Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 14:32

General

  • Target

    ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe

  • Size

    307KB

  • MD5

    367ff3cd17fe97143cd8cb5f9e323046

  • SHA1

    0a213bcb8d4e658992d1e083b0b206ac3650ba69

  • SHA256

    ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50

  • SHA512

    9c2fd4077ecd277d91e83160a5c2a0a3bcc2c8774dda670dad8566a789fef7be158a87397cf2fa7360fda1916fac8331b61c55add4d4018ae2dfacbba6a32894

  • SSDEEP

    6144:KYy+bnr+gp0yN90QE85F5OYc1u31g4TByrF8wtc54DgJ:EMrsy90exc1u31TTETt/EJ

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe
    "C:\Users\Admin\AppData\Local\Temp\ff54e8ca62b5d37f515d9883b629f0761bba9e583cfd91abda232bc4e5b5cd50.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k1520744.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k1520744.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l4036908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l4036908.exe
      2⤵
      • Executes dropped EXE
      PID:5000
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k1520744.exe

    Filesize

    180KB

    MD5

    7ae5c9c884c8a206085a31b28559a56e

    SHA1

    62ee3946087638f78cb879cec7873e931c3ea386

    SHA256

    d78fc25515b72db855c730b5e4a5bd2db040c857f8921ddead622d646bd6c98e

    SHA512

    54270113c6f8671b4ccd236e096f673dd8d0ca10f61bb90b798288c1340812893bb6db49db40d9e204f864c60091446603f1e1e2e6e4eb5233615cee8c0847e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l4036908.exe

    Filesize

    168KB

    MD5

    faa7957999bc9ed6a221c8c19b9d09f0

    SHA1

    eef2368343aa03127958ec5a7cc507e469b5a028

    SHA256

    9bf4ace7974b14c0c0d4b9913f95ebcd3a4512c54dd4a04281af685ba1bdd895

    SHA512

    d9e747f865ecd24b5f95369cc5cc824a14cfbd827615331639c0d99ae512a2e18479c10e17f1368f4f96da741f4129e6bfd426f82f44346edd384d2bca5789c8

  • memory/1852-37-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-35-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-10-0x0000000004AF0000-0x0000000005094000-memory.dmp

    Filesize

    5.6MB

  • memory/1852-12-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-33-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-39-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-8-0x0000000002570000-0x000000000258A000-memory.dmp

    Filesize

    104KB

  • memory/1852-31-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-27-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-25-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-23-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-21-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-20-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-29-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-15-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-13-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-11-0x0000000004990000-0x00000000049A8000-memory.dmp

    Filesize

    96KB

  • memory/1852-9-0x0000000074680000-0x0000000074E30000-memory.dmp

    Filesize

    7.7MB

  • memory/1852-17-0x0000000004990000-0x00000000049A2000-memory.dmp

    Filesize

    72KB

  • memory/1852-40-0x0000000074680000-0x0000000074E30000-memory.dmp

    Filesize

    7.7MB

  • memory/1852-41-0x0000000074680000-0x0000000074E30000-memory.dmp

    Filesize

    7.7MB

  • memory/1852-43-0x0000000074680000-0x0000000074E30000-memory.dmp

    Filesize

    7.7MB

  • memory/1852-7-0x000000007468E000-0x000000007468F000-memory.dmp

    Filesize

    4KB

  • memory/5000-48-0x0000000074630000-0x00000000746DB000-memory.dmp

    Filesize

    684KB

  • memory/5000-47-0x00000000008B0000-0x00000000008E0000-memory.dmp

    Filesize

    192KB

  • memory/5000-49-0x0000000002890000-0x0000000002896000-memory.dmp

    Filesize

    24KB

  • memory/5000-50-0x00000000057E0000-0x0000000005DF8000-memory.dmp

    Filesize

    6.1MB

  • memory/5000-51-0x0000000005300000-0x000000000540A000-memory.dmp

    Filesize

    1.0MB

  • memory/5000-52-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5000-53-0x0000000074630000-0x00000000746DB000-memory.dmp

    Filesize

    684KB

  • memory/5000-54-0x0000000005290000-0x00000000052CC000-memory.dmp

    Filesize

    240KB

  • memory/5000-55-0x0000000005410000-0x000000000545C000-memory.dmp

    Filesize

    304KB

  • memory/5000-56-0x0000000074630000-0x00000000746DB000-memory.dmp

    Filesize

    684KB