Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 05:06

General

  • Target

    f6775e5e6deca19a1376b8b836b311bf617510c03d8b7a445aaf4baa40cdc921.exe

  • Size

    405KB

  • MD5

    756ec9639560877b05d38200f8113aa1

  • SHA1

    974df5e1651bbade6ad098a6324f110dcb5e46d2

  • SHA256

    f6775e5e6deca19a1376b8b836b311bf617510c03d8b7a445aaf4baa40cdc921

  • SHA512

    29f40ee376ae5da4393b423e4e9be97a5981228977c85251ffc9d27fde5001e84eee69d96f958bb74044e50ab5ac3b4ce6880453468c91a62ee7a14be9d8472c

  • SSDEEP

    6144:LTp0yN90QEnPxISofj/lBmNmfiBMpqzxycY9B/ZrMCFu5vleo4B:yy90B/A/u5BMpAxFIvre5vsb

Malware Config

Extracted

Family

redline

Botnet

maxbi

C2

185.161.248.73:4164

Attributes
  • auth_value

    6aa7dba884fe45693dfa04c91440daef

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
  • Detects executables packed with ConfuserEx Mod 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6775e5e6deca19a1376b8b836b311bf617510c03d8b7a445aaf4baa40cdc921.exe
    "C:\Users\Admin\AppData\Local\Temp\f6775e5e6deca19a1376b8b836b311bf617510c03d8b7a445aaf4baa40cdc921.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a84811875.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a84811875.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4604
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 1108
        3⤵
        • Program crash
        PID:3196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b86367601.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b86367601.exe
      2⤵
      • Executes dropped EXE
      PID:3252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4604 -ip 4604
    1⤵
      PID:3564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a84811875.exe

      Filesize

      345KB

      MD5

      e462e69c88ca29b59c2eebd18dcf7a32

      SHA1

      ee746c6116c176bc9c6e84834ea65fc5fab252bb

      SHA256

      2d9ccdcea2ecd19f4678c12182cf60ba5fb991fc5b86020a5475c2caff35fd0f

      SHA512

      1eaa3db2617f4ef1666cd89a7ffd8ce0c277293777fe1b060da81b6e4b5cfb977ad536cceb15814beab27107e32402f80f472b81865ec1919f7cebcdb9e98468

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b86367601.exe

      Filesize

      168KB

      MD5

      27d92e11c75ef56a81ec9e9631b5051d

      SHA1

      597af94b9843a3de549d38d44b605a78d55d24cb

      SHA256

      74c4d7a954efd3bfc8777102ca113f0ac90e9285f54c8d3a0446dbedbdee0ba1

      SHA512

      0e361caeedea84c948af4f43f91a932e300d01ad4d4e9aa97f6d4fd49df62e4f92eb9faa3ab609bf3cdd15d760e699e994ecc1ec64a7ae2b9d0e3afc85de2368

    • memory/3252-58-0x0000000004E50000-0x0000000004E9C000-memory.dmp

      Filesize

      304KB

    • memory/3252-59-0x00000000742CE000-0x00000000742CF000-memory.dmp

      Filesize

      4KB

    • memory/3252-57-0x00000000742C0000-0x0000000074A70000-memory.dmp

      Filesize

      7.7MB

    • memory/3252-56-0x000000000AA70000-0x000000000AAAC000-memory.dmp

      Filesize

      240KB

    • memory/3252-55-0x000000000AA10000-0x000000000AA22000-memory.dmp

      Filesize

      72KB

    • memory/3252-54-0x000000000AAE0000-0x000000000ABEA000-memory.dmp

      Filesize

      1.0MB

    • memory/3252-53-0x000000000AFA0000-0x000000000B5B8000-memory.dmp

      Filesize

      6.1MB

    • memory/3252-60-0x00000000742C0000-0x0000000074A70000-memory.dmp

      Filesize

      7.7MB

    • memory/3252-52-0x0000000001530000-0x0000000001536000-memory.dmp

      Filesize

      24KB

    • memory/3252-51-0x0000000000C70000-0x0000000000CA0000-memory.dmp

      Filesize

      192KB

    • memory/3252-50-0x00000000742CE000-0x00000000742CF000-memory.dmp

      Filesize

      4KB

    • memory/4604-42-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-45-0x0000000000400000-0x0000000000A67000-memory.dmp

      Filesize

      6.4MB

    • memory/4604-30-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-29-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-26-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-24-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-22-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-20-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-18-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-16-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-46-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4604-32-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-34-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-36-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-38-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-40-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-15-0x0000000002AA0000-0x0000000002AB2000-memory.dmp

      Filesize

      72KB

    • memory/4604-14-0x0000000002AA0000-0x0000000002AB8000-memory.dmp

      Filesize

      96KB

    • memory/4604-13-0x0000000005220000-0x00000000057C4000-memory.dmp

      Filesize

      5.6MB

    • memory/4604-12-0x0000000002940000-0x000000000295A000-memory.dmp

      Filesize

      104KB

    • memory/4604-11-0x0000000000400000-0x0000000000A67000-memory.dmp

      Filesize

      6.4MB

    • memory/4604-9-0x0000000000D80000-0x0000000000DAD000-memory.dmp

      Filesize

      180KB

    • memory/4604-10-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4604-8-0x0000000000DD0000-0x0000000000ED0000-memory.dmp

      Filesize

      1024KB