Resubmissions

28-10-2024 23:03

241028-2127jaxkgr 10

21-03-2023 01:55

230321-ccfk7agd36 10

Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-10-2024 23:03

General

  • Target

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe

  • Size

    779KB

  • MD5

    6c7b6f945d9c685bab02bd41eb30d868

  • SHA1

    0aa978cc4e9592040db95c7a34a241c31da51018

  • SHA256

    754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e

  • SHA512

    12da401b4fa468695905e10be71fd3cc12e7c3b0e2e912dbaddc46b968123468419c4e5fb5b65dbc4766bc9b3e62d8b00583dfdca4df6f583931302cb7a8254e

  • SSDEEP

    12288:8Mrdy90k4QqkMnF4T+hYYLgzge+f6FMsTlf8Q5TWiClpcUhvHhz:Byn45vSTmlLghyKMsTlfDRWflJvHl

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe
    "C:\Users\Admin\AppData\Local\Temp\754c8228a8f90fa5aad24c1af9b6061b6763a4f274f86f8c420dfb380c613f2e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4989.exe

    Filesize

    636KB

    MD5

    a4cd4086c4e93e87e0761b4f6fb9fc78

    SHA1

    8cfb88724e17e0dacccc6dac7106cd36deeddcb5

    SHA256

    36ae4e2e0cd6f3744cc3697f1aa8d36fbc23988753d59488f4bd256214b989fb

    SHA512

    e9129e1366886c753321757bafaea7700e12a821c5c86c028a126eae1f1c744a408fc76b5a3328c0da30461b0497b315cb08e138cd53e6f9ad7b1cced580112c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rQB45s41.exe

    Filesize

    290KB

    MD5

    3d531558bb283ffc7de26db762e30214

    SHA1

    bb15a326518068e2b6fb088255d5e40c52291945

    SHA256

    dd8ff93d93aa3642c9f4f9c98f7ab9c326c61a7bbb48885d569d2cb047efe9c4

    SHA512

    0efd1f32dc5b0478a0cec20f3e2797e0821a88152025bad2d8c02227753e8530e71522e2fe561b8514d9130cca0d10aeb31b36adab82edc718bf66b6b886b49f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8873.exe

    Filesize

    315KB

    MD5

    215b0d11f6de55e2abd48763b3458715

    SHA1

    c739b056ed16dae84359f8ddde80458db6066bf2

    SHA256

    b60d7b687c709a3b4d698fd3403cb7aa8ec863ee25cea8d0df40a8ae7e03c358

    SHA512

    a126031fe8595eba460fe9ee445e7546b4e599e465bde7440163679b850119d730c349e4d2b5f47f787b9414a5eca316f2e80a8b79e59290e45d8159e71786df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1057.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1302.exe

    Filesize

    232KB

    MD5

    c551fb83d13c2611a5364cadc91cd8e4

    SHA1

    a2cc49a0783c6cb0775b87fb5d9bfbef514b7825

    SHA256

    1e7267c8f9d41b535375fc339a362340b9b463c673f7f10f5feb5931fc3e9109

    SHA512

    ae0aeae3d67b7546a7f5e34fc005ccc19ece692d3dc2833de04114284eca9a23d7c859de9b7fd4b0701e49a3d1ccfb9feb9c4942e4cae81e67f5370bf2353db4

  • memory/4316-96-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-76-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-979-0x0000000005B20000-0x0000000005B6C000-memory.dmp

    Filesize

    304KB

  • memory/4316-978-0x00000000059E0000-0x0000000005A1C000-memory.dmp

    Filesize

    240KB

  • memory/4316-977-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4316-976-0x00000000058D0000-0x00000000059DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4316-975-0x00000000052B0000-0x00000000058C8000-memory.dmp

    Filesize

    6.1MB

  • memory/4316-69-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-102-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-70-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-72-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-100-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-74-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-86-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-78-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-82-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-84-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-88-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-90-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-92-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-94-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-98-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-80-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/4316-67-0x0000000002290000-0x00000000022D6000-memory.dmp

    Filesize

    280KB

  • memory/4316-68-0x0000000004BA0000-0x0000000004BE4000-memory.dmp

    Filesize

    272KB

  • memory/4664-21-0x00007FF9D2053000-0x00007FF9D2055000-memory.dmp

    Filesize

    8KB

  • memory/4664-23-0x00007FF9D2053000-0x00007FF9D2055000-memory.dmp

    Filesize

    8KB

  • memory/4664-22-0x0000000000090000-0x000000000009A000-memory.dmp

    Filesize

    40KB

  • memory/5060-55-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-62-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/5060-60-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/5060-32-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-35-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-37-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-39-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-41-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-43-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-45-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-47-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-49-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-51-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-53-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-57-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-59-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-33-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/5060-31-0x0000000002800000-0x0000000002818000-memory.dmp

    Filesize

    96KB

  • memory/5060-30-0x0000000004D30000-0x00000000052D6000-memory.dmp

    Filesize

    5.6MB

  • memory/5060-29-0x0000000002480000-0x000000000249A000-memory.dmp

    Filesize

    104KB