Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 15:28

General

  • Target

    4b8eb941853bd390287dbcbe8dae61e1b226baa6661172eff6766605a0047ec3.exe

  • Size

    1.2MB

  • MD5

    71be01bb024a89a23ca18aa6a77d160b

  • SHA1

    4d11090dcfa1809209f5ead33ff2359628985a5f

  • SHA256

    4b8eb941853bd390287dbcbe8dae61e1b226baa6661172eff6766605a0047ec3

  • SHA512

    47a8989ec3f915a900af0c9413dc51d16a706a20e219c34f9425472a21d70711599ee0d9c3990f2463a1050867afd6f4a483be27169124b8ae0c5b7589ae8668

  • SSDEEP

    24576:9yzGzXUUN6D6ScsWIPYUSsXqzlIQBo+/RpyPQqhNFGIO/:YQXUUN6D6CwvsXsWKoIRsxhNw

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b8eb941853bd390287dbcbe8dae61e1b226baa6661172eff6766605a0047ec3.exe
    "C:\Users\Admin\AppData\Local\Temp\4b8eb941853bd390287dbcbe8dae61e1b226baa6661172eff6766605a0047ec3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9405994.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9405994.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6384948.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6384948.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1040822.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1040822.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3460
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1586501.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1586501.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4324
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6370349.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6370349.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2876
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8770774.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8770774.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6121207.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6121207.exe
            5⤵
            • Executes dropped EXE
            PID:5488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9405994.exe

    Filesize

    1.0MB

    MD5

    aef04ccd0641dc9a63df41e25aa4273e

    SHA1

    c3b0d2a04a795babc21c810ad46f5217dca34137

    SHA256

    0abea631e220741b291754699d5545449a059ca4d2d0559fdc465c92f045b2eb

    SHA512

    0942a1dfb0901b7a214be0ebb577de1b590189e5d7d5830e577acd4c7455181283a771db7dfce93eab98b67c2cd53bdb2eaf5a645c9e4aee5dcdcca39b382804

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6384948.exe

    Filesize

    907KB

    MD5

    44c832fc392e51418fc15c39ab3de1e7

    SHA1

    fbc66040168e7f66f4d4398bfa975cac696cb388

    SHA256

    0a78c5e4410205c3c84531e625507722c41af9a104962a80e3ed6058b5199dd9

    SHA512

    c6b12e389eca96a1775e558ab4d448f72a2a22721fc3518fd321e97e6a7798db0201257d91770bd452ae84b2cfc6ccce08445c1ade5bf149448f7dcb4d4e86df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1040822.exe

    Filesize

    724KB

    MD5

    7b46cc038ef86adcd4c68aca30e827ab

    SHA1

    de3f3ea3efee57d4cd7adbef9967dc70d9e374cb

    SHA256

    c9cd1e8b266848f88a108ecc30abbce1812e7d05412f6795394141ec3e103d8e

    SHA512

    6fc5f1db66030c616c695402a1df40185fee44aca2cacd6bd76a02046d65f228df5cf38981230e0352fb52e515b877cf2a76efec70f33e63331fb344ddbc7240

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6121207.exe

    Filesize

    492KB

    MD5

    5adb87d97c20867c329ebfc6df1c490e

    SHA1

    1bf2dabf26f4358ba354f223cc103a76445b0eb4

    SHA256

    77f6716e92a77c63bc2d9249a0b3caf1f47fd9131f6b8e0159545e40fe8bb38c

    SHA512

    2c2f0e2884e62a133a570ef440f3addf1d320f22b0ff914827014d2ae4812772e4a29f9dcebb2fe00969f412be3430ed4749ff7ec11022c2f30be064b9723b83

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1586501.exe

    Filesize

    326KB

    MD5

    7ca527243bc8f6db1462a860ec57aac2

    SHA1

    30737b8e360dc4eddd7492f9a1a86cf10bf405ad

    SHA256

    189417b41216990025f5be820a972769f9a333878ad2256a9f014d546954851a

    SHA512

    396f444648527207fdef07281fd1b3d98e84180d1687c3270e2927b792d566c130df5c345cfbc29236d3e093ff6847ac979401c1b8d67e29e2ff96591c79f5a9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6370349.exe

    Filesize

    295KB

    MD5

    69738532f97ce2ea62f220d38452732f

    SHA1

    213a12ed7882f306067521c38c63d5557e0f070a

    SHA256

    e66db8d1b573b77c498d1e8c93eaaa52ca975b34d81da8a0d9702484a8edabfa

    SHA512

    9dc45f205ec73471c02ff7f021f6bedfc825c8674fef572dfadecf503993b53f07d12ea1f51cf38dd930d5a3a9415e04ff2e9b317865b1c7ab25cad682848578

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8770774.exe

    Filesize

    11KB

    MD5

    eed9c4f01f76dfcb47c381e467c156b6

    SHA1

    ae4d42d1975f4ac968aa781243efdf580c58d58e

    SHA256

    ac26f5d95655a7e285a64813dff4ebba5fb9fdbe8bc3268c9c0d0b452b502b61

    SHA512

    273de9dcccadab14684fe2e959d25f9833a639fb41942f6ecf5304de50fab8215183197feeb03f7f4bb09031fc19aaac13b5dad66096ce1f3d81a74bf0cbec06

  • memory/2876-35-0x0000000000570000-0x00000000005AE000-memory.dmp

    Filesize

    248KB

  • memory/2876-42-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/2876-41-0x0000000000570000-0x00000000005AE000-memory.dmp

    Filesize

    248KB

  • memory/3720-48-0x0000000000D90000-0x0000000000D9A000-memory.dmp

    Filesize

    40KB

  • memory/5488-54-0x00000000005A0000-0x000000000062C000-memory.dmp

    Filesize

    560KB

  • memory/5488-60-0x00000000005A0000-0x000000000062C000-memory.dmp

    Filesize

    560KB

  • memory/5488-62-0x0000000004520000-0x0000000004526000-memory.dmp

    Filesize

    24KB

  • memory/5488-63-0x000000000B4F0000-0x000000000BB08000-memory.dmp

    Filesize

    6.1MB

  • memory/5488-64-0x000000000AF50000-0x000000000B05A000-memory.dmp

    Filesize

    1.0MB

  • memory/5488-65-0x000000000B080000-0x000000000B092000-memory.dmp

    Filesize

    72KB

  • memory/5488-66-0x000000000B0A0000-0x000000000B0DC000-memory.dmp

    Filesize

    240KB

  • memory/5488-67-0x0000000006A00000-0x0000000006A4C000-memory.dmp

    Filesize

    304KB