Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:27

General

  • Target

    e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe

  • Size

    836KB

  • MD5

    0117e2ab3d9a5419081a7797ecca29a7

  • SHA1

    66b32b8cb4dd2aa3d2e3df8077cc840cacd2746c

  • SHA256

    e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752

  • SHA512

    521927d18db0460eb87de832058b5e95af875591434caef7d1609e5cc4fcfa98d67f02d7c926218ce26bc7b9460a9dc223b4ff64d43cab14af25c5057ba1f7d1

  • SSDEEP

    24576:1ykiGWVqqSCSwRfkB5EhVqbDJixzorrff:QkfyJZSaFmD4zWrf

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe
    "C:\Users\Admin\AppData\Local\Temp\e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7257.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7257.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1954Uf.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1954Uf.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h29Qp32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h29Qp32.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1148
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 1080
            5⤵
            • Program crash
            PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iTdXt64.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iTdXt64.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1148 -ip 1148
    1⤵
      PID:1192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3227.exe

      Filesize

      693KB

      MD5

      4d5140806b3e192c438c0721d612095c

      SHA1

      acb0a9324bec39a801ba39b38ff13fe1892177f3

      SHA256

      429bb29c36a7571e64cce0789250057872260902eb5d53185980d14c7b91253c

      SHA512

      bf94f74645ca9c1a0d37b7c0ad461da87c9b429fa451d8098bc988b892a1bee544c7b2dc2382c319329ace9d2d53483dcf9ddf13ead18a2b5165b17586880714

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iTdXt64.exe

      Filesize

      391KB

      MD5

      987bc32f0ff4b4904333f0b1a813dd20

      SHA1

      fd0523f021454143c6ec29ccae1b3505b4a39ae5

      SHA256

      f2502d0c7ae9169875417ebc702c62473aa522b38d5b392ea07a3dd434368ae5

      SHA512

      982a27def94f4ec812265e6906b3399ebed8e019fab35c0b2524fdda83e000231511db8718260d3bb32f7662a8c98073a114de0791ef59337fd008210ad2dff6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7257.exe

      Filesize

      344KB

      MD5

      eb21da4aed9cccd8fb74779be75d5ce0

      SHA1

      f593ee0870d32db3018bea0cabfd0434fac2ac91

      SHA256

      462eecfc6981603a46294d219697f0249fe910028d4fc8d3e980ae50d9008458

      SHA512

      29755a8eda61f5aea2726c4d2dbdd42536c3fde45aed7ee0ec5074ff040731c6c5f4bd361760ba004d679a3624d1011116d83d34a27fd156bdf5fbd97cb74b8c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1954Uf.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h29Qp32.exe

      Filesize

      334KB

      MD5

      3c95dc4b6f5a703dc926246205bdea36

      SHA1

      b36c209a01e19e7c2e077374ff38443db3f036eb

      SHA256

      eddd828a3ba093bc8b673534bccd12b8cebce8e038dc4525474cca7eb3312f2c

      SHA512

      99c21cc05f3990897a15bd6a1b6ae762aef5269f48ba6871ea2da7191bd3a2733d321026345a2f4b9dc411fc33288b2d7dec96db6df507bf50fc474ac5112bae

    • memory/1148-28-0x00000000049E0000-0x00000000049FA000-memory.dmp

      Filesize

      104KB

    • memory/1148-29-0x00000000072C0000-0x0000000007864000-memory.dmp

      Filesize

      5.6MB

    • memory/1148-30-0x0000000004B40000-0x0000000004B58000-memory.dmp

      Filesize

      96KB

    • memory/1148-31-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-42-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-58-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-56-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-54-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-53-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-50-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-48-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-46-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-44-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-40-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-38-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-36-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-34-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-32-0x0000000004B40000-0x0000000004B52000-memory.dmp

      Filesize

      72KB

    • memory/1148-59-0x0000000000400000-0x0000000002B03000-memory.dmp

      Filesize

      39.0MB

    • memory/1148-61-0x0000000000400000-0x0000000002B03000-memory.dmp

      Filesize

      39.0MB

    • memory/3428-66-0x0000000007070000-0x00000000070B6000-memory.dmp

      Filesize

      280KB

    • memory/3428-67-0x00000000070F0000-0x0000000007134000-memory.dmp

      Filesize

      272KB

    • memory/3428-97-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-85-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-79-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-77-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-101-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-99-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-95-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-93-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-91-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-89-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-87-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-83-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-81-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-75-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-73-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-71-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-69-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-68-0x00000000070F0000-0x000000000712E000-memory.dmp

      Filesize

      248KB

    • memory/3428-974-0x0000000007750000-0x0000000007D68000-memory.dmp

      Filesize

      6.1MB

    • memory/3428-975-0x0000000007DF0000-0x0000000007EFA000-memory.dmp

      Filesize

      1.0MB

    • memory/3428-976-0x0000000007F30000-0x0000000007F42000-memory.dmp

      Filesize

      72KB

    • memory/3428-977-0x0000000007F50000-0x0000000007F8C000-memory.dmp

      Filesize

      240KB

    • memory/3428-978-0x00000000080A0000-0x00000000080EC000-memory.dmp

      Filesize

      304KB

    • memory/4460-21-0x00007FFBF26D3000-0x00007FFBF26D5000-memory.dmp

      Filesize

      8KB

    • memory/4460-22-0x0000000000260000-0x000000000026A000-memory.dmp

      Filesize

      40KB