Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:27

General

  • Target

    ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4.exe

  • Size

    389KB

  • MD5

    3acf2e92c0625f14957b8bba85a5a133

  • SHA1

    519645e11407ed3991cf6501314ea5d8cd4e7a64

  • SHA256

    ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4

  • SHA512

    e181da02b0e85eb7362d0528e5f2da52140b607e44c0f01bf5f772e80992c4fe396d1aaab512e1fb57f7cd54258488a8bd00386ab23b57b932c8d1259dc000b9

  • SSDEEP

    6144:K+y+bnr+lp0yN90QEUO/bqnT1boVBqmroo3FgmF32GBzHPIRUMjRDDQdf:uMrty907zqT0BtUqoAIRUMjRwdf

Malware Config

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4.exe
    "C:\Users\Admin\AppData\Local\Temp\ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8044384.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8044384.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5335402.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5335402.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275281.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275281.exe
        3⤵
        • Executes dropped EXE
        PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8044384.exe

    Filesize

    206KB

    MD5

    c8b9665121b73a485f79a2de1628661c

    SHA1

    bd0d783f55f37e8737343bb00b49ee8cf2fa0ba4

    SHA256

    40c4c723b4d0c89645ae299cab3530bc2ef9c57d9150449fe0c8c6aead004937

    SHA512

    9b5eed29972830c26142a8bbbe0dd7b850854dfaeb6c1d0b8e2597f874df5cea1737de4b52142527e6da33dc9f10275113c66b694faf153613929f28bd9d2862

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5335402.exe

    Filesize

    14KB

    MD5

    7cd0e92a3344c81e96123ea28d0acb91

    SHA1

    71c25bf1f5eb3e3f23ed2bde5ae76c853bcc16c2

    SHA256

    f4c25888b594f3e771c892db06734e7a18adc87a4dc9e2ab0488322307844584

    SHA512

    4965602e6ea39d53b3044432ac9ca2a58b8d556ffa5295bc75b065d8db6df21e6ef6578cc7bc47f2a239b067ae6226fc2fa8dc9315ca5b16cad6e842fd6c9cc2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5275281.exe

    Filesize

    174KB

    MD5

    88902ec73df2239eb1b5444e9faca32e

    SHA1

    708b48c5f20fb8929510495b969f77cf7f990061

    SHA256

    d68f96f7972e2a8c02ed03bf9cb5bdba900bb7dde262eeddc9a31cd30722f3bf

    SHA512

    b88c8e41ffd91482882d22569af4c86302e483ccc0cc0f1931080c126a1794a6e2183880a153107911c28526782faf1fb5f59efa4cf5d32eb1a9ec9125084fe6

  • memory/1920-20-0x0000000000DF0000-0x0000000000E20000-memory.dmp

    Filesize

    192KB

  • memory/1920-21-0x0000000003090000-0x0000000003096000-memory.dmp

    Filesize

    24KB

  • memory/1920-22-0x000000000B0E0000-0x000000000B6F8000-memory.dmp

    Filesize

    6.1MB

  • memory/1920-23-0x000000000AC60000-0x000000000AD6A000-memory.dmp

    Filesize

    1.0MB

  • memory/1920-24-0x000000000ABA0000-0x000000000ABB2000-memory.dmp

    Filesize

    72KB

  • memory/1920-25-0x000000000AC00000-0x000000000AC3C000-memory.dmp

    Filesize

    240KB

  • memory/1920-26-0x0000000003010000-0x000000000305C000-memory.dmp

    Filesize

    304KB

  • memory/3116-14-0x00007FFCB84A3000-0x00007FFCB84A5000-memory.dmp

    Filesize

    8KB

  • memory/3116-15-0x00000000006F0000-0x00000000006FA000-memory.dmp

    Filesize

    40KB