Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:17

General

  • Target

    9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe

  • Size

    689KB

  • MD5

    b61a69d213497b7bfa96ae9918c7447f

  • SHA1

    a1c7e34592798367c52257a9360df1e180ed45cc

  • SHA256

    9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5

  • SHA512

    9ebd6889e797ff354f0805c2f4cb3ead5b14a1f9a7b0c1934bea73364912c90bfa61f5ad8dd01fe179c464d3ecf678a0daf744c2fe145c07656ef6990a13e074

  • SSDEEP

    12288:DMrKy90sss4LLRRYKtDZNgHyBDNK743xtYMyKb32krBOwu:Zy3ss4LVRYKPNhxNU4hmM/CkNO3

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe
    "C:\Users\Admin\AppData\Local\Temp\9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5892.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5892.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2683.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2683.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 180 -s 1076
          4⤵
          • Program crash
          PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4268.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 180 -ip 180
    1⤵
      PID:2036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5892.exe

      Filesize

      547KB

      MD5

      e34ed7c7268954e9bcc09bb129329196

      SHA1

      faf061ce8f5faed5244ddafe98c713c80ea674a3

      SHA256

      4e974b721b29467f70c68305c567ff314e9a97256f73b0a0cc5e331cf426c8fd

      SHA512

      19253d8ac49beed025e2d36f842a5423708d2ea95455c6706c1901b31489ec93ee094894fb838acffc7f36b258030b4727474106455d84ced4cc7b89d5d39d8e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2683.exe

      Filesize

      329KB

      MD5

      0c1f00c4be57abb607b37829b9ed1c2f

      SHA1

      d532aaa54f5e14fcb02c9b34e58cb749afa7a4e7

      SHA256

      362a839a42ae8a18dd4d1c051d54803081fd349423118d3d147bdb27f1692fcd

      SHA512

      6b8e125a091794132a2df8bb4e9e28326e3f1661e47e7200b8cf5101f7ced3c7617e12a9e37c129413e42fcdaaea0d27aac6c2a41a81fe8415f1b34cc9338fcc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4268.exe

      Filesize

      386KB

      MD5

      38ca90dab57204795851f9139d049182

      SHA1

      0766c2fb449a36b9669ca6d78370ec979ae038b6

      SHA256

      98339e75afb3c45a2137279b0206544d8d493587797a4113b1e10624a47ce1cf

      SHA512

      0ab298ab3eba1fbd91b0212bfaf0cdd21c0cb5c1465fa2d00f5c263581df07842adda13c4e2e425b3fe3a7e0182a00b8b439bffac4ecaa8d11a6d3a4aa12bd7e

    • memory/180-15-0x0000000002CC0000-0x0000000002DC0000-memory.dmp

      Filesize

      1024KB

    • memory/180-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/180-17-0x0000000004760000-0x000000000477A000-memory.dmp

      Filesize

      104KB

    • memory/180-18-0x0000000007250000-0x00000000077F4000-memory.dmp

      Filesize

      5.6MB

    • memory/180-19-0x0000000004C90000-0x0000000004CA8000-memory.dmp

      Filesize

      96KB

    • memory/180-20-0x0000000000400000-0x0000000002B7F000-memory.dmp

      Filesize

      39.5MB

    • memory/180-48-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-46-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-44-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-42-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-40-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-38-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-36-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-34-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-32-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-30-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-28-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-26-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-24-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-22-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-21-0x0000000004C90000-0x0000000004CA2000-memory.dmp

      Filesize

      72KB

    • memory/180-49-0x0000000002CC0000-0x0000000002DC0000-memory.dmp

      Filesize

      1024KB

    • memory/180-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/180-50-0x0000000000400000-0x0000000002B7F000-memory.dmp

      Filesize

      39.5MB

    • memory/180-53-0x0000000000400000-0x0000000002B7F000-memory.dmp

      Filesize

      39.5MB

    • memory/180-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1208-59-0x0000000004980000-0x00000000049C6000-memory.dmp

      Filesize

      280KB

    • memory/1208-60-0x0000000007190000-0x00000000071D4000-memory.dmp

      Filesize

      272KB

    • memory/1208-72-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-86-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-94-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-92-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-90-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-88-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-84-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-82-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-80-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-78-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-76-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-74-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-70-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-68-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-66-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-64-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-62-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-61-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/1208-967-0x0000000007920000-0x0000000007F38000-memory.dmp

      Filesize

      6.1MB

    • memory/1208-968-0x0000000007F40000-0x000000000804A000-memory.dmp

      Filesize

      1.0MB

    • memory/1208-969-0x00000000072B0000-0x00000000072C2000-memory.dmp

      Filesize

      72KB

    • memory/1208-970-0x00000000072D0000-0x000000000730C000-memory.dmp

      Filesize

      240KB

    • memory/1208-971-0x0000000008150000-0x000000000819C000-memory.dmp

      Filesize

      304KB