Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 14:17

General

  • Target

    90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe

  • Size

    682KB

  • MD5

    d97411c4473d2dea15eb62fe38601b80

  • SHA1

    5687a8d6aead238416b8996425c246c48f41d2cc

  • SHA256

    90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448

  • SHA512

    5fc040e530b857caf776b295411b09e8c8329483177fcc834c698cf777097d1ae902e05629ac9ebdf2824445caaf15d76b4e76abb72cce175e02496fdff621e8

  • SSDEEP

    12288:sMriy90uRjyBLuNXLgPSSPkxS0GfB8wO/HqFrAt5q0jz5h+VdQFL:GynEaxkPSysGCwISAt5q0jV0O

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe
    "C:\Users\Admin\AppData\Local\Temp\90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387165.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7199.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7199.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7254.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7254.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387165.exe

    Filesize

    540KB

    MD5

    e6fce4fd38c4b383fc9cb0d5ea850b0e

    SHA1

    5ff2254ca3dc566da8f6a5bfaa5eaa650e26afad

    SHA256

    629321210b9d42cf2bb62aa01269514c80b9a9fd4d0a9bcb5140ff35de43f3a9

    SHA512

    e682c992f1d1952a248bad1672fc6879b8684c8f1f3bd6368398a81c52b6c43b7b7da5c716223ebfe951a6065dc878d6a9ffc4c933dae2c47d66ae5cb74c7b31

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7199.exe

    Filesize

    322KB

    MD5

    dc2267637ac53ff059b629d3e4eeaaa1

    SHA1

    e35e1c3bc35e4fb5bdb0efd2f871a7887fd1c181

    SHA256

    92b4693f0638d2c992ac395feaee5c93b77eb9df5f24e5655db1124e566786f6

    SHA512

    1bf69523d7c035c526715f441e0c21ee0f3fbb7974a41e40907f9767bceca475a8e5de95718883312f9bb8fd213dc8f896d67ef61fe431664cb02a5a023d3103

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7254.exe

    Filesize

    379KB

    MD5

    3a7dfd34a01fe1890666ad4828b20a9e

    SHA1

    8f047c0284916cde1fbdff30cba483d012298bdc

    SHA256

    9766f8a167b71c396dba523afd4a50b63716f147c9d3597fbf2c91de1b7fb6c8

    SHA512

    332de0997b54189c7c104d7f9a4b39f512403ba2c964c432a3d41ac29615bed0ef0ca0abbe45db214b4dc6d76a06df87db20419defd9eab7da40757db195699e

  • memory/1040-72-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-76-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-968-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/1040-967-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/1040-80-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-61-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-62-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-64-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-66-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-68-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-970-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/1040-59-0x00000000071E0000-0x0000000007226000-memory.dmp

    Filesize

    280KB

  • memory/1040-74-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-969-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/1040-82-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-84-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-86-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-89-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-90-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-92-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-95-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-78-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-70-0x0000000007860000-0x000000000789E000-memory.dmp

    Filesize

    248KB

  • memory/1040-60-0x0000000007860000-0x00000000078A4000-memory.dmp

    Filesize

    272KB

  • memory/1040-971-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB

  • memory/3392-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-53-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3392-54-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3392-51-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3392-50-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3392-49-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

    Filesize

    1024KB

  • memory/3392-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-34-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

    Filesize

    72KB

  • memory/3392-20-0x0000000004BD0000-0x0000000004BE8000-memory.dmp

    Filesize

    96KB

  • memory/3392-19-0x0000000007330000-0x00000000078D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3392-18-0x00000000047D0000-0x00000000047EA000-memory.dmp

    Filesize

    104KB

  • memory/3392-16-0x0000000002C60000-0x0000000002C8D000-memory.dmp

    Filesize

    180KB

  • memory/3392-17-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3392-15-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

    Filesize

    1024KB