Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 02:09

General

  • Target

    9ef20f9b0502d7700c2a3f4501b5a74559322ce3bf3924452b676f6f8ab8f81a.exe

  • Size

    479KB

  • MD5

    93b949f6383c9c5cfcc9be878f0ad81d

  • SHA1

    e878e11f3e34af504b73188aa9d0a18fe8fc0655

  • SHA256

    9ef20f9b0502d7700c2a3f4501b5a74559322ce3bf3924452b676f6f8ab8f81a

  • SHA512

    0981f46941e494ab503ec4622fd3cdcc263f51242c209d20c563c8902b02ee19b611f9f90e954f67302c151bf94a77ebd5019a1cd5948c1623803cfca0a3cea2

  • SSDEEP

    12288:lMrTy90DIynIbY3G+2RQ7jCB21PkHuy7FO5ys39gy:SyIIyIuURQ7jPkHVFzsgy

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ef20f9b0502d7700c2a3f4501b5a74559322ce3bf3924452b676f6f8ab8f81a.exe
    "C:\Users\Admin\AppData\Local\Temp\9ef20f9b0502d7700c2a3f4501b5a74559322ce3bf3924452b676f6f8ab8f81a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0981730.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0981730.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2568400.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2568400.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4576866.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4576866.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2936
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0981730.exe

    Filesize

    307KB

    MD5

    e34a87a548b1ba73d507e3412a0324c2

    SHA1

    2074290ee819eafdf6f28a47c4c23ece1bafed5e

    SHA256

    f7c59ff00980f70282a8e459ba9150f58b5040856e6546187e9f65626af7acd1

    SHA512

    f4a4b293ea8916b7321a3e1090c4da4629335b401481c3d76620c304f0c00f0de9850da004c7239520cfeeec717cd3eb4eac821fa644921b9feb8196c06228ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2568400.exe

    Filesize

    180KB

    MD5

    6460c6e3af1c673d3b4704592503c93e

    SHA1

    74e50f0cced50e94c5b0ec583121838d2fe41bd3

    SHA256

    8c3e7d75b69df218de35ffd11ae9ede621233e826280878fb5f182a5f61d7105

    SHA512

    584facb34faf031a823af24a71e324624726d55781178de4b94914a77cf70b381d6bac12e8a7443074962079f00c870156c1e115227772350f1c569ddbfa1487

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4576866.exe

    Filesize

    168KB

    MD5

    1c4c02d58dd554e16e04a976e4b383a7

    SHA1

    88d1560ca44f92879603eed643a92b079a72a1af

    SHA256

    dbbd8dd533b9f5031190a72618cbe8977e1ae5ec45cccdee434f801a3e59181f

    SHA512

    90794a4432dd10d2c38e61859ea46b922afcbce072fa24359e223a6a5df95b095070b583fe4e6b63017e9b664be43d981bd8eab9b40e6e5a15febe6c8f0008ed

  • memory/2052-28-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-50-0x0000000073EA0000-0x0000000074650000-memory.dmp

    Filesize

    7.7MB

  • memory/2052-17-0x0000000004A70000-0x0000000005014000-memory.dmp

    Filesize

    5.6MB

  • memory/2052-18-0x0000000004980000-0x0000000004998000-memory.dmp

    Filesize

    96KB

  • memory/2052-45-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-42-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-22-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-40-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-38-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-36-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-34-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-32-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-30-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-15-0x00000000048C0000-0x00000000048DA000-memory.dmp

    Filesize

    104KB

  • memory/2052-26-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-24-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-47-0x0000000073EA0000-0x0000000074650000-memory.dmp

    Filesize

    7.7MB

  • memory/2052-46-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-20-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-19-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/2052-48-0x0000000073EA0000-0x0000000074650000-memory.dmp

    Filesize

    7.7MB

  • memory/2052-49-0x0000000073EAE000-0x0000000073EAF000-memory.dmp

    Filesize

    4KB

  • memory/2052-16-0x0000000073EA0000-0x0000000074650000-memory.dmp

    Filesize

    7.7MB

  • memory/2052-52-0x0000000073EA0000-0x0000000074650000-memory.dmp

    Filesize

    7.7MB

  • memory/2052-14-0x0000000073EAE000-0x0000000073EAF000-memory.dmp

    Filesize

    4KB

  • memory/2936-56-0x0000000000D10000-0x0000000000D40000-memory.dmp

    Filesize

    192KB

  • memory/2936-57-0x00000000053F0000-0x00000000053F6000-memory.dmp

    Filesize

    24KB

  • memory/2936-58-0x0000000005C90000-0x00000000062A8000-memory.dmp

    Filesize

    6.1MB

  • memory/2936-59-0x0000000005780000-0x000000000588A000-memory.dmp

    Filesize

    1.0MB

  • memory/2936-60-0x0000000005690000-0x00000000056A2000-memory.dmp

    Filesize

    72KB

  • memory/2936-61-0x00000000056F0000-0x000000000572C000-memory.dmp

    Filesize

    240KB

  • memory/2936-62-0x0000000005890000-0x00000000058DC000-memory.dmp

    Filesize

    304KB