Analysis

  • max time kernel
    143s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 15:28

General

  • Target

    4d09936a4a5e882005320c53757dc18469109b9f86d4b6003bb674e1658b0dbf.exe

  • Size

    1.2MB

  • MD5

    2ff65e9ca8a0b92b2f9ead3ba8dd7ed2

  • SHA1

    bc118c8a4ba9391e5bc4315eef3d0dd83afaebfd

  • SHA256

    4d09936a4a5e882005320c53757dc18469109b9f86d4b6003bb674e1658b0dbf

  • SHA512

    4fd459726173efd0412638d81884d4636b385098696b6dee1b403b809a3eb79c2202394ca4ca5e8f3f1630e83e02af723a78931c58242cf161abe1974b32137a

  • SSDEEP

    24576:YyZkbJInDZr4+HhuBykcdH3B3laSprA5MBkWUhLfYTemxmdza8xPjo:fZkbSDZTHc9cdH3aSBA5I4FduaPj

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d09936a4a5e882005320c53757dc18469109b9f86d4b6003bb674e1658b0dbf.exe
    "C:\Users\Admin\AppData\Local\Temp\4d09936a4a5e882005320c53757dc18469109b9f86d4b6003bb674e1658b0dbf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1426625.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1426625.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4288450.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4288450.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0931522.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0931522.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0829334.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0829334.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2128
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5137020.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5137020.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4180
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3677044.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3677044.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1783125.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1783125.exe
            5⤵
            • Executes dropped EXE
            PID:4468
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

      Filesize

      226B

      MD5

      916851e072fbabc4796d8916c5131092

      SHA1

      d48a602229a690c512d5fdaf4c8d77547a88e7a2

      SHA256

      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

      SHA512

      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1426625.exe

      Filesize

      1.0MB

      MD5

      0ffebb1f8e07e9e177551ddfe1e5deb3

      SHA1

      126013412bc3d49f5c8e3beafe9cfd92fdf59c65

      SHA256

      cd6bdea7c7a6c6ade538cf5d4567881d67e82dd72d473179cb47986367bae628

      SHA512

      1a23a319a9d8c4f025ede357e008d6ee0a656f88e7efa0901a46eef7b6c56248dad5a4b251f82b3d7c1aa73562ff5fa00e5ae2f9262554232badebe4dc71918a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4288450.exe

      Filesize

      909KB

      MD5

      05b31cc1f873f663da8a3673ee1c1e70

      SHA1

      da64bfd433ce785b9d26fb0f6fe4883d9d790b09

      SHA256

      2a5782027e95953e6a505c58e691fc2324135b202c38c437ad4dc8ced47a2feb

      SHA512

      d902b06aebe522c883f782dd299f57d3d1925ab3e4955b8ce6882e53523bd63b9d3f35b8c0f0c6ad8aea0a5e9f9e3ad01fd2bc2096dbe62196ce38bb0f6f40d8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0931522.exe

      Filesize

      725KB

      MD5

      50f2ebe7886d7ecf35f81f720ac270ed

      SHA1

      59f616bc7d655575d54e58c256de026dd0c82c6e

      SHA256

      e127f2e8fb3406e6ce6497ebf04e41c01b95f4a7c2d3c89ecc5fe462dfa62ffd

      SHA512

      d685afabb0bb488b1d6d0c3d69b0175593658f5920d25841086759be73ed79ee426883485013fa5b6f5398372c36145c559404ac7892e559d75846fbaf5adf44

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1783125.exe

      Filesize

      492KB

      MD5

      1bc0f3239045d44d169496f3b247f881

      SHA1

      1884266973607585ec1b134f6009c17e54f3b18f

      SHA256

      8d09dd356bd29f5d38121849999e828d955e116d03542444d0b4f40073596e7f

      SHA512

      dc3a2358d4d2613bb82c60362c409590a8699d53625efd9fd8b853f5e19afed07c798cf66b59d38bd526a80559bc4cc486b23b0f40f3fb120bd61a67946f87a9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0829334.exe

      Filesize

      325KB

      MD5

      c045adc356c9935a873d1cd91cd54989

      SHA1

      06b1b8c34e396a09a69a425af0f8b00671a4f953

      SHA256

      bb2374a0251dd291e217e7c74eac6881cc229a2778ba0047f54e014bebc75a62

      SHA512

      bcab8a6331c4ceb7beeff395fc6d3b8d0ae7e1ae3ea0c45692870aad586563ed8313d24b02d45c69cb0496f7115f6580422637edcb4c188575960819e86f54f0

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5137020.exe

      Filesize

      295KB

      MD5

      c43930fbf73244831a96682aba907e8c

      SHA1

      44db4ec9c11a04d56d2bfab7f993abf37a23e6fe

      SHA256

      9beeaf6651baa5e2597a933df6eee18cf168ba41865e18001185613e0949bba3

      SHA512

      6cb91d5c9317f693a04eec12cddef55760619ed65944df60986b009eb1c782833d121788d4352519e6391bed2a06f0f602b1f4a753623c7ac92dd0440dd307af

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3677044.exe

      Filesize

      11KB

      MD5

      f77d78af12b9628421ed4e1dfb7deb13

      SHA1

      9b6fa06af3564e2fe4724d8b5ebfdfd2a7ec0fd5

      SHA256

      10d806abe4d088bbb95c43a04c91f68a10888bd256de9c9a58c4c7642a9572ab

      SHA512

      6c01f44fdb412a58a19ddb4caf73a502a5aae10aecb959a67142ab267ef6732a7e5e6346c1a5ce5aa52823ae5b50372c083e4e59f650c835a38c75d334303e00

    • memory/3992-48-0x00000000002D0000-0x00000000002DA000-memory.dmp

      Filesize

      40KB

    • memory/4180-35-0x00000000005A0000-0x00000000005DE000-memory.dmp

      Filesize

      248KB

    • memory/4180-42-0x0000000006A90000-0x0000000006A91000-memory.dmp

      Filesize

      4KB

    • memory/4180-41-0x00000000005A0000-0x00000000005DE000-memory.dmp

      Filesize

      248KB

    • memory/4468-53-0x0000000000740000-0x00000000007CC000-memory.dmp

      Filesize

      560KB

    • memory/4468-60-0x0000000000740000-0x00000000007CC000-memory.dmp

      Filesize

      560KB

    • memory/4468-62-0x0000000002400000-0x0000000002406000-memory.dmp

      Filesize

      24KB

    • memory/4468-63-0x00000000080A0000-0x00000000086B8000-memory.dmp

      Filesize

      6.1MB

    • memory/4468-64-0x00000000086C0000-0x00000000087CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4468-65-0x0000000006B80000-0x0000000006B92000-memory.dmp

      Filesize

      72KB

    • memory/4468-66-0x0000000006C20000-0x0000000006C5C000-memory.dmp

      Filesize

      240KB

    • memory/4468-67-0x00000000089D0000-0x0000000008A1C000-memory.dmp

      Filesize

      304KB