Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 02:14

General

  • Target

    e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe

  • Size

    658KB

  • MD5

    ed79ba4dae9cb40c1bca1a39d620ebea

  • SHA1

    bd4cf643c78b7c15ed434952d452fca2ba860423

  • SHA256

    e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74

  • SHA512

    3a6a375657f6192c8d13ba7ef489c4a0cedcbcccad630c0a7e014ce47408cf1fb2729950d28c7cec14fbf2965c7099d264a50c76cc2b281f5908741b8b620386

  • SSDEEP

    12288:CMrMy90zKgDs4A2ZC9QgUD/49FFaVaL/jeG8Xkt9KO1Fnv82DhPd9mv9CNFna:WyJ43Kai/lDjVA2d1k9T

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Signatures

  • Detects Healer an antivirus disabler dropper 18 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe
    "C:\Users\Admin\AppData\Local\Temp\e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycvS93xA90.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycvS93xA90.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBJ01ko67.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBJ01ko67.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1084
          4⤵
          • Program crash
          PID:4260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzh96bG51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzh96bG51.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2588 -ip 2588
    1⤵
      PID:2692
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2588,i,14229658658073991926,6938034815163866135,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1720

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycvS93xA90.exe

        Filesize

        514KB

        MD5

        0ec485aa3ad4357584fd393882e1f018

        SHA1

        9708200908d8e85790a15551143804d8752dbbb9

        SHA256

        c60993ea779c5938270da01c3ca36d639c2219056312040aa04b5db4029b107d

        SHA512

        884ad03401fb3b469cb3e679497b47cda6fdb2c70a92e34b691738fd7107650beb8aae7b066d099e5c8b700772a32fc1847916a9c59e2626b58c9183b5b7ebd5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBJ01ko67.exe

        Filesize

        232KB

        MD5

        2e26dba8fb0f0a5e89760ad7ed6912fe

        SHA1

        b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4

        SHA256

        63cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f

        SHA512

        527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzh96bG51.exe

        Filesize

        290KB

        MD5

        0dcb6db316be04c378daade20a9aa75c

        SHA1

        a283f1bdbd0ba99857ad42799b6cf07d9520aac3

        SHA256

        ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6

        SHA512

        c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6

      • memory/1944-87-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-91-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-986-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-985-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-64-0x0000000005140000-0x0000000005184000-memory.dmp

        Filesize

        272KB

      • memory/1944-983-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-63-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-979-0x0000000005C80000-0x0000000005CCC000-memory.dmp

        Filesize

        304KB

      • memory/1944-978-0x0000000005B40000-0x0000000005B7C000-memory.dmp

        Filesize

        240KB

      • memory/1944-976-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

        Filesize

        72KB

      • memory/1944-60-0x0000000004AD0000-0x0000000004B16000-memory.dmp

        Filesize

        280KB

      • memory/1944-977-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-975-0x00000000059A0000-0x0000000005AAA000-memory.dmp

        Filesize

        1.0MB

      • memory/1944-974-0x0000000005300000-0x0000000005918000-memory.dmp

        Filesize

        6.1MB

      • memory/1944-101-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-99-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-97-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-95-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-93-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-89-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-85-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-83-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-81-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-79-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-77-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-75-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-59-0x0000000000590000-0x0000000000690000-memory.dmp

        Filesize

        1024KB

      • memory/1944-62-0x0000000000400000-0x000000000058C000-memory.dmp

        Filesize

        1.5MB

      • memory/1944-61-0x0000000000780000-0x00000000007CB000-memory.dmp

        Filesize

        300KB

      • memory/1944-65-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-984-0x00000000747D0000-0x0000000074F80000-memory.dmp

        Filesize

        7.7MB

      • memory/1944-981-0x0000000000590000-0x0000000000690000-memory.dmp

        Filesize

        1024KB

      • memory/1944-73-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-67-0x00000000747D0000-0x0000000074F80000-memory.dmp

        Filesize

        7.7MB

      • memory/1944-69-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-68-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-66-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1944-71-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/2588-19-0x00000000747D0000-0x0000000074F80000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-54-0x00000000747D0000-0x0000000074F80000-memory.dmp

        Filesize

        7.7MB

      • memory/2588-23-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-38-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-51-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/2588-50-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-48-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-15-0x0000000000900000-0x0000000000A00000-memory.dmp

        Filesize

        1024KB

      • memory/2588-46-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-17-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/2588-44-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-16-0x0000000000650000-0x000000000067D000-memory.dmp

        Filesize

        180KB

      • memory/2588-40-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-42-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-53-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/2588-30-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-34-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-32-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-26-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-24-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-36-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB

      • memory/2588-22-0x00000000022E0000-0x00000000022F8000-memory.dmp

        Filesize

        96KB

      • memory/2588-21-0x0000000004C10000-0x00000000051B4000-memory.dmp

        Filesize

        5.6MB

      • memory/2588-20-0x0000000000890000-0x00000000008A0000-memory.dmp

        Filesize

        64KB

      • memory/2588-18-0x00000000008B0000-0x00000000008CA000-memory.dmp

        Filesize

        104KB

      • memory/2588-28-0x00000000022E0000-0x00000000022F2000-memory.dmp

        Filesize

        72KB