Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 13:16 UTC

General

  • Target

    eab14d8dada2d5205db79e415c61561de2646a3a67f4615bfffa2f0c272f8738.exe

  • Size

    479KB

  • MD5

    2cb6553c9840b3d0b75e3cb6dfceabdb

  • SHA1

    b795b91e6e19782f031fbdae21de93ea2b7be2be

  • SHA256

    eab14d8dada2d5205db79e415c61561de2646a3a67f4615bfffa2f0c272f8738

  • SHA512

    3025a44d0ebb216787f8c39833aa68450592891f7d861a8e010c2f537ea7190192572c0a8a61591f1f889401dcc07ebf4a1b027c692438826b8097907aac9314

  • SSDEEP

    12288:7MrLy90YhqS1jB9dQopQaVuKga3WM3s0l5f+nf:Iy9UUldMJaCQmf

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eab14d8dada2d5205db79e415c61561de2646a3a67f4615bfffa2f0c272f8738.exe
    "C:\Users\Admin\AppData\Local\Temp\eab14d8dada2d5205db79e415c61561de2646a3a67f4615bfffa2f0c272f8738.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8516316.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8516316.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2001440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2001440.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7564883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7564883.exe
        3⤵
        • Executes dropped EXE
        PID:4292

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    134.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.dual-a-0034.a-msedge.net
    g-bing-com.dual-a-0034.a-msedge.net
    IN CNAME
    dual-a-0034.a-msedge.net
    dual-a-0034.a-msedge.net
    IN A
    204.79.197.237
    dual-a-0034.a-msedge.net
    IN A
    13.107.21.237
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=3C1F54C0D857618430A040BBD9706082; domain=.bing.com; expires=Wed, 04-Jun-2025 13:17:05 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 570F11B6748142CAA2D9AA98F01D680C Ref B: LON04EDGE0612 Ref C: 2024-05-10T13:17:05Z
    date: Fri, 10 May 2024 13:17:05 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=3C1F54C0D857618430A040BBD9706082
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=vGFu0Ga8WsVv6v_rK1Yhq3inFIhLsH5xWJktzaOOVzo; domain=.bing.com; expires=Wed, 04-Jun-2025 13:17:05 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 88B1FF704C4447EF8F84E5E746D808CA Ref B: LON04EDGE0612 Ref C: 2024-05-10T13:17:05Z
    date: Fri, 10 May 2024 13:17:05 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=3C1F54C0D857618430A040BBD9706082; MSPTC=vGFu0Ga8WsVv6v_rK1Yhq3inFIhLsH5xWJktzaOOVzo
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 130270BEF1144F57BD9383CF8673CB6C Ref B: LON04EDGE0612 Ref C: 2024-05-10T13:17:05Z
    date: Fri, 10 May 2024 13:17:05 GMT
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    237.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    237.197.79.204.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    79.190.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    79.190.18.2.in-addr.arpa
    IN PTR
    Response
    79.190.18.2.in-addr.arpa
    IN PTR
    a2-18-190-79deploystaticakamaitechnologiescom
  • flag-be
    GET
    https://www.bing.com/th?id=OADD2.10239381793954_1BHQ1BWFG78XLZOQQ&pid=21.2&c=16&roil=0.0049&roit=0&roir=0.9951&roib=1&w=24&h=24&dynsize=1&qlt=90
    Remote address:
    88.221.83.179:443
    Request
    GET /th?id=OADD2.10239381793954_1BHQ1BWFG78XLZOQQ&pid=21.2&c=16&roil=0.0049&roit=0&roir=0.9951&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
    host: www.bing.com
    accept: */*
    cookie: MUID=3C1F54C0D857618430A040BBD9706082; MSPTC=vGFu0Ga8WsVv6v_rK1Yhq3inFIhLsH5xWJktzaOOVzo
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-type: image/png
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QWthbWFp
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    content-length: 1299
    date: Fri, 10 May 2024 13:17:06 GMT
    alt-svc: h3=":443"; ma=93600
    x-cdn-traceid: 0.af53dd58.1715347026.24c4fd8d
  • flag-us
    DNS
    179.83.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    179.83.221.88.in-addr.arpa
    IN PTR
    Response
    179.83.221.88.in-addr.arpa
    IN PTR
    a88-221-83-179deploystaticakamaitechnologiescom
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    139.53.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    139.53.16.96.in-addr.arpa
    IN PTR
    Response
    139.53.16.96.in-addr.arpa
    IN PTR
    a96-16-53-139deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.204.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.204.248.87.in-addr.arpa
    IN PTR
    Response
    0.204.248.87.in-addr.arpa
    IN PTR
    https-87-248-204-0lhrllnwnet
  • 204.79.197.237:443
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=
    tls, http2
    2.0kB
    9.2kB
    21
    19

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=66812a0d405c48b8b66c23220773798d&localId=w:F7A0D56A-F9D0-CE0C-24BD-E32EA7746E44&deviceId=6825829383594079&anid=

    HTTP Response

    204
  • 88.221.83.179:443
    https://www.bing.com/th?id=OADD2.10239381793954_1BHQ1BWFG78XLZOQQ&pid=21.2&c=16&roil=0.0049&roit=0&roir=0.9951&roib=1&w=24&h=24&dynsize=1&qlt=90
    tls, http2
    1.5kB
    6.6kB
    16
    12

    HTTP Request

    GET https://www.bing.com/th?id=OADD2.10239381793954_1BHQ1BWFG78XLZOQQ&pid=21.2&c=16&roil=0.0049&roit=0&roir=0.9951&roib=1&w=24&h=24&dynsize=1&qlt=90

    HTTP Response

    200
  • 217.196.96.101:4132
    l7564883.exe
    260 B
    5
  • 217.196.96.101:4132
    l7564883.exe
    260 B
    5
  • 217.196.96.101:4132
    l7564883.exe
    260 B
    5
  • 217.196.96.101:4132
    l7564883.exe
    260 B
    5
  • 217.196.96.101:4132
    l7564883.exe
    260 B
    5
  • 217.196.96.101:4132
    l7564883.exe
    208 B
    4
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    134.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    134.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    151 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    204.79.197.237
    13.107.21.237

  • 8.8.8.8:53
    88.156.103.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    88.156.103.20.in-addr.arpa

  • 8.8.8.8:53
    237.197.79.204.in-addr.arpa
    dns
    73 B
    143 B
    1
    1

    DNS Request

    237.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    79.190.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    79.190.18.2.in-addr.arpa

  • 8.8.8.8:53
    179.83.221.88.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    179.83.221.88.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    139.53.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    139.53.16.96.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    0.204.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    0.204.248.87.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8516316.exe

    Filesize

    307KB

    MD5

    216c883d69e5b676dadcbbc3c49b2ea7

    SHA1

    bd25ba694b75cfc5c747073abbe9344001c05d48

    SHA256

    cd05c707896cf6721f13c5f314b2a73e413a8bc42acd0b01164a2d36426728c7

    SHA512

    b3b74dea447966ffde82d33e7ae96df894e8145a431eb795af1d882358814ceafc2b22406a522c114a6abcd9b43f2ee166f6c492ed1194aab257b314c3bb5120

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2001440.exe

    Filesize

    180KB

    MD5

    769430943362861334421dba770826e7

    SHA1

    f4452cae4df613a4a7cb22da4ff12a671e0debb4

    SHA256

    9eb85dd00a91711de4dbcb01f144368839954d6ec1bdc80bf3df63123b55089d

    SHA512

    a33420ec4fdda34810b86899b12d38449a85af6b46ac88d630b71bd92f5e9f74fad13b0f51d948bbd3de43d060632af5b81deffb692a5e3e4e6a327614434741

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7564883.exe

    Filesize

    168KB

    MD5

    c89a4c50b55d8b6f3a41d465a1aec944

    SHA1

    5ffbb28b771af6bc8f9f327294605c4bb4edfa65

    SHA256

    b1266f818eaf91dfe5c7aa2deaf6a428374e2bee21deffb52a3b1c22a49b8759

    SHA512

    29d7856defe832254a4e0f5d90ada57090bb9f960a8d53deb49273702e3eee04bfe25ac7c0ea1367a76687a1061e16302dcb6147bed30acec4901a2c83418d12

  • memory/3384-31-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-48-0x0000000073FE0000-0x0000000074790000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-17-0x0000000004AC0000-0x0000000005064000-memory.dmp

    Filesize

    5.6MB

  • memory/3384-16-0x0000000073FE0000-0x0000000074790000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-19-0x0000000073FE0000-0x0000000074790000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-47-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-45-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-43-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-41-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-39-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-37-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-35-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-33-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-15-0x00000000048D0000-0x00000000048EA000-memory.dmp

    Filesize

    104KB

  • memory/3384-18-0x0000000004980000-0x0000000004998000-memory.dmp

    Filesize

    96KB

  • memory/3384-29-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-14-0x0000000073FEE000-0x0000000073FEF000-memory.dmp

    Filesize

    4KB

  • memory/3384-23-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-21-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-20-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-27-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/3384-50-0x0000000073FE0000-0x0000000074790000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-25-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/4292-54-0x0000000000760000-0x0000000000790000-memory.dmp

    Filesize

    192KB

  • memory/4292-55-0x00000000028F0000-0x00000000028F6000-memory.dmp

    Filesize

    24KB

  • memory/4292-56-0x00000000057B0000-0x0000000005DC8000-memory.dmp

    Filesize

    6.1MB

  • memory/4292-57-0x00000000052A0000-0x00000000053AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4292-58-0x00000000050E0000-0x00000000050F2000-memory.dmp

    Filesize

    72KB

  • memory/4292-59-0x0000000005100000-0x000000000513C000-memory.dmp

    Filesize

    240KB

  • memory/4292-60-0x0000000005190000-0x00000000051DC000-memory.dmp

    Filesize

    304KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.