Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:15

General

  • Target

    1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe

  • Size

    307KB

  • MD5

    406420c14aa174852320d385d123709e

  • SHA1

    7d024d2fa2371bafadc17f0f0b6f99e27066f96a

  • SHA256

    1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5

  • SHA512

    854da09f5d7affd56b0053dee765ae569ddb42cdbb80b5290bf1671630b9e0e938b04e5a26c04ba9cd7f4721918eaa487858497bdd241417d92339b6a938a859

  • SSDEEP

    6144:KPy+bnr+rp0yN90QEg5F5OYc1u31g4TByzpGJqadn6ffBCe:BMrDy90Gxc1u31TTEN0Z56f8e

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe
    "C:\Users\Admin\AppData\Local\Temp\1d089addfe2c948a1a6c3e3f250f79ed616a211060d99b5efec78c1eb1b2b0b5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k7524738.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k7524738.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exe
      2⤵
      • Executes dropped EXE
      PID:2920
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k7524738.exe

    Filesize

    180KB

    MD5

    9dc0807b30c631ad82b81ba142523486

    SHA1

    1abbe8774d500395400fd74965a6613fb8c160e1

    SHA256

    16e9b0845926d775d75d6f8090b0de172e527cd99fe864ce5f8ed5844b47c0ec

    SHA512

    77f28af63b0eb0fb734972d1dc3ac9490602bbad42f214a42542fcc6fbc93148ff81ea92a2c61d1bbdc099ed12cf5dc287c1b66c7cf575ecbab82b972dc1cb3c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l6214693.exe

    Filesize

    168KB

    MD5

    68d7c4353d6992f4549ec4f6796dea6b

    SHA1

    134bffa471475a5b69a1abf3eea257f4076bd410

    SHA256

    98448fa312818534ead0262898b26bb51e4c6c6331d5a3044cd96142774ae697

    SHA512

    c2bbc566aed57c93a2a7d5edc9bec915225e5bd6695d9d953a66f839d01a1c3a7a0825ea2866157d4ba9b0bb2bae0b86599a5e1d55352efb1b29d6e5092e276f

  • memory/2920-56-0x0000000074790000-0x000000007483B000-memory.dmp

    Filesize

    684KB

  • memory/2920-55-0x00000000053D0000-0x000000000541C000-memory.dmp

    Filesize

    304KB

  • memory/2920-54-0x0000000005250000-0x000000000528C000-memory.dmp

    Filesize

    240KB

  • memory/2920-53-0x0000000074790000-0x000000007483B000-memory.dmp

    Filesize

    684KB

  • memory/2920-52-0x00000000051F0000-0x0000000005202000-memory.dmp

    Filesize

    72KB

  • memory/2920-51-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2920-50-0x00000000057C0000-0x0000000005DD8000-memory.dmp

    Filesize

    6.1MB

  • memory/2920-47-0x0000000000730000-0x0000000000760000-memory.dmp

    Filesize

    192KB

  • memory/2920-48-0x0000000074790000-0x000000007483B000-memory.dmp

    Filesize

    684KB

  • memory/2920-49-0x0000000002A80000-0x0000000002A86000-memory.dmp

    Filesize

    24KB

  • memory/4656-40-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-43-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4656-28-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-26-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-25-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-20-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-18-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-16-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-14-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-13-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-41-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4656-30-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-32-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-34-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-37-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-38-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-22-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/4656-12-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4656-11-0x0000000004F60000-0x0000000004F78000-memory.dmp

    Filesize

    96KB

  • memory/4656-10-0x0000000004970000-0x0000000004F14000-memory.dmp

    Filesize

    5.6MB

  • memory/4656-9-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4656-8-0x00000000021B0000-0x00000000021CA000-memory.dmp

    Filesize

    104KB

  • memory/4656-7-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB