Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:37

General

  • Target

    9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824.exe

  • Size

    478KB

  • MD5

    84c3ce4230728107705651538e1176ad

  • SHA1

    c09f8e9a0426b1eefeb349c10c0daf0f3ab18a35

  • SHA256

    9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824

  • SHA512

    01cb2c3467513f46b504d319de936e2ca461535971526403ea59fb10c36e82e43b00c18beba7df8734c3110c154c9f415273f28311b73e35f8fb4aabfa237d85

  • SSDEEP

    12288:zMryy90GcCRunrvK3oHKon68L7GwSKyUhEHxFo8b:Ryv9ADtnf7GLRHP9b

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824.exe
    "C:\Users\Admin\AppData\Local\Temp\9be281ca16bc9581dd793032960135d21b4ae19a8aa65b3f63a95af6fe459824.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997928.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997928.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6856320.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6856320.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9837881.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9837881.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3248
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7997928.exe

    Filesize

    307KB

    MD5

    c7865796932e96519c40f0f4e839e0c0

    SHA1

    d3d3b421de308f54b74a47ebc65751c8c9da2e03

    SHA256

    9232cc753e3450ee2c1ce734295759438ba8cc061bd4b4867302eeae7b42d0a6

    SHA512

    76de24f2f2b4e473fe71584bce955a2f865f475d06647ea10659751db2c571ad2fbcc35073c7b43f1785d2e27fa59c8245e133ae8d200fb97aa999ad1fd01647

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6856320.exe

    Filesize

    182KB

    MD5

    ae5e6006059ae9e1ee7bf15347eb592d

    SHA1

    970a927bd2b87170cb8956b59182d1ee0dce2e51

    SHA256

    c8ca31e790202b81f12ef4efba3637588220c758f3b39151108341dad0b27d4d

    SHA512

    145c1e83f05ea75cd2bb13fdc66eb5f2d1fd5d76dc30897c3e766c4ac9c89d039cd7f1e500073a1848f4671ec2a46aed54b59068b55da16a9fbea393ad1751d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9837881.exe

    Filesize

    168KB

    MD5

    bd5e7a2adab9bb3b9d2887f8aa2ebc7a

    SHA1

    f80a4c6c531dfbc935159d9c90bebe550c0e78ef

    SHA256

    e3e3b52ed2adf446462e5b6ad94f13f57bf45cfee415055b8d119da27f034d3a

    SHA512

    6fafa26f0f7b68ada2f58c11b7aeb854d9685a99150f97079fd9c0d61b597d2feef847fe94c125252251c5647e43525ff6aefa71e023a6ee259df2de5b3510dd

  • memory/1228-24-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-50-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1228-16-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1228-18-0x00000000024A0000-0x00000000024B8000-memory.dmp

    Filesize

    96KB

  • memory/1228-42-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-46-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-19-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-36-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-34-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-32-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-30-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-28-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-26-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-15-0x00000000021A0000-0x00000000021BA000-memory.dmp

    Filesize

    104KB

  • memory/1228-22-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-20-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-44-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-40-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-38-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/1228-47-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1228-48-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1228-49-0x000000007464E000-0x000000007464F000-memory.dmp

    Filesize

    4KB

  • memory/1228-17-0x0000000004B90000-0x0000000005134000-memory.dmp

    Filesize

    5.6MB

  • memory/1228-52-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1228-14-0x000000007464E000-0x000000007464F000-memory.dmp

    Filesize

    4KB

  • memory/3248-56-0x0000000000A70000-0x0000000000A9E000-memory.dmp

    Filesize

    184KB

  • memory/3248-57-0x0000000002D40000-0x0000000002D46000-memory.dmp

    Filesize

    24KB

  • memory/3248-58-0x0000000005AC0000-0x00000000060D8000-memory.dmp

    Filesize

    6.1MB

  • memory/3248-59-0x00000000055B0000-0x00000000056BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3248-60-0x00000000052E0000-0x00000000052F2000-memory.dmp

    Filesize

    72KB

  • memory/3248-61-0x0000000005340000-0x000000000537C000-memory.dmp

    Filesize

    240KB

  • memory/3248-62-0x00000000054A0000-0x00000000054EC000-memory.dmp

    Filesize

    304KB