Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 17:56

General

  • Target

    277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94.exe

  • Size

    389KB

  • MD5

    be20e8d108cf9e94319678c0f61393d4

  • SHA1

    9ca7da9916d071095a2985ecb2408f24f9978453

  • SHA256

    277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94

  • SHA512

    4a60a1bb61a320deabeeebb508685a024c2b6c1d065221bc5a2682a90193300899d49e355675b84293875486cd08e94d582c95df886ca3330bef74cb0921afca

  • SSDEEP

    6144:KPy+bnr+Lp0yN90QE9dx9l253NzJGHDRezddZ5ULvrGEf51/HmbTME:FMr7y90P25uFEnwrGEr/YT5

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94.exe
    "C:\Users\Admin\AppData\Local\Temp\277f52adcffdae3b95ac4c1b928de6c4a507600023471054f5c9d34f3b852f94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1369519.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1369519.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3758178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3758178.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2710542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2710542.exe
        3⤵
        • Executes dropped EXE
        PID:4788
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1369519.exe

    Filesize

    206KB

    MD5

    f34c885bc0878d18d10ff2a2bcab37bf

    SHA1

    183ec4b6099090f5e12f2977855a5b8a47434b11

    SHA256

    bc0bd82e116a9895ebc746eb946211813684173fb091a3b5beb68d633d8f8ed7

    SHA512

    ac17cb90087c25fec2966c8ef59192b88d9ae2752d235af76a9b7e73900319750aef27becf5877f89560046b0c0cb43d2901cd501a032295f354fb2f7b27495d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3758178.exe

    Filesize

    14KB

    MD5

    452bb0fa072d8b5b84e96b8135b88a33

    SHA1

    958d7ebe07651e7de76fa57dad744174a6948840

    SHA256

    e4864ebb7779217e5e02467385f0e1b64b27e1eda7c6ce12c81fa2ba5886d6af

    SHA512

    1f7f6066b5b8c076894aed53d85f46a9c643d41a5faebc84400437bcb797a9b220c70b75be4139c9213121c841e868f2677096bbd167f3f151d7b3152cbdad9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2710542.exe

    Filesize

    174KB

    MD5

    29d290bc7cf52245c18068dd18a2b56b

    SHA1

    80834b85700772615c39a38757267968e32f3240

    SHA256

    f66d99d19231a0f6abba5374f8916cdcb478e715c50f29d6e436e54ee0e2db44

    SHA512

    86e90ae7c792bbae7bba8f0ee029c71233e540d74f9786aa3c5f381d2394ce7aa72c5cd6045eb9410821e59ba201558da773fc14e267cff0ca09ccc4a5314bed

  • memory/3172-14-0x00007FFE245E3000-0x00007FFE245E5000-memory.dmp

    Filesize

    8KB

  • memory/3172-15-0x0000000000E80000-0x0000000000E8A000-memory.dmp

    Filesize

    40KB

  • memory/4788-20-0x00000000004D0000-0x0000000000500000-memory.dmp

    Filesize

    192KB

  • memory/4788-21-0x0000000002780000-0x0000000002786000-memory.dmp

    Filesize

    24KB

  • memory/4788-22-0x000000000A900000-0x000000000AF18000-memory.dmp

    Filesize

    6.1MB

  • memory/4788-23-0x000000000A480000-0x000000000A58A000-memory.dmp

    Filesize

    1.0MB

  • memory/4788-24-0x000000000A3C0000-0x000000000A3D2000-memory.dmp

    Filesize

    72KB

  • memory/4788-25-0x000000000A420000-0x000000000A45C000-memory.dmp

    Filesize

    240KB

  • memory/4788-26-0x00000000047D0000-0x000000000481C000-memory.dmp

    Filesize

    304KB