Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:35

General

  • Target

    f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe

  • Size

    864KB

  • MD5

    b256e9fc25625b83e43a74ea8307026d

  • SHA1

    8bddc4828acbc99bb6b144ed6c2ca8ea918f9345

  • SHA256

    f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc

  • SHA512

    60bf45c3636a766acbe9e0614ee3f88709259e6a81e65b08f107648c17e4ae73de0cbd737e8c03dcc02401e8ee3c403aa2216b31e68fb9c5ce1ab76e3624624d

  • SSDEEP

    12288:EMrry90/YoqPF09KlVJVkFpsJHw/zCZjnNHTSNKdiWBCDnz17X2dvVvtXIHsnzdR:/yMUnVDknWCzCjnHOjzN2d5t70yrNhV

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe
    "C:\Users\Admin\AppData\Local\Temp\f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2995566.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2995566.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2394512.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2394512.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3998756.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3998756.exe
        3⤵
        • Executes dropped EXE
        PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2995566.exe

    Filesize

    680KB

    MD5

    763ffc96f093a48d1fc0c96bb430a06a

    SHA1

    1ebc17b9213dc3475dc64fa67256b91ddbf4f9a1

    SHA256

    486fc046814c537646a21c9897140f030f3cf6dd0a016d19b9fa3feb231037ad

    SHA512

    e57b363ab339ec8b0bcf1943fb3a37b6715bbb65300b003d10ac6075f82a04bc2ad203bfbc773e30ced323d0abfe28ace879f22b96b63d2a7a8da86857a75313

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2394512.exe

    Filesize

    530KB

    MD5

    4245f21518f322eb9812ce7b73d93972

    SHA1

    3a3207e35f59b60d9eee6a1b33d23c7d9e9e064b

    SHA256

    bbad228a6fd76de67c9658d40ebba65d3bdef52dd6441f9a1390d4da5d7941a1

    SHA512

    1589c105a8595f0906c6ce0ac4ba4aaae8d6c4e9bdc80188d096cf750a577def4e5a478b978d602f7380eacad3f4c6436c322869b5bb1ba440db5ebe8e05585b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3998756.exe

    Filesize

    692KB

    MD5

    ea42acb4e53040846589dddae1fe1b28

    SHA1

    1e509386d256fc81e62f91e8a19c3e368ce9c973

    SHA256

    e4eea9a1c2e853b5974d2efc024264f1348b9788b96011c1f9917071dabef890

    SHA512

    57c88dca757deffd2893d1a2c8d3a128fdfe1f8f148754f94bb0e11a14642721efa724ca16407bc640f9198742ede27514e2541e4c89407a6c8e3f5a136ee22d

  • memory/4036-14-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/4036-15-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/4036-19-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4500-26-0x0000000000620000-0x0000000000650000-memory.dmp

    Filesize

    192KB

  • memory/4500-30-0x0000000004A60000-0x0000000004A66000-memory.dmp

    Filesize

    24KB

  • memory/4500-31-0x0000000005170000-0x0000000005788000-memory.dmp

    Filesize

    6.1MB

  • memory/4500-32-0x0000000004B50000-0x0000000004C5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4500-33-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

    Filesize

    72KB

  • memory/4500-34-0x0000000004B00000-0x0000000004B3C000-memory.dmp

    Filesize

    240KB

  • memory/4500-35-0x0000000004CC0000-0x0000000004D0C000-memory.dmp

    Filesize

    304KB