Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:54

General

  • Target

    108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe

  • Size

    479KB

  • MD5

    cfcb3b5b973e36f4b6fd4654c2f0e8d7

  • SHA1

    362839e94495c414a7bd8b16b2aee04206e3a8c5

  • SHA256

    108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967

  • SHA512

    ead9bc442a3503a196253e9900a67f216b7f54bbd5dc1e679114ac843ab30ab3147686eb61966b6b216bf18af88dc9eb998d038d7ce963887350f8e694ddf93a

  • SSDEEP

    12288:jMrAy90FA0FMlyAp/6Sbyhd4Ae1c8UDCTXEgsgeUGHRj:7y0Ar/6SDO8UDCT7Gxj

Malware Config

Extracted

Family

redline

Botnet

diwer

C2

217.196.96.101:4132

Attributes
  • auth_value

    42abfa9e4f2e290c8bdbc776fd9bb6ad

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe
    "C:\Users\Admin\AppData\Local\Temp\108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1422160.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1422160.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2800525.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2800525.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0689521.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0689521.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4848
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1422160.exe

    Filesize

    307KB

    MD5

    4c497bfa4edd61bd994ea66c3285d2c0

    SHA1

    d7de854efd8072f59a22c4779ee3b059c2069987

    SHA256

    829c9746aa88c0542c60a64697ac615759d8ad68bf1d7d1cab7a714b53567d27

    SHA512

    09f1466bcc5881f1456b6d5de3b72699964aeb403f20aca5a99dd5463199e468043f4dd83b91c9e5762692f98fdfb045222fe479992003bf27c6d2cf44f3881f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2800525.exe

    Filesize

    177KB

    MD5

    fb703222850b77d739730e4633efc0b0

    SHA1

    93c4f3a161c4f47a5d1a27789abca8812b4172df

    SHA256

    6bcb7749bb66ec02ad6711efb4a6951cf87ddd9bef581a94c9d9b3a35d67a829

    SHA512

    d525c29d77b307afc20052168c708ed455053e722d3272cdc507a55577c7d6a83cf0b85d1b7cac615c017467579b4e6bf3369d232f76574b8ed5264d2812d121

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0689521.exe

    Filesize

    168KB

    MD5

    94d0eb5adbb9d2b50891c3e6b2d377ca

    SHA1

    514f510bfc32e7aa2f7fd7704025a0c7681606db

    SHA256

    56bbfeec817eaa26684bc89f296a24acd16fdf551db71648cdbedaa56c7c7f1a

    SHA512

    49817f20d454ee19ce40fe43a192c0d08911b69fac12f5b7b63abfe915a567e50e4f80af44457d509e268f096cca7da31a99d7174b02384107121cf2b63d0f10

  • memory/1160-30-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-26-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-17-0x0000000004B40000-0x00000000050E4000-memory.dmp

    Filesize

    5.6MB

  • memory/1160-18-0x0000000004980000-0x0000000004998000-memory.dmp

    Filesize

    96KB

  • memory/1160-44-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-46-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-42-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-38-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-36-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-34-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-32-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-15-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/1160-29-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-16-0x00007FFBE2950000-0x00007FFBE2B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1160-24-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-22-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-20-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-19-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-40-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/1160-48-0x00007FFBE2950000-0x00007FFBE2B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1160-14-0x00007FFBE2950000-0x00007FFBE2B45000-memory.dmp

    Filesize

    2.0MB

  • memory/4848-52-0x0000000000370000-0x00000000003A0000-memory.dmp

    Filesize

    192KB

  • memory/4848-53-0x00000000025C0000-0x00000000025C6000-memory.dmp

    Filesize

    24KB

  • memory/4848-54-0x000000000A7D0000-0x000000000ADE8000-memory.dmp

    Filesize

    6.1MB

  • memory/4848-55-0x000000000A320000-0x000000000A42A000-memory.dmp

    Filesize

    1.0MB

  • memory/4848-56-0x000000000A250000-0x000000000A262000-memory.dmp

    Filesize

    72KB

  • memory/4848-57-0x000000000A2B0000-0x000000000A2EC000-memory.dmp

    Filesize

    240KB

  • memory/4848-58-0x0000000002380000-0x00000000023CC000-memory.dmp

    Filesize

    304KB