Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 15:04

General

  • Target

    627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9.exe

  • Size

    921KB

  • MD5

    4266390a3e460f4dbe90ce7d9d091d2b

  • SHA1

    16bf185400157eaae1561b62196add6bca53b84a

  • SHA256

    627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9

  • SHA512

    be25bfb86b8ef7a9f13a9e770e35e4273132920989e37a02fc90887d61208461d41b1b5e0dc419e6a1e53491c6243ad5221040d3f7d854c9b9496f3a19fe54fd

  • SSDEEP

    12288:EMrBy90qgmVH2qW5mA+49iYIvuPRQ3ijJbcrmVVhlheKO83eRs850M2ztvv:ty7gmx2qW5mSVPRQAJlzD/GIv

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9.exe
    "C:\Users\Admin\AppData\Local\Temp\627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7974264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7974264.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4610638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4610638.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5131175.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5131175.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4284
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1966405.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1966405.exe
          4⤵
          • Executes dropped EXE
          PID:712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7974264.exe

    Filesize

    766KB

    MD5

    dce92bfe290f2bfc8fcdaa8d79cfb428

    SHA1

    821836e9a2a75af557dc76b876d24cd2f29402b2

    SHA256

    1111e92ca559d16e157e3b9f162502a32061cfd7418cdf8da2ae2337b4a552d1

    SHA512

    bbe7210caa78acf6df00164ccee955ce79dc4c77fb71fc780243239936c7c1b7a01f59ccda25981bc3915ba127028bfc0c6ce6469c2a920fbc54fce6e01b73a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4610638.exe

    Filesize

    583KB

    MD5

    c3a728452be74e46d86fcc43e340e0c7

    SHA1

    398d2ea4ede704d9634e73d8050c9bf4c2e78931

    SHA256

    ac29c80de2d63a3c7aa65b0cc01240c9e3ca6d8d5c57a99cb2a24d4bad04d664

    SHA512

    f726c838bf300f0bb0a91cf88e1bd80aaee2e7f4b6e36b74a2df10407c8328a06b9f5e65ce856a94d88079b07139a78efcada57dde97048304eead99466f58f6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5131175.exe

    Filesize

    294KB

    MD5

    0051f204743bf30a487630bccbe89d83

    SHA1

    bd044684a695e3b660e2caecc04c509547ffff6c

    SHA256

    1e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5

    SHA512

    821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1966405.exe

    Filesize

    492KB

    MD5

    4ea677b1f5913f8b1d657574f8d52fdb

    SHA1

    1758af24eacb654e8f89c70f156c8021c0252870

    SHA256

    9322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58

    SHA512

    fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544

  • memory/712-45-0x00000000050B0000-0x00000000056C8000-memory.dmp

    Filesize

    6.1MB

  • memory/712-35-0x0000000001FF0000-0x000000000207C000-memory.dmp

    Filesize

    560KB

  • memory/712-42-0x0000000001FF0000-0x000000000207C000-memory.dmp

    Filesize

    560KB

  • memory/712-44-0x00000000023E0000-0x00000000023E6000-memory.dmp

    Filesize

    24KB

  • memory/712-46-0x0000000004A90000-0x0000000004B9A000-memory.dmp

    Filesize

    1.0MB

  • memory/712-47-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

    Filesize

    72KB

  • memory/712-48-0x0000000004BE0000-0x0000000004C1C000-memory.dmp

    Filesize

    240KB

  • memory/712-49-0x0000000004C50000-0x0000000004C9C000-memory.dmp

    Filesize

    304KB

  • memory/4284-28-0x0000000000680000-0x00000000006BE000-memory.dmp

    Filesize

    248KB

  • memory/4284-29-0x0000000006BD0000-0x0000000006BD1000-memory.dmp

    Filesize

    4KB

  • memory/4284-22-0x0000000000680000-0x00000000006BE000-memory.dmp

    Filesize

    248KB

  • memory/4284-21-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB