Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:40

General

  • Target

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe

  • Size

    560KB

  • MD5

    dfe366e83e0734432ae0d34d4084bf2f

  • SHA1

    eeb9fa9d7c608b2ff32f9e05aee51d7086010f76

  • SHA256

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

  • SHA512

    48d8cad9d449bf8da02a408b14324fc00c4a9d05198b57d34a4bf9b83b94c244ed86956f72174d6f010d352f42b22c324a0f604fbf02f8a45391ccf96292e3cd

  • SSDEEP

    12288:zMrNy90zV/haONjJzyKuWx8NDryqTd1u6yBx5rkE4Lh:uyEnNRyK7eJug1unBx5rkZt

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe
    "C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe

    Filesize

    415KB

    MD5

    7c80fc48674f3dfff6bc05ad8a71d15b

    SHA1

    d61a5800c2831deed711e5be8d3460bb7ff9afee

    SHA256

    e4cacd065c73bf5c022b0b961f3777e069bfaa4187843e345b20010e06d1c604

    SHA512

    bece4681615fb7a8ca132b7473feeea9e378cac734a35771ce6fcf5264e1f855793f0d03d59c253a5ee279c751eaca3c55aeab80595f3d4124ca44f205be00cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe

    Filesize

    11KB

    MD5

    8d81e111cd05bea98c0b430e1cc3a382

    SHA1

    485eeefc15c6dfc9f929cb92870a6bcd30979590

    SHA256

    cd59155f0f491654a54dfd0abf0820f2baaab9f37dac537963a6902e37afbb6a

    SHA512

    debaeb28a53cc19eccfdabc5c70c0315a4b4137d905c77b51023dfbfe474710fbf0a2ac0c7f9b44caa1fb6437610ad568edc893a281f548ccff56d2b86c865d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe

    Filesize

    416KB

    MD5

    197d8f3be31e2a0e255e510348dccf49

    SHA1

    c55404597c3904b99ebb6eac727feeef78fda213

    SHA256

    e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c

    SHA512

    efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2

  • memory/3652-14-0x00007FFAB1163000-0x00007FFAB1165000-memory.dmp

    Filesize

    8KB

  • memory/3652-15-0x0000000000BC0000-0x0000000000BCA000-memory.dmp

    Filesize

    40KB

  • memory/4024-67-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-59-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-23-0x0000000004ED0000-0x0000000004F14000-memory.dmp

    Filesize

    272KB

  • memory/4024-29-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-27-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-25-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-24-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-37-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-87-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-85-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-83-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-81-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-79-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-75-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-73-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-71-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-69-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-21-0x0000000004E20000-0x0000000004E66000-memory.dmp

    Filesize

    280KB

  • memory/4024-65-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-63-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-61-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-22-0x0000000007360000-0x0000000007904000-memory.dmp

    Filesize

    5.6MB

  • memory/4024-57-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-53-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-51-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-47-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-46-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-43-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-41-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-39-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-35-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-33-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-31-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-77-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-55-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-49-0x0000000004ED0000-0x0000000004F0E000-memory.dmp

    Filesize

    248KB

  • memory/4024-930-0x0000000007950000-0x0000000007F68000-memory.dmp

    Filesize

    6.1MB

  • memory/4024-931-0x0000000007FF0000-0x00000000080FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4024-932-0x0000000008130000-0x0000000008142000-memory.dmp

    Filesize

    72KB

  • memory/4024-933-0x0000000008150000-0x000000000818C000-memory.dmp

    Filesize

    240KB

  • memory/4024-934-0x00000000082A0000-0x00000000082EC000-memory.dmp

    Filesize

    304KB