Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 12:56

General

  • Target

    f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b.exe

  • Size

    389KB

  • MD5

    047a5e67b8325b5f7f14d6300d2525fa

  • SHA1

    e765cf5f8a5e1e80bad8f737cd658ffaea69ed78

  • SHA256

    f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b

  • SHA512

    da5583b2adff91294d280d78d4b3b598aab8b169e79bbc638f1042fcf44ab00b357c20b5b9dc7319482dba7632bd238653da8c0458af3b25a95a684ae46f57cd

  • SSDEEP

    6144:KAy+bnr+Np0yN90QEQmynqq5AvfcQr4UliD4EYjxgt2jfsmdrHq/LDxMMJOkeb:UMrhy90WP64Ul84jSt2jfHrKjDxMMbM

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b.exe
    "C:\Users\Admin\AppData\Local\Temp\f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5687166.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5687166.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1980406.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1980406.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3481787.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3481787.exe
        3⤵
        • Executes dropped EXE
        PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5687166.exe

    Filesize

    206KB

    MD5

    82508e684b0244b131384ad84bd736ed

    SHA1

    3c80d10f1bad612d93b99bfc4ab1407dba6c101d

    SHA256

    2f9713625553da98a31d2c7cc5fa0ba1aafe7e56045cc660ab24e00c0b7eca4d

    SHA512

    10b6232edc6c64acc7aab72a2c31bb8c8654bcc7c603b43321b9898a05d4abee803890b13951aadfc913e955781272485a7f74452c979fc576f4d6f20a179a8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1980406.exe

    Filesize

    14KB

    MD5

    acf71ede3fa4498bb7397d170fa7f878

    SHA1

    dd69c1172a9bf2f7d37b10a9fad59e1e1359c3ca

    SHA256

    a093e4e6d1e4d36ac0a4d04ed691dd962d5a6cc576395d79680eb7dc46650d09

    SHA512

    d7e45ef34b57273bf22af623e860fad167329dcb0d94feccda24d0d019b1bb7a8596162afefc6add472cf0fada895fcbb0febeb60e030006725ba9299ddc2355

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3481787.exe

    Filesize

    173KB

    MD5

    bfb4ba8d200b626ae3d3a6d9ca32061b

    SHA1

    d95ffa9926a751678bf632a7ccc558e1e8bfd0c5

    SHA256

    9358dd428789b3d65d74482772d34eef690cad71a78453ded32673a5bebccf3f

    SHA512

    c63c0198c363675e50866d3ac051c051ce53b758f364e66a15749422ce6efb1e689e68cb7c5936f64b4e5550623a16ffedc8ee84e553c78571f9db7a712fe3fe

  • memory/1516-20-0x0000000000E30000-0x0000000000E60000-memory.dmp

    Filesize

    192KB

  • memory/1516-21-0x0000000003220000-0x0000000003226000-memory.dmp

    Filesize

    24KB

  • memory/1516-22-0x000000000B2C0000-0x000000000B8D8000-memory.dmp

    Filesize

    6.1MB

  • memory/1516-23-0x000000000ADE0000-0x000000000AEEA000-memory.dmp

    Filesize

    1.0MB

  • memory/1516-24-0x000000000AD20000-0x000000000AD32000-memory.dmp

    Filesize

    72KB

  • memory/1516-25-0x000000000AD80000-0x000000000ADBC000-memory.dmp

    Filesize

    240KB

  • memory/1516-26-0x0000000005280000-0x00000000052CC000-memory.dmp

    Filesize

    304KB

  • memory/3580-15-0x00007FFFFCFF3000-0x00007FFFFCFF5000-memory.dmp

    Filesize

    8KB

  • memory/3580-14-0x0000000000A00000-0x0000000000A0A000-memory.dmp

    Filesize

    40KB