Resubmissions

28-10-2024 23:03

241028-2127jaxkgr 10

21-03-2023 01:55

230321-ccfk7agd36 10

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    28-10-2024 23:03

General

  • Target

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe

  • Size

    779KB

  • MD5

    6c7b6f945d9c685bab02bd41eb30d868

  • SHA1

    0aa978cc4e9592040db95c7a34a241c31da51018

  • SHA256

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e

  • SHA512

    12da401b4fa468695905e10be71fd3cc12e7c3b0e2e912dbaddc46b968123468419c4e5fb5b65dbc4766bc9b3e62d8b00583dfdca4df6f583931302cb7a8254e

  • SSDEEP

    12288:8Mrdy90k4QqkMnF4T+hYYLgzge+f6FMsTlf8Q5TWiClpcUhvHhz:Byn45vSTmlLghyKMsTlfDRWflJvHl

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe
    "C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:236
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 1212
            5⤵
            • Program crash
            PID:944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 236 -ip 236
    1⤵
      PID:5068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe

      Filesize

      636KB

      MD5

      a4cd4086c4e93e87e0761b4f6fb9fc78

      SHA1

      8cfb88724e17e0dacccc6dac7106cd36deeddcb5

      SHA256

      36ae4e2e0cd6f3744cc3697f1aa8d36fbc23988753d59488f4bd256214b989fb

      SHA512

      e9129e1366886c753321757bafaea7700e12a821c5c86c028a126eae1f1c744a408fc76b5a3328c0da30461b0497b315cb08e138cd53e6f9ad7b1cced580112c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe

      Filesize

      290KB

      MD5

      3d531558bb283ffc7de26db762e30214

      SHA1

      bb15a326518068e2b6fb088255d5e40c52291945

      SHA256

      dd8ff93d93aa3642c9f4f9c98f7ab9c326c61a7bbb48885d569d2cb047efe9c4

      SHA512

      0efd1f32dc5b0478a0cec20f3e2797e0821a88152025bad2d8c02227753e8530e71522e2fe561b8514d9130cca0d10aeb31b36adab82edc718bf66b6b886b49f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe

      Filesize

      315KB

      MD5

      215b0d11f6de55e2abd48763b3458715

      SHA1

      c739b056ed16dae84359f8ddde80458db6066bf2

      SHA256

      b60d7b687c709a3b4d698fd3403cb7aa8ec863ee25cea8d0df40a8ae7e03c358

      SHA512

      a126031fe8595eba460fe9ee445e7546b4e599e465bde7440163679b850119d730c349e4d2b5f47f787b9414a5eca316f2e80a8b79e59290e45d8159e71786df

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe

      Filesize

      232KB

      MD5

      c551fb83d13c2611a5364cadc91cd8e4

      SHA1

      a2cc49a0783c6cb0775b87fb5d9bfbef514b7825

      SHA256

      1e7267c8f9d41b535375fc339a362340b9b463c673f7f10f5feb5931fc3e9109

      SHA512

      ae0aeae3d67b7546a7f5e34fc005ccc19ece692d3dc2833de04114284eca9a23d7c859de9b7fd4b0701e49a3d1ccfb9feb9c4942e4cae81e67f5370bf2353db4

    • memory/236-58-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/236-28-0x0000000004D40000-0x00000000052E6000-memory.dmp

      Filesize

      5.6MB

    • memory/236-29-0x0000000004BC0000-0x0000000004BD8000-memory.dmp

      Filesize

      96KB

    • memory/236-30-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-57-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-55-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-53-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-51-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-50-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-47-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-45-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-43-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-42-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-39-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-37-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-35-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-33-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-31-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/236-27-0x00000000026E0000-0x00000000026FA000-memory.dmp

      Filesize

      104KB

    • memory/236-60-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/2112-976-0x0000000005B40000-0x0000000005B7C000-memory.dmp

      Filesize

      240KB

    • memory/2112-84-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-78-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-977-0x0000000005B80000-0x0000000005BCC000-memory.dmp

      Filesize

      304KB

    • memory/2112-66-0x00000000026A0000-0x00000000026E4000-memory.dmp

      Filesize

      272KB

    • memory/2112-101-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-98-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-96-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-95-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-92-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-90-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-88-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-86-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-65-0x0000000002660000-0x00000000026A6000-memory.dmp

      Filesize

      280KB

    • memory/2112-82-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-76-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-75-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-80-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-70-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-68-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-67-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/2112-973-0x00000000053F0000-0x0000000005A08000-memory.dmp

      Filesize

      6.1MB

    • memory/2112-974-0x0000000005A10000-0x0000000005B1A000-memory.dmp

      Filesize

      1.0MB

    • memory/2112-975-0x0000000005B20000-0x0000000005B32000-memory.dmp

      Filesize

      72KB

    • memory/2112-72-0x00000000026A0000-0x00000000026DE000-memory.dmp

      Filesize

      248KB

    • memory/3364-21-0x00000000003D0000-0x00000000003DA000-memory.dmp

      Filesize

      40KB