Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:58

General

  • Target

    5359aa7139ce6f303352ee79c67ce6629c41e7c6e3d0bb64d39ba83f2fd3d140.exe

  • Size

    687KB

  • MD5

    d338e761a563d7fc08e805ca22773dc8

  • SHA1

    2fc2e8ebd9cdee62982b3b0216e70786144c5130

  • SHA256

    5359aa7139ce6f303352ee79c67ce6629c41e7c6e3d0bb64d39ba83f2fd3d140

  • SHA512

    6e51264b78f20b9bb8a65f16e3fb370463ea47595bb13dcc0a17f7a3bff908fd19ba92c793a330142890c0cdf7123104021676860edb965c4106f573520772d9

  • SSDEEP

    12288:AMrAy90u14nE+BpEAnxZ3Tj1h1mp3BrKtvBPnIVY74Wxl:wyLZ+BHnL/1uV9SfIVY7bl

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5359aa7139ce6f303352ee79c67ce6629c41e7c6e3d0bb64d39ba83f2fd3d140.exe
    "C:\Users\Admin\AppData\Local\Temp\5359aa7139ce6f303352ee79c67ce6629c41e7c6e3d0bb64d39ba83f2fd3d140.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un403163.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un403163.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2362.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2362.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 1020
          4⤵
          • Program crash
          PID:452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3516.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3380 -ip 3380
    1⤵
      PID:1492
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un403163.exe

      Filesize

      545KB

      MD5

      67cf03b8aa99fc3976342ffe747a3fa1

      SHA1

      2ff9e491e486e5afc4f40aefc4f68f00e2b8016b

      SHA256

      e518b8dfd6ff60870618f7f2f026c5e96dafae4139b4986d034d20bfdb2fc4b4

      SHA512

      4b6c5c1fe28bc539f3b55c1322608c7a9757654925a20ae50408781db11d4166dbb3381c1454e118a5c2b360d515176c3530f27fdbffb50793879d9976595bf0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2362.exe

      Filesize

      324KB

      MD5

      a5fe11450bab54d1a3431a23ff5134c9

      SHA1

      5c6f3217b05f2c4879c015ffd570c73fcf73a8a2

      SHA256

      0da19aba5f4d372ab4b6cdf5a8e074bae916de0534ff7119d13b3624038d8a1d

      SHA512

      ad480b076c0ed1524469104415ef904108fd3b95ad6f70cabb3c84773da41daa353d865dad9acd9f5751003d783d8802ff635493bc8489ac1e488044b904f8fe

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3516.exe

      Filesize

      383KB

      MD5

      d77962af761566aa59498ab04729a810

      SHA1

      2bf98fcb45fda16593c636568767dfb80f51fe46

      SHA256

      50ed0a1c6d416d33ebfb120d69b92bd6b2c6802306fd4576fe9d22fc331b1c8b

      SHA512

      bce01df30147c969bc9256ec79244e0694764d74b0a5471ad168577585140170417c05e4ef62553551b500d45942b0bfb4b4d825972e3c7010b4ff3803ff7901

    • memory/2880-73-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-77-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-969-0x0000000007FA0000-0x00000000080AA000-memory.dmp

      Filesize

      1.0MB

    • memory/2880-968-0x0000000007900000-0x0000000007F18000-memory.dmp

      Filesize

      6.1MB

    • memory/2880-62-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-63-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-65-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-67-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-69-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-71-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-971-0x0000000008100000-0x000000000813C000-memory.dmp

      Filesize

      240KB

    • memory/2880-972-0x0000000008250000-0x000000000829C000-memory.dmp

      Filesize

      304KB

    • memory/2880-75-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-970-0x00000000080E0000-0x00000000080F2000-memory.dmp

      Filesize

      72KB

    • memory/2880-81-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-83-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-85-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-87-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-89-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-91-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-93-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-96-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-79-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/2880-60-0x0000000006FA0000-0x0000000006FE6000-memory.dmp

      Filesize

      280KB

    • memory/2880-61-0x0000000007770000-0x00000000077B4000-memory.dmp

      Filesize

      272KB

    • memory/3380-38-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-54-0x0000000000400000-0x0000000002B7E000-memory.dmp

      Filesize

      39.5MB

    • memory/3380-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3380-51-0x0000000000400000-0x0000000002B7E000-memory.dmp

      Filesize

      39.5MB

    • memory/3380-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3380-50-0x0000000002C60000-0x0000000002C8D000-memory.dmp

      Filesize

      180KB

    • memory/3380-49-0x0000000002E50000-0x0000000002F50000-memory.dmp

      Filesize

      1024KB

    • memory/3380-22-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-24-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-26-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-28-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-21-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-30-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-33-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-34-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-36-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-40-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-42-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-45-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-46-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-48-0x0000000007820000-0x0000000007832000-memory.dmp

      Filesize

      72KB

    • memory/3380-20-0x0000000007820000-0x0000000007838000-memory.dmp

      Filesize

      96KB

    • memory/3380-19-0x0000000007270000-0x0000000007814000-memory.dmp

      Filesize

      5.6MB

    • memory/3380-18-0x0000000004880000-0x000000000489A000-memory.dmp

      Filesize

      104KB

    • memory/3380-16-0x0000000002C60000-0x0000000002C8D000-memory.dmp

      Filesize

      180KB

    • memory/3380-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3380-15-0x0000000002E50000-0x0000000002F50000-memory.dmp

      Filesize

      1024KB