Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:03

General

  • Target

    3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe

  • Size

    909KB

  • MD5

    cf95db7127f3e69fa4aaa44a2b368ac1

  • SHA1

    b766e6cee7c310610fb8fad749492762ff882103

  • SHA256

    3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0

  • SHA512

    f58e122188bf67a7c39b4192ebac861fdeaa57375e6a90d4a5aa8d186224c550c48ef8350411e31f718a7e285ed9da99e3088fb2ce84d20c4f0b6de845e176c9

  • SSDEEP

    12288:QMrZy90nyMVo+7nlnvFnh0VBWzLecl5n3/M3PCAEGCHTkYzTjFY/Pnzb/mrWZ:Zy6yMV/5h02zKcl5nvMCXHQWFqn3Ory

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe
    "C:\Users\Admin\AppData\Local\Temp\3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4469.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4469.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8794.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8794.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8048.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8048.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu3237.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu3237.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1080
            5⤵
            • Program crash
            PID:3536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvc81s48.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvc81s48.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3504
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4804 -ip 4804
    1⤵
      PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4469.exe

      Filesize

      766KB

      MD5

      55b45addb3d075c15362581279de9d31

      SHA1

      89143adc06ab762cee9a81814593588825877e33

      SHA256

      a9069bbfd583f0d3047501515abbed2ff90cd100d0eb6f889d2d605461c1f48d

      SHA512

      c33507ef90a84d61181b1d52516ed94bf879377810275c38a2835904de2f5b6a073c2027d0eaeb37fb2320021d23da169f50c3e5d5d5436f8073e06a7fd12a3b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvc81s48.exe

      Filesize

      457KB

      MD5

      1b9009894e3b5c6da2e7c0f2c6201547

      SHA1

      8fddac2f4e2c2a1d6b5f6bb88e34c2b3ed53115b

      SHA256

      9223561cb234437f8dfa6e727cbedd9ba583e7245eb34ff4de192034e3a0b02a

      SHA512

      0de592df58fbf5405f64e82157784afaadd80256a9660c93355ff82bde38c37de0b9fcde05c50849a13cee3476d22c793cab3aeb5542e3d0451d1e36e4c2bba6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8794.exe

      Filesize

      380KB

      MD5

      9ac8ef25fdffaf7e372fad29d128a42e

      SHA1

      c64423de27a955b2c6b5b1107a7728b386ea2c97

      SHA256

      3640ae6e2b42c7b74a1cc184ac91ee5eff1e24e795537d11823bcd37807228ce

      SHA512

      3028268c713438fa6fd7f39a6b88ee3ee9660ebc9f05c9e04fa5909add5985188c215b7cf8a5d99b49fa0de023474a1cc3d0f5921c3697c7e46b9693f91804fc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8048.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu3237.exe

      Filesize

      399KB

      MD5

      7bd5af17a52785c6d4aaa42a17fda90a

      SHA1

      0d019aa7caa7cf13561e114164fed71f44ad2e1d

      SHA256

      1fe239b1ec05c132a8a012f8afab01a83dc4cd70f01042683b8862115808b443

      SHA512

      732318cbf1d20dfbd77370665fc54b946abd4b5dc4b3ef9033cb11fda0a76813e82f4be6e9deacdc656d365912f1ebc254d3beee4507b2d23d72642555c71d90

    • memory/1600-21-0x00007FFED07E3000-0x00007FFED07E5000-memory.dmp

      Filesize

      8KB

    • memory/1600-22-0x0000000000F60000-0x0000000000F6A000-memory.dmp

      Filesize

      40KB

    • memory/1600-23-0x00007FFED07E3000-0x00007FFED07E5000-memory.dmp

      Filesize

      8KB

    • memory/3504-94-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-86-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-976-0x0000000005A10000-0x0000000005B1A000-memory.dmp

      Filesize

      1.0MB

    • memory/3504-975-0x0000000005370000-0x0000000005988000-memory.dmp

      Filesize

      6.1MB

    • memory/3504-69-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-978-0x0000000005B70000-0x0000000005BAC000-memory.dmp

      Filesize

      240KB

    • memory/3504-70-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-72-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-101-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-76-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-78-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-80-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-82-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-977-0x0000000005B50000-0x0000000005B62000-memory.dmp

      Filesize

      72KB

    • memory/3504-88-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-90-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-92-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-96-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-98-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-979-0x0000000005CC0000-0x0000000005D0C000-memory.dmp

      Filesize

      304KB

    • memory/3504-67-0x0000000004D00000-0x0000000004D46000-memory.dmp

      Filesize

      280KB

    • memory/3504-68-0x0000000005330000-0x0000000005374000-memory.dmp

      Filesize

      272KB

    • memory/3504-74-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-84-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/3504-102-0x0000000005330000-0x000000000536E000-memory.dmp

      Filesize

      248KB

    • memory/4804-56-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-62-0x0000000000400000-0x0000000000726000-memory.dmp

      Filesize

      3.1MB

    • memory/4804-60-0x0000000000400000-0x0000000000726000-memory.dmp

      Filesize

      3.1MB

    • memory/4804-59-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-32-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-33-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-35-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-39-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-43-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-45-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-47-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-49-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-52-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-53-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-58-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-41-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-37-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/4804-31-0x0000000002870000-0x0000000002888000-memory.dmp

      Filesize

      96KB

    • memory/4804-30-0x0000000004FA0000-0x0000000005544000-memory.dmp

      Filesize

      5.6MB

    • memory/4804-29-0x0000000002630000-0x000000000264A000-memory.dmp

      Filesize

      104KB