Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2023 11:58

General

  • Target

    82abf5983336966ea06c69ad67db31627181daeecb6a288461374e28789a8831.exe

  • Size

    529KB

  • MD5

    50a4843e72e82cda9ae8dac56e2c9f47

  • SHA1

    6d8ec2ab5c1e2dd828cd6e6d27f20b8990c33303

  • SHA256

    82abf5983336966ea06c69ad67db31627181daeecb6a288461374e28789a8831

  • SHA512

    587b65c7f8b46980203010149f6a5e0cbcd428bbcea6c4d0db04efca7e85e48733258e4f50bfdba8e3b8f610b2bf1eedbc74847ba59e523018c9793e9ba8a884

  • SSDEEP

    6144:wGOgQopxfvqCAFbmaklCdnQgMiSv/W2zZqqSt7aH+AlXxKl6r2OylILoiFPaORCf:wGOgBfvNaRdnQgFAz2helMQKOyj0RCf

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82abf5983336966ea06c69ad67db31627181daeecb6a288461374e28789a8831.exe
    "C:\Users\Admin\AppData\Local\Temp\82abf5983336966ea06c69ad67db31627181daeecb6a288461374e28789a8831.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0071781.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0071781.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6262234.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6262234.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2487181.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2487181.exe
        3⤵
        • Executes dropped EXE
        PID:3964
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1668
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0071781.exe

    Filesize

    261KB

    MD5

    dc67b03cc3fbfd7d50ddd1dc71a4325b

    SHA1

    44c125b504f9b3d89349a3c6e9b286db119b233e

    SHA256

    7b3a0ebfe5b88f226b68727b7fbee798c013bc8338d536eaa0645e9811eb8477

    SHA512

    5d6d042aab91222baae0b24022046251d60510840af3e6e2fff55702395600d9c6c930a5c847416f99166262730c7fbbe6ae1df4666d1e3241fbdc054b220e51

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0071781.exe

    Filesize

    261KB

    MD5

    dc67b03cc3fbfd7d50ddd1dc71a4325b

    SHA1

    44c125b504f9b3d89349a3c6e9b286db119b233e

    SHA256

    7b3a0ebfe5b88f226b68727b7fbee798c013bc8338d536eaa0645e9811eb8477

    SHA512

    5d6d042aab91222baae0b24022046251d60510840af3e6e2fff55702395600d9c6c930a5c847416f99166262730c7fbbe6ae1df4666d1e3241fbdc054b220e51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6262234.exe

    Filesize

    96KB

    MD5

    498dcb6fe2212a6faaaa959097a9472e

    SHA1

    ce1ed37bd51f4e4e95bff519001d91a524894397

    SHA256

    424e1f3a46e3a9255e6343c83800996bc2da272a3fe750cfda003ac14f1aea9b

    SHA512

    e934b7213295d6a392959204fab49b8bfa4e23142a0e870469c18ffaa4a8096790d8d4911f3de7ff7d1704fd24167de59bd6d008c5946eb89e4682b20d96855b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6262234.exe

    Filesize

    96KB

    MD5

    498dcb6fe2212a6faaaa959097a9472e

    SHA1

    ce1ed37bd51f4e4e95bff519001d91a524894397

    SHA256

    424e1f3a46e3a9255e6343c83800996bc2da272a3fe750cfda003ac14f1aea9b

    SHA512

    e934b7213295d6a392959204fab49b8bfa4e23142a0e870469c18ffaa4a8096790d8d4911f3de7ff7d1704fd24167de59bd6d008c5946eb89e4682b20d96855b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2487181.exe

    Filesize

    257KB

    MD5

    16aeff5ae8a94502fb9db8463d2c8ccb

    SHA1

    83e3c8e24f440910e608936c263609b938e87e19

    SHA256

    3b4b3927505fce182c84c7887ed224f430d2b40f171ddfa0fbd541c56e760aec

    SHA512

    b6bbde3fb34a80066ee2dca2a45a05ef8d79b66db21958310b91bab1e57d7aa603d6e2b50eaf09408e91813013514d38760cd059d8181895617a103330f22909

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2487181.exe

    Filesize

    257KB

    MD5

    16aeff5ae8a94502fb9db8463d2c8ccb

    SHA1

    83e3c8e24f440910e608936c263609b938e87e19

    SHA256

    3b4b3927505fce182c84c7887ed224f430d2b40f171ddfa0fbd541c56e760aec

    SHA512

    b6bbde3fb34a80066ee2dca2a45a05ef8d79b66db21958310b91bab1e57d7aa603d6e2b50eaf09408e91813013514d38760cd059d8181895617a103330f22909

  • memory/3440-155-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3440-167-0x0000000074560000-0x0000000074D10000-memory.dmp

    Filesize

    7.7MB

  • memory/3440-170-0x0000000074560000-0x0000000074D10000-memory.dmp

    Filesize

    7.7MB

  • memory/3440-156-0x0000000000470000-0x000000000047A000-memory.dmp

    Filesize

    40KB

  • memory/3440-166-0x0000000074560000-0x0000000074D10000-memory.dmp

    Filesize

    7.7MB

  • memory/3692-134-0x00000000007A0000-0x0000000000814000-memory.dmp

    Filesize

    464KB

  • memory/3692-133-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/3964-180-0x0000000074560000-0x0000000074D10000-memory.dmp

    Filesize

    7.7MB

  • memory/3964-175-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3964-174-0x0000000000550000-0x0000000000580000-memory.dmp

    Filesize

    192KB

  • memory/3964-181-0x00000000052B0000-0x00000000058C8000-memory.dmp

    Filesize

    6.1MB

  • memory/3964-182-0x0000000004C90000-0x0000000004D9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3964-184-0x0000000004B30000-0x0000000004B42000-memory.dmp

    Filesize

    72KB

  • memory/3964-183-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/3964-185-0x0000000004DA0000-0x0000000004DDC000-memory.dmp

    Filesize

    240KB

  • memory/3964-186-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3964-187-0x0000000074560000-0x0000000074D10000-memory.dmp

    Filesize

    7.7MB

  • memory/3964-188-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB