Resubmissions

29-10-2024 12:18

241029-pgkf6awpan 10

16-02-2023 10:35

230216-mmtwnshb57 10

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-10-2024 12:18

General

  • Target

    17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe

  • Size

    1001KB

  • MD5

    39742638fabeb3020be7ec5c9892dd9d

  • SHA1

    3fec0db807df472b3e8518464a9aec7e8fa603fb

  • SHA256

    17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a

  • SHA512

    82f48aa9a7ace708b9d18ede40f36083bc74ab2be70f5bed2770609c62ef34ba5634b043b980c57d95750991be24a10454b99134e9e379307765daffefc7b3f6

  • SSDEEP

    24576:OyOTmUxmLGILy6+yhCklNjk+Bn1w8aKWaTRjw:dOTmUx9cy6VkkbjhOvW

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe
    "C:\Users\Admin\AppData\Local\Temp\17d901b8553d4be1bb33e850e4deb1a3897fda3d5a85e41a1e0a3074964b3e8a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3724
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3360
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\doJ5494.exe

    Filesize

    856KB

    MD5

    f9dc829803856d6d7a8474aad32dd9b5

    SHA1

    6a390ba1369911cce72e939821289eae5c5c7b01

    SHA256

    9030053d0292a8f235f8b387e0c9ec1ccae5e21492c8c567c4d07888b69a2a9e

    SHA512

    51379874f016d933015bb25f7a28b556a79331e883c37dc37bff39da1b41157aeb598e3d5016327c9c10383cd29139808326be7d852702a032c98f2710913633

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dgi6560.exe

    Filesize

    501KB

    MD5

    de872b15338d5fab4fadd1988d99df7c

    SHA1

    e966fae9e7cee76be7161627299882c61c75a3f4

    SHA256

    ecbc5cad08d36f5f07d60cb48663e54a0bea8cb56bc1bc707e5d6e67b0c0915b

    SHA512

    c1aa69752fa7541b48c4eddac2208a7daa5f9aa58a7a957ed28586ca2a95cfcae6e6007c821df50df644f115a26c7279e23c4729c7f9f972b41484e13bcb605a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dGf7386.exe

    Filesize

    356KB

    MD5

    6800300a4dc511788b6980b9112c91fc

    SHA1

    52e82d6d034c9805d91656a3bc547dd48719f9c2

    SHA256

    a1840f132b113618f8e9e9838b26269a9ebe8ba7e832025a2b72ef68387c605e

    SHA512

    5d87e11b27fafe69b9fea06b7705b7dae8ffe45e3043e2c7dc7509a14ce4c1436c23e660c351fd605b73fe0275f53463989eed54bdc5198601de86d5670f6635

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxe83mj.exe

    Filesize

    175KB

    MD5

    dd0c9e110c68ce1fa5308979ef718f7b

    SHA1

    473deb8069f0841d47b74b7f414dacc6f96eca78

    SHA256

    dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

    SHA512

    29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kSC89Ro.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mna46vX.exe

    Filesize

    295KB

    MD5

    2338c84711b756237e614c3869cf6100

    SHA1

    6146eace912945070cb084fe3839c8d2dc27c403

    SHA256

    fbfd8bd7e7ff54ce43c209c34a9959ad1abe7325209756decc04e3d9a44ff87b

    SHA512

    24bd3e70fc0ac61f6fcc432de5e93ac38c66eb3fb0e9b09337acc526873dd42f779f2741761ffb1677936e8f219f3c3b683c9476d8ab604803795fc323c7bae6

  • memory/1636-76-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/1636-75-0x00000000058C0000-0x00000000058FC000-memory.dmp

    Filesize

    240KB

  • memory/1636-74-0x0000000005860000-0x0000000005872000-memory.dmp

    Filesize

    72KB

  • memory/1636-73-0x0000000005930000-0x0000000005A3A000-memory.dmp

    Filesize

    1.0MB

  • memory/1636-72-0x0000000005DB0000-0x00000000063C8000-memory.dmp

    Filesize

    6.1MB

  • memory/1636-71-0x0000000000EE0000-0x0000000000F12000-memory.dmp

    Filesize

    200KB

  • memory/3360-50-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-37-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-56-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-52-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-60-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-48-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-46-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-44-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-42-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-40-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-38-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-58-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-65-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3360-67-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3360-62-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-64-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-54-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3360-36-0x0000000005190000-0x00000000051A8000-memory.dmp

    Filesize

    96KB

  • memory/3360-35-0x0000000004BC0000-0x0000000005166000-memory.dmp

    Filesize

    5.6MB

  • memory/3360-34-0x0000000002660000-0x000000000267A000-memory.dmp

    Filesize

    104KB

  • memory/3724-28-0x0000000000F00000-0x0000000000F0A000-memory.dmp

    Filesize

    40KB