Analysis

  • max time kernel
    154s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:43

General

  • Target

    312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe

  • Size

    1.1MB

  • MD5

    c051fa3a44e8e46b51ed93f3be27b4bc

  • SHA1

    187538cc7b95ad4c0d28ae9d079031502918b116

  • SHA256

    312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a

  • SHA512

    8622434fd5e93a087d2957b071858ff6b34bd24ed251ac23c6fa672d1b7feeeba702eadbeea6b82e0523ad05ab55d4415b147c82099a1ce8edc45b5a94c6ff15

  • SSDEEP

    24576:IyZlHWgpvHbRwWq9OIt5LMbILqM5kntjOpHK0q+4pTOM:PnFvHbGWq9OIt5Dhu1KCc

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
    "C:\Users\Admin\AppData\Local\Temp\312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6060020.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6060020.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2531208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2531208.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2240546.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2240546.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4396706.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4396706.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:864
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4432
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 556
              6⤵
              • Program crash
              PID:4860
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8077140.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8077140.exe
            5⤵
            • Executes dropped EXE
            PID:4164
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 864 -ip 864
    1⤵
      PID:2756
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2976

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6060020.exe

        Filesize

        1.0MB

        MD5

        1389bf10a539a5702c3d245dc7164b58

        SHA1

        6412368e086d36d0d81df5d2d481f036b6979811

        SHA256

        ea11e81a9751b856befaa0eead6dc459ddbbf65f42e8b9ae2a6d548b9ca92b1d

        SHA512

        a1ec8f94aea900740f76f440ae0d77ce613a0099ad3e2d7b9527aa11f48ed4aaa83b4b23ceecf99638708144a16a30ab761fd4aaaacd9efb28e33802baec6948

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2531208.exe

        Filesize

        651KB

        MD5

        07e523cebd56b15f3d5c54e5b5de6c7d

        SHA1

        fd85d6786ac763d03267b3fa599cb34da2dcbae5

        SHA256

        c269270e45ea3f2d3ca0bf35fb04efb762418d9e20fbd8aa8d24debe49be7dfb

        SHA512

        a5e3155dfa38d622030d2af35583f7b26c436e54dd507cb04564d9bd5a8b1c14063b8bcdf7456398f40761a057d956d83f45074a8674d72f4b2bbd5a9e67bd8f

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2240546.exe

        Filesize

        465KB

        MD5

        4b2c7019bbd1d2b376ce4de382e2c35d

        SHA1

        f90c28aa2847593047b8c109cb5f6e4d258a2c3d

        SHA256

        e1a38a4f51476d4f26c9a130c8bfe0d82875d9345354d680486e347cfb91b99f

        SHA512

        866bbd8ccc998cf2d653bbc84e5a6e3741659d2fe2ac52f873f9d84100b23aa9994026ce670e9a5f44fb6256efc3aece50df13238c4f57d5af58c62495e0de08

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4396706.exe

        Filesize

        899KB

        MD5

        21f145baf592f3ae5bfc73c91842c8b9

        SHA1

        d75161e7fedf8881e4a775c1329ca9f2e0dc8370

        SHA256

        6e2d3a21290c83a675edc1f005263dcf6f4ee3664744f5dbde16d25e285332d0

        SHA512

        07b7affc8724da2cde01be38910455305665b284d1c4df7681fe4aa7069fc1ec674cabca7e926e70ea054a9d05d9903a5fcb06fdc80ad23267dd952fa75815ad

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8077140.exe

        Filesize

        174KB

        MD5

        56019a085119ae67e250f5fc81f4a8b8

        SHA1

        84d7d24264f61f2f485fa5531aff796ea876be49

        SHA256

        7334ad17eecda8cda9cac7f0d54c6accf593383d8eddae978ad0f67a948f3937

        SHA512

        daccdabf4bc3363cab159529eb3bb287179046e90de95342db7166a9c97bb9dcf7b6aebc2596c082ea928a4b182963a4b0fd6fc0064a8cb2ee184b21466dfaca

      • memory/4164-32-0x0000000000050000-0x0000000000080000-memory.dmp

        Filesize

        192KB

      • memory/4164-33-0x0000000000710000-0x0000000000716000-memory.dmp

        Filesize

        24KB

      • memory/4164-34-0x000000000A350000-0x000000000A968000-memory.dmp

        Filesize

        6.1MB

      • memory/4164-35-0x0000000009EC0000-0x0000000009FCA000-memory.dmp

        Filesize

        1.0MB

      • memory/4164-36-0x0000000009E00000-0x0000000009E12000-memory.dmp

        Filesize

        72KB

      • memory/4164-37-0x0000000009E60000-0x0000000009E9C000-memory.dmp

        Filesize

        240KB

      • memory/4164-38-0x0000000009FD0000-0x000000000A01C000-memory.dmp

        Filesize

        304KB

      • memory/4432-28-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB