Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:43

General

  • Target

    b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe

  • Size

    687KB

  • MD5

    a51fc5d312685f6dc7f1fc984300ada0

  • SHA1

    6f78c387cd477a293f9bc6db4db39495ed5f299c

  • SHA256

    b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6

  • SHA512

    d27865e6ca891ee21a459b94f065e9ef94b62d1543cf7139a3d1b98a586213aa43a3165c573018fb4a7a0abd75f2c3e981b676825535bf3fbb6a7da9f8e3edc2

  • SSDEEP

    12288:PMrQy907VmA7nCm+t1VB1iWmK5ITa6Vk5MyBq7FxONFz2Z0h10T2E2cadppUL:DyyTa1jmKaaukaw6X+h10TjncfUL

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe
    "C:\Users\Admin\AppData\Local\Temp\b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532018.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532018.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8222.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 1084
          4⤵
          • Program crash
          PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1432.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3860 -ip 3860
    1⤵
      PID:968
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532018.exe

      Filesize

      544KB

      MD5

      3e8c90b3c7c9da0301886276e2cb109b

      SHA1

      5d6c1a3eb93e988e26b7d0a6520807be298417d0

      SHA256

      9b33ece2a23346ee4325ee24dbd261b06762ab443d68f7aa5ec2219384498f12

      SHA512

      4c9fa7b86b6e673d3829cf76c5c15b42b30426b80cf0e25c4fc1ff550f638ee314ce876e0b7f2a44c893a9ed539d25b2f8eb729ac4d980005494df41bf23dfca

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8222.exe

      Filesize

      300KB

      MD5

      1154228afb30868e8172d58d9d22cca7

      SHA1

      4c5cbbd1386b59021a4ec3a749a8b7f2adf2d551

      SHA256

      22969360db9fa10e66fd2132cc8241f259e2b0616a21d25c94a804726fe85198

      SHA512

      b641db1fac1ba9259087a53d64a53fcb0731985b566e635d21c58e4f555f11094c3945176276357a73083f65a5d2d4cc073c04b913ca0164b9648ce83351fa63

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1432.exe

      Filesize

      359KB

      MD5

      559e92365d46d02c1286e2d429ffaa2f

      SHA1

      27600d9d55704b4edeed61e174b13462c2f77417

      SHA256

      25a372eb26c84135d037947a4f66965695c7753df50ce2b8ef5105e591c00165

      SHA512

      a8318939892850caa547e801a5eca8885c85138bf52c6fb540ab3ede71987491f344cf9834362fd17c03a04a6f60eedbb1c7d53a36c8040f1e8e5d7ff027fb31

    • memory/1920-75-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-81-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-969-0x0000000005A00000-0x0000000005B0A000-memory.dmp

      Filesize

      1.0MB

    • memory/1920-968-0x00000000053E0000-0x00000000059F8000-memory.dmp

      Filesize

      6.1MB

    • memory/1920-62-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-65-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-67-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-63-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-71-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-73-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-971-0x0000000005B40000-0x0000000005B7C000-memory.dmp

      Filesize

      240KB

    • memory/1920-972-0x0000000005C90000-0x0000000005CDC000-memory.dmp

      Filesize

      304KB

    • memory/1920-79-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-970-0x0000000005B20000-0x0000000005B32000-memory.dmp

      Filesize

      72KB

    • memory/1920-83-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-85-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-87-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-89-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-92-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-93-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-95-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-77-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-69-0x0000000004D00000-0x0000000004D3E000-memory.dmp

      Filesize

      248KB

    • memory/1920-61-0x0000000004D00000-0x0000000004D44000-memory.dmp

      Filesize

      272KB

    • memory/1920-60-0x0000000002790000-0x00000000027D6000-memory.dmp

      Filesize

      280KB

    • memory/3860-41-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3860-54-0x0000000000400000-0x000000000070E000-memory.dmp

      Filesize

      3.1MB

    • memory/3860-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3860-50-0x00000000008E0000-0x00000000009E0000-memory.dmp

      Filesize

      1024KB

    • memory/3860-22-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-23-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-25-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-27-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-30-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-31-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-33-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-36-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-38-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-39-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-43-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-45-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-47-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-49-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/3860-21-0x0000000002720000-0x0000000002738000-memory.dmp

      Filesize

      96KB

    • memory/3860-20-0x0000000004E40000-0x00000000053E4000-memory.dmp

      Filesize

      5.6MB

    • memory/3860-19-0x0000000002690000-0x00000000026AA000-memory.dmp

      Filesize

      104KB

    • memory/3860-18-0x0000000000400000-0x000000000070E000-memory.dmp

      Filesize

      3.1MB

    • memory/3860-17-0x0000000000400000-0x000000000070E000-memory.dmp

      Filesize

      3.1MB

    • memory/3860-15-0x00000000008E0000-0x00000000009E0000-memory.dmp

      Filesize

      1024KB

    • memory/3860-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB