Resubmissions

28-10-2024 23:03

241028-2127jaxkgr 10

21-03-2023 01:55

230321-ccfk7agd36 10

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 23:03

General

  • Target

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe

  • Size

    779KB

  • MD5

    6c7b6f945d9c685bab02bd41eb30d868

  • SHA1

    0aa978cc4e9592040db95c7a34a241c31da51018

  • SHA256

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e

  • SHA512

    12da401b4fa468695905e10be71fd3cc12e7c3b0e2e912dbaddc46b968123468419c4e5fb5b65dbc4766bc9b3e62d8b00583dfdca4df6f583931302cb7a8254e

  • SSDEEP

    12288:8Mrdy90k4QqkMnF4T+hYYLgzge+f6FMsTlf8Q5TWiClpcUhvHhz:Byn45vSTmlLghyKMsTlfDRWflJvHl

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe
    "C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5076
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1080
            5⤵
            • Program crash
            PID:744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5076 -ip 5076
    1⤵
      PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe

      Filesize

      636KB

      MD5

      a4cd4086c4e93e87e0761b4f6fb9fc78

      SHA1

      8cfb88724e17e0dacccc6dac7106cd36deeddcb5

      SHA256

      36ae4e2e0cd6f3744cc3697f1aa8d36fbc23988753d59488f4bd256214b989fb

      SHA512

      e9129e1366886c753321757bafaea7700e12a821c5c86c028a126eae1f1c744a408fc76b5a3328c0da30461b0497b315cb08e138cd53e6f9ad7b1cced580112c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe

      Filesize

      290KB

      MD5

      3d531558bb283ffc7de26db762e30214

      SHA1

      bb15a326518068e2b6fb088255d5e40c52291945

      SHA256

      dd8ff93d93aa3642c9f4f9c98f7ab9c326c61a7bbb48885d569d2cb047efe9c4

      SHA512

      0efd1f32dc5b0478a0cec20f3e2797e0821a88152025bad2d8c02227753e8530e71522e2fe561b8514d9130cca0d10aeb31b36adab82edc718bf66b6b886b49f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe

      Filesize

      315KB

      MD5

      215b0d11f6de55e2abd48763b3458715

      SHA1

      c739b056ed16dae84359f8ddde80458db6066bf2

      SHA256

      b60d7b687c709a3b4d698fd3403cb7aa8ec863ee25cea8d0df40a8ae7e03c358

      SHA512

      a126031fe8595eba460fe9ee445e7546b4e599e465bde7440163679b850119d730c349e4d2b5f47f787b9414a5eca316f2e80a8b79e59290e45d8159e71786df

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe

      Filesize

      232KB

      MD5

      c551fb83d13c2611a5364cadc91cd8e4

      SHA1

      a2cc49a0783c6cb0775b87fb5d9bfbef514b7825

      SHA256

      1e7267c8f9d41b535375fc339a362340b9b463c673f7f10f5feb5931fc3e9109

      SHA512

      ae0aeae3d67b7546a7f5e34fc005ccc19ece692d3dc2833de04114284eca9a23d7c859de9b7fd4b0701e49a3d1ccfb9feb9c4942e4cae81e67f5370bf2353db4

    • memory/4700-88-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-92-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-979-0x0000000004C60000-0x0000000004CAC000-memory.dmp

      Filesize

      304KB

    • memory/4700-978-0x0000000004C10000-0x0000000004C4C000-memory.dmp

      Filesize

      240KB

    • memory/4700-977-0x0000000004BF0000-0x0000000004C02000-memory.dmp

      Filesize

      72KB

    • memory/4700-976-0x0000000005890000-0x000000000599A000-memory.dmp

      Filesize

      1.0MB

    • memory/4700-975-0x0000000005270000-0x0000000005888000-memory.dmp

      Filesize

      6.1MB

    • memory/4700-82-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-76-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-84-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-86-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-74-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-90-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-80-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-94-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-96-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-99-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-100-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-102-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-69-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-70-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-72-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-78-0x0000000004AD0000-0x0000000004B0E000-memory.dmp

      Filesize

      248KB

    • memory/4700-67-0x00000000026A0000-0x00000000026E6000-memory.dmp

      Filesize

      280KB

    • memory/4700-68-0x0000000004AD0000-0x0000000004B14000-memory.dmp

      Filesize

      272KB

    • memory/4856-21-0x00007FFB84DA3000-0x00007FFB84DA5000-memory.dmp

      Filesize

      8KB

    • memory/4856-23-0x00007FFB84DA3000-0x00007FFB84DA5000-memory.dmp

      Filesize

      8KB

    • memory/4856-22-0x00000000004D0000-0x00000000004DA000-memory.dmp

      Filesize

      40KB

    • memory/5076-57-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-62-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/5076-60-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/5076-33-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-35-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-37-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-40-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-41-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-43-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-45-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-47-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-49-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-51-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-55-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-59-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-53-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-32-0x0000000002480000-0x0000000002492000-memory.dmp

      Filesize

      72KB

    • memory/5076-31-0x0000000002480000-0x0000000002498000-memory.dmp

      Filesize

      96KB

    • memory/5076-30-0x0000000004B60000-0x0000000005104000-memory.dmp

      Filesize

      5.6MB

    • memory/5076-29-0x0000000002110000-0x000000000212A000-memory.dmp

      Filesize

      104KB