Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:01

General

  • Target

    3303790f7ca29df0e39764e876baec5513b2ca1cc3ffeed56f9fc006a9eaec90.exe

  • Size

    493KB

  • MD5

    eae83c8fc8b81895b7ac50e11704d42f

  • SHA1

    89739814fbd5a39670511e0e77c7d84087a470e7

  • SHA256

    3303790f7ca29df0e39764e876baec5513b2ca1cc3ffeed56f9fc006a9eaec90

  • SHA512

    b2b7f4247624a031f4d41ab4b30081c312c56b8fd06d5d8a43fb5a2f62951ef12032e46ff379111e65831d61965be372d93e6528dfbde35b05ed718ed2857115

  • SSDEEP

    12288:mMryy90YqoqNqfSJX4/KlfAgmlP8/ADHSB87:oy6oKZo/KlE84TSi7

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3303790f7ca29df0e39764e876baec5513b2ca1cc3ffeed56f9fc006a9eaec90.exe
    "C:\Users\Admin\AppData\Local\Temp\3303790f7ca29df0e39764e876baec5513b2ca1cc3ffeed56f9fc006a9eaec90.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1441365.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1441365.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8945823.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8945823.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0126443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0126443.exe
        3⤵
        • Executes dropped EXE
        PID:4904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1441365.exe

    Filesize

    327KB

    MD5

    3094733c69a42b05d0a268467d278a61

    SHA1

    41f8eeb8f897e8fa3a442c7c11c7ba9c6942057d

    SHA256

    7f96253c4c815e2b77c52f73df3573e9eca4909f6d25f22c6cda06df021e163e

    SHA512

    3fcf2470fd9f6f49d6658ee44e0cddfc28de06e1c1189e81645f181858011321c5c6c20fa8c3ca7005218a075154666145d008dfa597ad92ea24de60ddd3a31e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8945823.exe

    Filesize

    256KB

    MD5

    bc122fc8daf95c755c0b72e8b79fc599

    SHA1

    35f1be653cd835ffc70c1c38d52a6d463a454f06

    SHA256

    158842a417f6307cc9000441bd46e70101a41a659912a4ee0b79bd0a956add90

    SHA512

    5614786d8b13f0994c2fcc81798c3f0f9760bcc860b3ffc6c1305e1340e444c321b47d21d0eabbe6a2b2567e320393c487a0dc6d5028daa4e7c27a08d974d8e5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i0126443.exe

    Filesize

    175KB

    MD5

    6b9feb5366b287a8515b013304c79304

    SHA1

    54aae2325f87d2c6aff85ebc84de3ca183225474

    SHA256

    2905f98a6dffb16d0501c9e06bf63fa3bffbd97cb5e9be2e7425ad993f027c0d

    SHA512

    f391896eb5389339186b81e4a985a14c692d90f89567a83292abb955839ba93fe594c5685dfdd056a3f2032411060f1dd7c06ed35baae96fb7f1c0d44318e809

  • memory/4900-14-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4900-18-0x0000000073F3E000-0x0000000073F3F000-memory.dmp

    Filesize

    4KB

  • memory/4904-19-0x0000000000AA0000-0x0000000000AD0000-memory.dmp

    Filesize

    192KB

  • memory/4904-20-0x0000000002D90000-0x0000000002D96000-memory.dmp

    Filesize

    24KB

  • memory/4904-21-0x0000000005AB0000-0x00000000060C8000-memory.dmp

    Filesize

    6.1MB

  • memory/4904-22-0x00000000055A0000-0x00000000056AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4904-23-0x0000000005420000-0x0000000005432000-memory.dmp

    Filesize

    72KB

  • memory/4904-24-0x0000000005490000-0x00000000054CC000-memory.dmp

    Filesize

    240KB

  • memory/4904-25-0x00000000054D0000-0x000000000551C000-memory.dmp

    Filesize

    304KB