Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:28

General

  • Target

    abfcc533051a56be4687593044ff1a5c5d5a2e38a6280e867712bfc99bf931c3.exe

  • Size

    689KB

  • MD5

    d29e5f6c8e2870a72c6bc247e2a72d0f

  • SHA1

    135b453e7e813ccf0a19a9d896321481182b50f6

  • SHA256

    abfcc533051a56be4687593044ff1a5c5d5a2e38a6280e867712bfc99bf931c3

  • SHA512

    1dd91e4128f349516ee1e7a2c8fa235610881a99cc689f0c98671bcddb5e6d1dd7a560aace5b6c8538e4f28caef7a715093b3ee7219cf41c4719612dc3f6b89c

  • SSDEEP

    12288:yMr6y90ckG9rP2uY3eo6YLpB9jpewZ4ZIlEEjsFGrx4VaNmgodBWjVnXI+Tw+eg:cywbO3Yb9NpoIJCdgmNdYJXIYwHg

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abfcc533051a56be4687593044ff1a5c5d5a2e38a6280e867712bfc99bf931c3.exe
    "C:\Users\Admin\AppData\Local\Temp\abfcc533051a56be4687593044ff1a5c5d5a2e38a6280e867712bfc99bf931c3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2327.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2327.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5884.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5884.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 1096
          4⤵
          • Program crash
          PID:2908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1497.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1497.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4044 -ip 4044
    1⤵
      PID:2940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2327.exe

      Filesize

      548KB

      MD5

      5e4e41571579e7033c714852a47d5e0d

      SHA1

      ec9468aa59ece2f9f1685c82b7b564ad71e6859a

      SHA256

      8710757a65d83773a5b7002daa5cd280d519d3e4b657552ba1f3a37307dce033

      SHA512

      e813163f74bd7265c0abc21137373d5ed46d1a526fae491b782d8c7ede889106077c916460f2f5240b4cd766bb21d272fd14fd6b96dcf8f586dfb7e4847f461b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5884.exe

      Filesize

      329KB

      MD5

      42eb31a277c1b9ad1c7491ec498b82fe

      SHA1

      993a225b816f37f3f4a08dcb1a2d09166e95a7db

      SHA256

      fd9d5fb25ce45ad1badb4c9025bf9975ce99812c821c7bfc77e901341c267c83

      SHA512

      67b171b49d8de3c1031ba3182aad1698d3ce75faefb37f162258d5288bc54482ed263950c32524618d7ce88a0b167a7c107c127b834b8986e818c99832cd64c8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1497.exe

      Filesize

      387KB

      MD5

      b7784efe7d40506cdcaf789712d7a458

      SHA1

      69b7d5a98327b788d80b19f5172a5a61c7a08b51

      SHA256

      fa0aaf4fe74ae01557ba0e1d8b78688e69d930fbe4220c26c0743e2af3623d70

      SHA512

      10ed3b7324f80e5e120a35f376b8eb1a3989366e99d8d2e739ae1a5f0e7f95328a47377f1351ae34a3caff15d7d85d5e6316a4f07eac2dae42e22bb2b752f8c0

    • memory/2932-65-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-69-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-969-0x0000000007F10000-0x000000000801A000-memory.dmp

      Filesize

      1.0MB

    • memory/2932-968-0x00000000078F0000-0x0000000007F08000-memory.dmp

      Filesize

      6.1MB

    • memory/2932-89-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-91-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-93-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-95-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-62-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-63-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-971-0x00000000072C0000-0x00000000072FC000-memory.dmp

      Filesize

      240KB

    • memory/2932-972-0x0000000008120000-0x000000000816C000-memory.dmp

      Filesize

      304KB

    • memory/2932-67-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-970-0x00000000072A0000-0x00000000072B2000-memory.dmp

      Filesize

      72KB

    • memory/2932-71-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-73-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-75-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-77-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-79-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-81-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-83-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-85-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-87-0x0000000004D40000-0x0000000004D7F000-memory.dmp

      Filesize

      252KB

    • memory/2932-61-0x0000000004D40000-0x0000000004D84000-memory.dmp

      Filesize

      272KB

    • memory/2932-60-0x0000000004980000-0x00000000049C6000-memory.dmp

      Filesize

      280KB

    • memory/4044-38-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-54-0x0000000000400000-0x0000000002B7F000-memory.dmp

      Filesize

      39.5MB

    • memory/4044-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4044-51-0x0000000000400000-0x0000000002B7F000-memory.dmp

      Filesize

      39.5MB

    • memory/4044-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4044-50-0x0000000002C50000-0x0000000002C7D000-memory.dmp

      Filesize

      180KB

    • memory/4044-49-0x0000000002ED0000-0x0000000002FD0000-memory.dmp

      Filesize

      1024KB

    • memory/4044-21-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-22-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-24-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-26-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-28-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-30-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-32-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-34-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-36-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-40-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-42-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-44-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-46-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-48-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/4044-20-0x0000000007250000-0x0000000007268000-memory.dmp

      Filesize

      96KB

    • memory/4044-19-0x0000000007350000-0x00000000078F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4044-18-0x0000000004930000-0x000000000494A000-memory.dmp

      Filesize

      104KB

    • memory/4044-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4044-16-0x0000000002C50000-0x0000000002C7D000-memory.dmp

      Filesize

      180KB

    • memory/4044-15-0x0000000002ED0000-0x0000000002FD0000-memory.dmp

      Filesize

      1024KB