Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 12:32 UTC

General

  • Target

    ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da.exe

  • Size

    925KB

  • MD5

    182c7282a0ce3f4b3167518c8a2f9d66

  • SHA1

    7277f55f22c18008840d4aa0c65721df2129d761

  • SHA256

    ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da

  • SHA512

    57895e1fe2d89271097e920e8eeaccbeafc861fde18aa85cdac7cf716cebb332fe201e2821512be04a92c965894526c3f7bcb8d3d7b010909cc8318f95ce79a0

  • SSDEEP

    24576:UylKFVXmbDRGB2xA30pIMporMtfc/FgIHs8:jEVGFGB2CkpIuPtfees

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da.exe
    "C:\Users\Admin\AppData\Local\Temp\ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8792484.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8792484.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3682092.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3682092.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8000827.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8000827.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8276002.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8276002.exe
          4⤵
          • Executes dropped EXE
          PID:3748

Network

  • flag-nl
    GET
    https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
    Remote address:
    23.62.61.161:443
    Request
    GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
    host: www.bing.com
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-type: image/png
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    content-length: 1107
    date: Fri, 10 May 2024 12:34:21 GMT
    alt-svc: h3=":443"; ma=93600
    x-cdn-traceid: 0.9d3d3e17.1715344461.d8f939
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    68.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    161.61.62.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    161.61.62.23.in-addr.arpa
    IN PTR
    Response
    161.61.62.23.in-addr.arpa
    IN PTR
    a23-62-61-161deploystaticakamaitechnologiescom
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    142.53.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    142.53.16.96.in-addr.arpa
    IN PTR
    Response
    142.53.16.96.in-addr.arpa
    IN PTR
    a96-16-53-142deploystaticakamaitechnologiescom
  • flag-us
    DNS
    79.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    79.190.18.2.in-addr.arpa
    IN PTR
    Response
    79.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-79deploystaticakamaitechnologiescom
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
    Response
  • 23.62.61.161:443
    https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
    tls, http2
    1.5kB
    6.3kB
    17
    11

    HTTP Request

    GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

    HTTP Response

    200
  • 77.91.68.56:19071
    l8276002.exe
    260 B
    5
  • 77.91.68.56:19071
    l8276002.exe
    260 B
    5
  • 77.91.68.56:19071
    l8276002.exe
    260 B
    5
  • 77.91.68.56:19071
    l8276002.exe
    260 B
    5
  • 77.91.68.56:19071
    l8276002.exe
    260 B
    5
  • 77.91.68.56:19071
    l8276002.exe
    156 B
    3
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    68.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    68.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    161.61.62.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    161.61.62.23.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    142.53.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    142.53.16.96.in-addr.arpa

  • 8.8.8.8:53
    79.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    79.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    29.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    29.243.111.52.in-addr.arpa

  • 8.8.8.8:53

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8792484.exe

    Filesize

    769KB

    MD5

    e9c35fad007c9abb695cdf32a6ef8350

    SHA1

    d97cc8e389c68e9aff8d28d0691db3da4b56e93d

    SHA256

    a7e240048e51d605d4c92f47e4dae2c31558849be479794c2ee0761e240ef03d

    SHA512

    c6e80f476737b9d56d884438fe2045c3b42ce5e2ebc0833ec786f4c75df10934c67e0b194b79174e6588de14de2d651da5b788553ac3e7a619f3effc110c0ef7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3682092.exe

    Filesize

    585KB

    MD5

    eac44c7b9549f1b58cf25c60ee304435

    SHA1

    bf66fe6604311066fd2d8de1743af49c8f902edf

    SHA256

    7adab0943d097033395ba73d8760b3f523fd636a0bb13c8ac0dd37f0a63be91d

    SHA512

    c32120a4fbeb8b9bff77a9d5fb8f324752524fb8edd87387a28780c0e6eb0affad63a26860f682abac7835ddbcee4cdb9b67f2ecb3a22bdc57802509b5af5ade

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8000827.exe

    Filesize

    295KB

    MD5

    82c2b3a4497da45e69dce662504c47f7

    SHA1

    068c99cc9b40709f9967d393edd5a9e56b269015

    SHA256

    cc13fa7cc073a8810513c3fc4bea322132f6c659785cc68a6d11368fe4b11e7d

    SHA512

    b99991a938c78a90830c08285e98a552c5e0f7eb7717c1a2d4f89f4553bc452944b8b0bf91ad3b930fd9b2c21422fad73b975779c8a7e7a6932b6100fc13e55b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8276002.exe

    Filesize

    492KB

    MD5

    6d30780150b36e2b9c70bcf294a2fba7

    SHA1

    60555be1736e34f14a4fb14aa8f1196d982dd29f

    SHA256

    fcf9145080af193ac72b17a81c9a76688e37ebd172c6b47e39a4ecd1aedd17fd

    SHA512

    2dc7a5f53794b4c548861f10fad1f0d79e7485cb2bb4de388f3109f8b82d22d1b87456d2e4f9d19d356180fc8cbebb74d3cd696059bd0c1c60284e45895cc58c

  • memory/3748-45-0x0000000005020000-0x0000000005638000-memory.dmp

    Filesize

    6.1MB

  • memory/3748-35-0x0000000002000000-0x000000000208C000-memory.dmp

    Filesize

    560KB

  • memory/3748-42-0x0000000002000000-0x000000000208C000-memory.dmp

    Filesize

    560KB

  • memory/3748-44-0x0000000004460000-0x0000000004466000-memory.dmp

    Filesize

    24KB

  • memory/3748-46-0x0000000004A90000-0x0000000004B9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3748-47-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

    Filesize

    72KB

  • memory/3748-48-0x0000000004BE0000-0x0000000004C1C000-memory.dmp

    Filesize

    240KB

  • memory/3748-49-0x0000000004C50000-0x0000000004C9C000-memory.dmp

    Filesize

    304KB

  • memory/4176-29-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/4176-28-0x0000000000560000-0x000000000059E000-memory.dmp

    Filesize

    248KB

  • memory/4176-22-0x0000000000560000-0x000000000059E000-memory.dmp

    Filesize

    248KB

  • memory/4176-21-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.