Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:38

General

  • Target

    bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c.exe

  • Size

    479KB

  • MD5

    3affbc99cbfd6e036d894be7e7257bca

  • SHA1

    6262f739d038a64c57626fad817a02f509f28155

  • SHA256

    bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c

  • SHA512

    83d5d59b438030e1de71bf0e26e5a137fc6c1992ca6d8c62bb3a89a9cdf960dcd763b0e1d40505ad266704f43f9d4ff71e4b6abf7b2fa19860563d1da84b4c88

  • SSDEEP

    6144:Kjy+bnr+xp0yN90QEw2WhHm2zU8OD4Xl8S99zYj78CqMS9+mycd5CbMiLAii:xMrhy90XWhHp8418+K7/S9JyPbMis/

Malware Config

Extracted

Family

redline

Botnet

murka

C2

217.196.96.101:4132

Attributes
  • auth_value

    878a0681ac6ad0e4eb10ef9db07abdd9

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c.exe
    "C:\Users\Admin\AppData\Local\Temp\bc78cabbb85207b82349c78b8c8e6541edb829a283a828de06fec97f94a5631c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3827142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3827142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4789977.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4789977.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8566219.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8566219.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2224
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3827142.exe

    Filesize

    307KB

    MD5

    5936eb9005e6b3c60f0676bc919dfa4e

    SHA1

    8e50bf36815cacccc911b42bb7352892fcefcdf4

    SHA256

    ec380d725d0c1002be63d3742433ed8fe57da42b250a3f001e1bcbf848de514d

    SHA512

    50e62f24c810d926ab191fe5c61998a45cc73a7bab6e36aaf3e3763635c249633e7e398c9873fdb84cc54f1e18f7445826e80b5eac678a0a970ce828f0cf9ef9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4789977.exe

    Filesize

    181KB

    MD5

    abd875d7e090c87f611229ff3e9a95f2

    SHA1

    c5ae37887b7e9e0b8a4edc08b483f68f8b348001

    SHA256

    99d10fab76ed2af127d0a1c294d8790819689fb0c7724e6a28358debc4924a92

    SHA512

    7eeca8d4bf5e91ed83969a1e2800e323d1866239904184555662764353853376d17b00532ec20d2deddfa8e2a939bf4cb5ff4f248d6a5488028fad3565fd3a34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8566219.exe

    Filesize

    168KB

    MD5

    72916a35263f4f34fbf534635f129593

    SHA1

    2cfbac93e59b7eacb278c335af69841a55af045c

    SHA256

    e02c354ef8d69a491e2cdfbc21de7338228a8b876691e3882019fed6a3730102

    SHA512

    df00aa463d47c3cc371c0de01b03c1ece07e6fc22b23797e9bcaa9f9f4f0b4868e1eb205857c1d232d724dd6f7e9fecac482c3d0910d4266cdd041d894d7c05b

  • memory/1732-35-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-50-0x0000000073BD0000-0x0000000074380000-memory.dmp

    Filesize

    7.7MB

  • memory/1732-17-0x0000000004930000-0x0000000004ED4000-memory.dmp

    Filesize

    5.6MB

  • memory/1732-18-0x0000000073BD0000-0x0000000074380000-memory.dmp

    Filesize

    7.7MB

  • memory/1732-19-0x0000000004F40000-0x0000000004F58000-memory.dmp

    Filesize

    96KB

  • memory/1732-25-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-27-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-47-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-45-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-43-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-41-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-39-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-37-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-15-0x00000000048D0000-0x00000000048EA000-memory.dmp

    Filesize

    104KB

  • memory/1732-33-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-31-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-29-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-23-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-21-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-20-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1732-48-0x0000000073BD0000-0x0000000074380000-memory.dmp

    Filesize

    7.7MB

  • memory/1732-49-0x0000000073BDE000-0x0000000073BDF000-memory.dmp

    Filesize

    4KB

  • memory/1732-16-0x0000000073BD0000-0x0000000074380000-memory.dmp

    Filesize

    7.7MB

  • memory/1732-52-0x0000000073BD0000-0x0000000074380000-memory.dmp

    Filesize

    7.7MB

  • memory/1732-14-0x0000000073BDE000-0x0000000073BDF000-memory.dmp

    Filesize

    4KB

  • memory/2224-56-0x0000000000690000-0x00000000006C0000-memory.dmp

    Filesize

    192KB

  • memory/2224-57-0x0000000002870000-0x0000000002876000-memory.dmp

    Filesize

    24KB

  • memory/2224-58-0x000000000AA20000-0x000000000B038000-memory.dmp

    Filesize

    6.1MB

  • memory/2224-59-0x000000000A510000-0x000000000A61A000-memory.dmp

    Filesize

    1.0MB

  • memory/2224-60-0x000000000A430000-0x000000000A442000-memory.dmp

    Filesize

    72KB

  • memory/2224-61-0x000000000A490000-0x000000000A4CC000-memory.dmp

    Filesize

    240KB

  • memory/2224-62-0x00000000029C0000-0x0000000002A0C000-memory.dmp

    Filesize

    304KB