/+pnKuLp611/cNOaK+oyrfYGzfD+Q:lyTn/qMnHAhWpKuLM7B+VrfvpaG

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\4efca8805f96c16e636fc6f51197b43215b96da00409608d7658fea7ee155ea2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9899703.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9899703.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8857049.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8857049.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4403231.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4403231.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1252
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3487692.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3487692.exe
          4⤵
          • Executes dropped EXE
          PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log
    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9899703.exe
    Filesize

    765KB

    MD5

    26dae5d4d05d23028b52c4c7e0d9e320

    SHA1

    e9e6d919072fe394b4048afc8347767dc9c4537e

    SHA256

    a4a82ed5acbefbefaaa605b8f0185acabd756156ce61048890bfc9f925879ca7

    SHA512

    a38cedc65adb6ad51a0d0734803654be11b7e54a2b06e8f71da49a1591b59375cc1146d646cd6571a4b909e6ba8081285ccfec1ab61404362a51578ee6e1c06e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8857049.exe
    Filesize

    582KB

    MD5

    3597e5b94ee01b55bf51cc13e1e5680a

    SHA1

    a393a16b6d18b53aec4dbc22080009973e1ae894

    SHA256

    f512d47dac15860a182bb26fcb3d05ac6ccf8da19de78c934b2bf2d012a4f6a6

    SHA512

    9d21e10b8722a56d967d3fbafd1c393922fb42658c1a106d88d43f0981b04ebf6abf4a9c372c19fe391694f221aebd613952ff36d0a4ec089f5e8659a50268e3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k4403231.exe
    Filesize

    294KB

    MD5

    068c37a137de97b4569270eb0fd08b27

    SHA1

    9cef9ddd66a3c3a18a6993eff25304d29e95bf6d

    SHA256

    f9adeb967c811f699984b5a9d12d7d5c7090827a0c1ab3bea159c7d04f41286b

    SHA512

    98f1d6795cadb5ffe4f95c05fa3590832fe64cf1ea539199557fba0b4183c50ec7c0fdd210af23d4c769beb1158eca495e5b176d883ee29501334e88c0139cf1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3487692.exe
    Filesize

    492KB

    MD5

    da6ff81c6f67611413531f823ea93e2b

    SHA1

    8e4244fe534ab3ae1ea22dc12f0665bcec0db34a

    SHA256

    69220a693e0059f35711ed1e66ec35c9b62de85afe4cdb9c282c2d24d9483193

    SHA512

    f4af9745c5dab137c04b0e86f34fc696c1a9d7fcb9ca9733fcd75256981aa6835f3aeffd4f3fc1fce1c07109096c2835a2b6c83bc246ccfd719372059ebe5d36

  • memory/1168-45-0x00000000049E0000-0x0000000004FF8000-memory.dmp
    Filesize

    6.1MB

  • memory/1168-35-0x00000000005C0000-0x000000000064C000-memory.dmp
    Filesize

    560KB

  • memory/1168-42-0x00000000005C0000-0x000000000064C000-memory.dmp
    Filesize

    560KB

  • memory/1168-44-0x00000000044D0000-0x00000000044D6000-memory.dmp
    Filesize

    24KB

  • memory/1168-46-0x0000000005090000-0x000000000519A000-memory.dmp
    Filesize

    1.0MB

  • memory/1168-47-0x00000000051C0000-0x00000000051D2000-memory.dmp
    Filesize

    72KB

  • memory/1168-48-0x00000000051E0000-0x000000000521C000-memory.dmp
    Filesize

    240KB

  • memory/1168-49-0x0000000005250000-0x000000000529C000-memory.dmp
    Filesize

    304KB

  • memory/1252-29-0x0000000002600000-0x0000000002601000-memory.dmp
    Filesize

    4KB

  • memory/1252-28-0x0000000000790000-0x00000000007CE000-memory.dmp
    Filesize

    248KB

  • memory/1252-27-0x0000000000401000-0x0000000000404000-memory.dmp
    Filesize

    12KB

  • memory/1252-21-0x0000000000790000-0x00000000007CE000-memory.dmp
    Filesize

    248KB