Resubmissions

30-05-2024 17:33

240530-v5b3ksgc98 10

23-05-2024 18:24

240523-w2bhbabg64 10

Analysis

  • max time kernel
    78s
  • max time network
    78s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-05-2024 11:37

General

  • Target

    0961cfb89798532c90d35ce37a1718f108d572c7886da0f4b1d6c777c7673e07.exe

  • Size

    491KB

  • MD5

    1c185b332b3c465c964af971cafee906

  • SHA1

    8a608729025c94664a9925c0aba1fb4479eeb6e9

  • SHA256

    0961cfb89798532c90d35ce37a1718f108d572c7886da0f4b1d6c777c7673e07

  • SHA512

    8f31346b635988db5b6170ce267c0b40b7ef27584cdc7a57f181f2b05b060be5ff97a5533941f0297bd946df8fcad0295f168676e2fe76f99cdbdd85824030c8

  • SSDEEP

    12288:1Mr5y90hhwxAOv0OPzp6Cp4mEonRxsvz:kyuZmU5mxMz

Malware Config

Extracted

Family

redline

Botnet

hares

C2

83.97.73.128:19071

Attributes
  • auth_value

    62fed2fd42b168e956200885cefb36a7

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0961cfb89798532c90d35ce37a1718f108d572c7886da0f4b1d6c777c7673e07.exe
    "C:\Users\Admin\AppData\Local\Temp\0961cfb89798532c90d35ce37a1718f108d572c7886da0f4b1d6c777c7673e07.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2409475.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2409475.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9971995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9971995.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6219333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6219333.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9926148.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9926148.exe
      2⤵
      • Executes dropped EXE
      PID:1692
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\WriteResume.rle"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4068
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
    1⤵
      PID:3884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\SearchGrant.mhtml
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4672
    • C:\Windows\System32\fontview.exe
      "C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\UndoSwitch.ttc
      1⤵
        PID:2116
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\TraceInitialize.mht
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3960
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3960 CREDAT:82945 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1116
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3012
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
          PID:4844
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4148
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:216
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:1176
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\SwitchInitialize.vsw
            2⤵
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:82945 /prefetch:2
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3244
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\SwitchInitialize.vsw
              3⤵
              • Modifies Internet Explorer settings
              PID:2116
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\SwitchInitialize.vsw
              3⤵
              • Modifies Internet Explorer settings
              PID:512
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\DebugSelect.lock
            2⤵
              PID:4044

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            ba208409d758d248b5c43be99023d903

            SHA1

            e8ff44158a1a41784ff773aee0410fce08ffa85b

            SHA256

            90052b1f97e33e41422ee5bdf739a18a7c66b30c282ea309314b68bbc7c093c1

            SHA512

            a4c64d8f86d4e2533b7462a3ec5d072f059573d6937c9c4133b61ea14fdb691075a0c28f839d1a54cbc739477d3ef38995439d57308270ddbe670e5e40e5a27c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            404B

            MD5

            77da325282309f8bd1ebd1b2abe6de77

            SHA1

            ad822f044f0e6543d388eb51796b2536b8b82ead

            SHA256

            c7a26847fa054fde956c942e6fa29456cf7093c759237fb1c67f6a2684969400

            SHA512

            9d9103c1022935cb009491b8ccd676813a039eed32492143f2e91c984547ba4b767d7af7375f44dc92cd10aa5d69eddbae54f8ee9fd476fb72e32382b559404f

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

            Filesize

            226B

            MD5

            957779c42144282d8cd83192b8fbc7cf

            SHA1

            de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

            SHA256

            0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

            SHA512

            f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1431CD6B-19C2-11EF-B03F-7ACE63468C9D}.dat

            Filesize

            5KB

            MD5

            d7127257f1e65e8e0a8ab0901839ebc0

            SHA1

            746bdb9cc90fbc80ccc14d276e4d2591fa1ec5bc

            SHA256

            317d86bfc3f084b0968b676594da7d5b7087e8c46dd285d375698d37a45de515

            SHA512

            4cc8d00a7dce791805e58b3910981222c9700bc233f1c90f11223ae7bd8e3821c9a57bccbe48af79255d589a0a89b0dc62dae7305f1b21954ca035e21dc3ff2f

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2136E4EA-19C2-11EF-B03F-7ACE63468C9D}.dat

            Filesize

            5KB

            MD5

            1ec0eb84fbd9aab5920c37ea921c94b6

            SHA1

            9daf26eff575e28c0d6b2ebfef058c5e492d1b2f

            SHA256

            da8c2245ecf0957e15f06b6406a38d69114daa493056cea95254dd8e951f97dd

            SHA512

            082ef81f850bd8d5d520ab26f079cbfdaabca056c2b050e043f20cd3c86e249150993ae52a0383f6ffdadc9cc6b7bdca54eb9cff5ddab83d44648b8feffc779f

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{1232EB68-F27E-11EE-B037-C627849F21CD}.dat

            Filesize

            5KB

            MD5

            372b0009232dd2a8c7dd56ae96c04c0b

            SHA1

            708bfad65ceff5dbde06f0c5d794f42382316588

            SHA256

            78c2b6b0701d2470b9bf71f757d4f5c1b0562db046db88f008cd9f5fa275b564

            SHA512

            ace53fe7be9f9b3a803b57162f10117a62f55f4b6a0905834f2223f386bdc97dcde78b3dd4ee70a485a8d2506e59a5b19ba3afe2468759959e1aecbb610e4f8e

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{1431CD6E-19C2-11EF-B03F-7ACE63468C9D}.dat

            Filesize

            4KB

            MD5

            6447f1d4bf97d608deca6534cf5a0d93

            SHA1

            76ae0ed35e1bcbc6519da9e194fc0bc3425dcba8

            SHA256

            1244ba7bd0765be0221f4fd9948ff77c10b257b97e343496ff96f485682d753c

            SHA512

            c485a479014633e19b33b7e33ae5af6458cfd9093281d02cde2a2911f29a25fac6d78ef71e9ad3151d4a61c8eb8f457f489a7dbabc1a5f7fb98a9dfaab274be4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

            Filesize

            14KB

            MD5

            5f8f6292a71058ed89ba05a704b79eb0

            SHA1

            cc6af689963c4b10a20a99ceba415dd356eb5e39

            SHA256

            ce7c260dd9f6b154e061920e8b052171da6f8d80ecd26b38b4b2deec8d9a4f04

            SHA512

            6505c58feedd0770e692f86ef33453a4ee0505aafc55185535566a5e6af470d1f12f4fc30e2caa148c9816c528f57bff667489b8262be013362d29fe26a50c30

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9926148.exe

            Filesize

            402KB

            MD5

            c6ce87618d0922f5b8776d8b598aeb03

            SHA1

            f4d9cc93b4e8712b0a92ac6b684086a20f3d8a75

            SHA256

            30c07696b475f2efe0f93bc002cdaaa423be872c1f4435e380ae622ec896b7bf

            SHA512

            16ac053a05aec81227ff5b95d924992c9298b1f184cff79b7bd0e7fe61fdc82416de70d2af787eb09f8f877c4994c6297a5caa4a0845fd969f5aef7695be9775

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2409475.exe

            Filesize

            227KB

            MD5

            69898c7e9e5c421b885c9d6d9c0b65ca

            SHA1

            927bc1958eaa697859280b6fe6f6bbbd641ff3d2

            SHA256

            0809be422dc597ce5e89dccfa4fb221e6ef9c9ca2ac253744c5499e64a29ca4d

            SHA512

            c52da885618cb7f815f833b73e3e025d7c0034c40d93512d20b69f233f5a5205427d03f72792a8383b849e37b1549ac8379bc7788b864d87bad09d49d4f8540f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9971995.exe

            Filesize

            176KB

            MD5

            211a06e9ae68ced1234252a48696431b

            SHA1

            69950e2ee2fafd177d1a295836713bfd8d18df9c

            SHA256

            0bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d

            SHA512

            b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6219333.exe

            Filesize

            11KB

            MD5

            7e93bacbbc33e6652e147e7fe07572a0

            SHA1

            421a7167da01c8da4dc4d5234ca3dd84e319e762

            SHA256

            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

            SHA512

            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

          • C:\Users\Admin\AppData\Local\Temp\~DFDE4B790F47C25AC8.TMP

            Filesize

            16KB

            MD5

            6dc14ba7a06ce0f5c770b64ccffb3ee6

            SHA1

            8801bdad4913edef0e24f700620a3ce40fd4250b

            SHA256

            7256c64b343350115b246ccb016aad37d1599c146d903b99f5245fc402b67b0f

            SHA512

            28bf5215e5090755725c81de6448a4d1e82315c6408e1a67957baf14348be0a2a6ce3bb074cd7cc17c3e4300e7677b4e1d984d04cbe43dab332379c368187ea9

          • memory/192-15-0x00000000001E0000-0x00000000001EA000-memory.dmp

            Filesize

            40KB

          • memory/192-14-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/216-102-0x000001A3E5F80000-0x000001A3E6080000-memory.dmp

            Filesize

            1024KB

          • memory/216-103-0x000001A3E5F80000-0x000001A3E6080000-memory.dmp

            Filesize

            1024KB

          • memory/1176-126-0x00000203D1100000-0x00000203D1200000-memory.dmp

            Filesize

            1024KB

          • memory/1176-166-0x00000203D1500000-0x00000203D1600000-memory.dmp

            Filesize

            1024KB

          • memory/1176-167-0x00000203D1500000-0x00000203D1600000-memory.dmp

            Filesize

            1024KB

          • memory/1176-140-0x00000203D1200000-0x00000203D1300000-memory.dmp

            Filesize

            1024KB

          • memory/1176-125-0x00000203D1100000-0x00000203D1200000-memory.dmp

            Filesize

            1024KB

          • memory/1176-124-0x00000203D1100000-0x00000203D1200000-memory.dmp

            Filesize

            1024KB

          • memory/1176-120-0x00000203D0F00000-0x00000203D1000000-memory.dmp

            Filesize

            1024KB

          • memory/1176-110-0x00000203BEB00000-0x00000203BEC00000-memory.dmp

            Filesize

            1024KB

          • memory/1692-46-0x0000000004A30000-0x0000000004A42000-memory.dmp

            Filesize

            72KB

          • memory/1692-47-0x000000000A600000-0x000000000A63E000-memory.dmp

            Filesize

            248KB

          • memory/1692-45-0x000000000A4F0000-0x000000000A5FA000-memory.dmp

            Filesize

            1.0MB

          • memory/1692-48-0x0000000002330000-0x000000000237B000-memory.dmp

            Filesize

            300KB

          • memory/1692-44-0x0000000009EE0000-0x000000000A4E6000-memory.dmp

            Filesize

            6.0MB

          • memory/1692-43-0x0000000004960000-0x0000000004966000-memory.dmp

            Filesize

            24KB

          • memory/1692-39-0x0000000000470000-0x00000000004A0000-memory.dmp

            Filesize

            192KB

          • memory/3012-95-0x000001C600970000-0x000001C600972000-memory.dmp

            Filesize

            8KB

          • memory/3012-76-0x000001C67BC20000-0x000001C67BC30000-memory.dmp

            Filesize

            64KB

          • memory/3012-60-0x000001C67BB20000-0x000001C67BB30000-memory.dmp

            Filesize

            64KB

          • memory/4616-25-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

            Filesize

            40KB