Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:53

General

  • Target

    7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe

  • Size

    492KB

  • MD5

    5b0a257bf59bde11e4608365566bbb14

  • SHA1

    6ad284fb11504b87efc4b1ea8c72eb851e2be77a

  • SHA256

    7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c

  • SHA512

    0b94bf361b4f07a6916422abc49b855e018fa42b84776a799088b92675d7a53cf9de89ea5fb015f1299b632e46f0709b841ab92435cb4b62d31f7284b8316c17

  • SSDEEP

    12288:1Mrey90jvd26ReJpsOSbey19hEYqyoCsYdf:TyyoXJpsOS9jz3d

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe
    "C:\Users\Admin\AppData\Local\Temp\7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6501903.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6501903.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8615066.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8615066.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i1214333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i1214333.exe
        3⤵
        • Executes dropped EXE
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6501903.exe

    Filesize

    327KB

    MD5

    7ea5b4265b407287098d3f4a494f4cb9

    SHA1

    4d997c012fbc2d75102cbb6620f912454394cc38

    SHA256

    cdee4309b1e0c9b31a359f43ff9c90fde77a296f226d192cf02ff2521cb23a23

    SHA512

    f2a9acec2b06d597c264c2006542c6b3d5d9343b02ebecaeeb22d290b13c63c00b68f8ca84bd7979a883541681c3b6f6672187a4b8be2855b8d49ff102364722

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8615066.exe

    Filesize

    256KB

    MD5

    7f5b9499c28566e998ebdd143ed9a75f

    SHA1

    40253744353abaf5b93d41cc0fc413e84198211d

    SHA256

    92346d7c9a0a998636236ca39e817b2ea243db7238e46460e24874253f38d252

    SHA512

    c09c51c2e92215113457378e425ee33dd55299962518a9048c47ffcf63978b013243057661d8b6dab3c175009e315a39c21856a07c05366e55df59ac1df9f5fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i1214333.exe

    Filesize

    175KB

    MD5

    7cfc6321b809d8e20cde8da04c874135

    SHA1

    47cd1b0ce899950eefef52ec3e4a935524db4bab

    SHA256

    e0d0ec547e74ac2a20a0861b3adfb277514299513119d851e30918718a37aa72

    SHA512

    059c008ffb00320c8b7f6fe71ae06c8c43f40f0d6397891e5bfedf0e96aebfa694745526ee2b6b00c9ec60b2da6991a54164e69311cd48692fcdc9783b81cb12

  • memory/2712-19-0x0000000000710000-0x0000000000740000-memory.dmp

    Filesize

    192KB

  • memory/2712-20-0x0000000004EF0000-0x0000000004EF6000-memory.dmp

    Filesize

    24KB

  • memory/2712-21-0x00000000056B0000-0x0000000005CC8000-memory.dmp

    Filesize

    6.1MB

  • memory/2712-22-0x00000000051A0000-0x00000000052AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-23-0x00000000050B0000-0x00000000050C2000-memory.dmp

    Filesize

    72KB

  • memory/2712-24-0x0000000005110000-0x000000000514C000-memory.dmp

    Filesize

    240KB

  • memory/2712-25-0x0000000005150000-0x000000000519C000-memory.dmp

    Filesize

    304KB

  • memory/4868-14-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4868-18-0x000000007429E000-0x000000007429F000-memory.dmp

    Filesize

    4KB