Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 16:16

General

  • Target

    49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f.exe

  • Size

    726KB

  • MD5

    5a03b5785a7ec49111ad38b26b2ad535

  • SHA1

    67d2e1cd60f1533704a821bf6b2867fa6086eb50

  • SHA256

    49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f

  • SHA512

    14c91d7027c667f4ee87b9d58245e61ce3a6c9e37174d07e3d643b2a267972b9ca6c94229b99f972fe6d6d59d74682c8777c7e48bf56bc8f997e35af8d1735c1

  • SSDEEP

    12288:FMrHy90CxDeOs59nBSXK6byOGVwc5DINgCTo4BB7lJnBqdwZIqio50JOP:KydxyBSEGc58NgCTVBBbs2GJoyJc

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f.exe
    "C:\Users\Admin\AppData\Local\Temp\49c4037c84faf8a3e9794449486b3d5924f8aecb44a4cfe06787785726f0ea0f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sVJ09FU.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sVJ09FU.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sYZ71Dm.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sYZ71Dm.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4796
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fCN27VX.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fCN27VX.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hYA56yW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hYA56yW.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2964
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sVJ09FU.exe

    Filesize

    539KB

    MD5

    886e5d8b72e51d2c1c26d858a5bf2bbb

    SHA1

    1f2b5043d19986a9059f567f55f017f85b23ae63

    SHA256

    8a2fd055d9a770043088d2b8811a6a99a2fe400c3b2ebcca7248f3720946cbcc

    SHA512

    a1580a96d2f45e14aa47b467cf13fb5857aed9fd7b9c1c04a8dbd610467ea43082c8746ce813480bc02e8815a1efa30ddabe6ce184f988d3514f20b295381c83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sYZ71Dm.exe

    Filesize

    202KB

    MD5

    d4ad9d3fa86f8d6b6c122be268b8f424

    SHA1

    6a6ec0d763218b42043ffb798907581a8174c746

    SHA256

    2086d5b903a897fdb1033e385c8918c17c0b8791a3d82d3dac0f03708a352d00

    SHA512

    645496fbb30ac9de763f29537b8b952d2d0884a2da4b72d4249a4bc296edfe8bbdfce5274b403e02050a7a7239a3011790ab16c8ba67ece73ef59cf2e037b750

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fCN27VX.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hYA56yW.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • memory/1724-22-0x00000000002E0000-0x00000000002EA000-memory.dmp

    Filesize

    40KB

  • memory/1724-23-0x00007FFDE0BF3000-0x00007FFDE0BF5000-memory.dmp

    Filesize

    8KB

  • memory/1724-21-0x00007FFDE0BF3000-0x00007FFDE0BF5000-memory.dmp

    Filesize

    8KB

  • memory/2964-28-0x0000000000010000-0x0000000000042000-memory.dmp

    Filesize

    200KB

  • memory/2964-29-0x0000000004F70000-0x0000000005588000-memory.dmp

    Filesize

    6.1MB

  • memory/2964-30-0x0000000004AF0000-0x0000000004BFA000-memory.dmp

    Filesize

    1.0MB

  • memory/2964-31-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/2964-32-0x0000000004AA0000-0x0000000004ADC000-memory.dmp

    Filesize

    240KB

  • memory/2964-33-0x0000000004A40000-0x0000000004A8C000-memory.dmp

    Filesize

    304KB