Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:50

General

  • Target

    576cad65a899197ae35e757e578a7c10c29e57c266d1fa4931c6f98f3d2e3a60.exe

  • Size

    309KB

  • MD5

    d3bf3e3b405c7e061c537049b66ab8bf

  • SHA1

    95c95f994c58ed18058aed197472e2847ccd6e91

  • SHA256

    576cad65a899197ae35e757e578a7c10c29e57c266d1fa4931c6f98f3d2e3a60

  • SHA512

    9d2cc83a1a32c3b6195373ebb251f972bb6635d8b891fe29fb3b7fcce1a7d2bc821c76d39e00f5be6d235186afa005e53a9a502474ecb7d0275e62162e297ed0

  • SSDEEP

    6144:KAy+bnr+wp0yN90QEj5F5OYc1u31g4TByCkUMPHSage8pG3zd2:cMrUy90Hxc1u31TTEC3Dp0J2

Malware Config

Extracted

Family

redline

Botnet

mihan

C2

217.196.96.101:4132

Attributes
  • auth_value

    9a6a8fdae02ed7caa0a49a6ddc6d4520

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\576cad65a899197ae35e757e578a7c10c29e57c266d1fa4931c6f98f3d2e3a60.exe
    "C:\Users\Admin\AppData\Local\Temp\576cad65a899197ae35e757e578a7c10c29e57c266d1fa4931c6f98f3d2e3a60.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3928323.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3928323.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b7094394.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b7094394.exe
      2⤵
      • Executes dropped EXE
      PID:4252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a3928323.exe

    Filesize

    180KB

    MD5

    66310996924ff3faf6852903ec211230

    SHA1

    35da5f541ab09fadc45f2ac473d0d714fb6d5619

    SHA256

    6e9c9e04c5a3385cc6c6b9fa0398806afb8344eef4a2fe5791d93c266f064a55

    SHA512

    f0ce584918afbf54b189dbf4f2d2c3e7829a156cef4abb2cf9a6f03d069878c21810c04b4237e7ae3dcc0f60fe0f42d1c34bf2fd94be525e1064bdd1b31cf639

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b7094394.exe

    Filesize

    168KB

    MD5

    060c582081d851d96ae163d25e705387

    SHA1

    0542ab1728ecc64bc538aa06ec45fc05c194439a

    SHA256

    142fc06d3bada23fe1adab0ef1d1e198661389e57c8584c95f1d1c47c6124bc8

    SHA512

    2092ab0600ed83c7c1de62bbab52344e19a43ade981646accbe58810f69b45bdd73b1ae77f97fad31291ed63c333b12617e940a1e102b62f702988a1f94de5ac

  • memory/4204-31-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-15-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-10-0x0000000004B00000-0x00000000050A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4204-11-0x0000000004AC0000-0x0000000004AD8000-memory.dmp

    Filesize

    96KB

  • memory/4204-33-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-27-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-37-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-35-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-19-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-17-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-29-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-13-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-12-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-8-0x0000000004A00000-0x0000000004A1A000-memory.dmp

    Filesize

    104KB

  • memory/4204-9-0x0000000074370000-0x0000000074B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-40-0x0000000074370000-0x0000000074B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-25-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-23-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/4204-42-0x0000000074370000-0x0000000074B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4204-7-0x000000007437E000-0x000000007437F000-memory.dmp

    Filesize

    4KB

  • memory/4252-53-0x0000000005220000-0x000000000525C000-memory.dmp

    Filesize

    240KB

  • memory/4252-47-0x0000000074320000-0x00000000743CB000-memory.dmp

    Filesize

    684KB

  • memory/4252-48-0x0000000005060000-0x0000000005066000-memory.dmp

    Filesize

    24KB

  • memory/4252-49-0x0000000005800000-0x0000000005E18000-memory.dmp

    Filesize

    6.1MB

  • memory/4252-50-0x00000000052F0000-0x00000000053FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4252-51-0x00000000050B0000-0x00000000050C2000-memory.dmp

    Filesize

    72KB

  • memory/4252-52-0x0000000074320000-0x00000000743CB000-memory.dmp

    Filesize

    684KB

  • memory/4252-46-0x0000000000840000-0x0000000000870000-memory.dmp

    Filesize

    192KB

  • memory/4252-54-0x0000000005270000-0x00000000052BC000-memory.dmp

    Filesize

    304KB

  • memory/4252-55-0x0000000074320000-0x00000000743CB000-memory.dmp

    Filesize

    684KB