Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:13

General

  • Target

    af1bafe409249580f4e86a90b3a1e06b1eda642f386b070b809bdef2955fc413.exe

  • Size

    682KB

  • MD5

    c2f15b7dc410ebbee07cfeabee93cab7

  • SHA1

    a3ba16320549034a193bfd3a4c3df4a5b65efd95

  • SHA256

    af1bafe409249580f4e86a90b3a1e06b1eda642f386b070b809bdef2955fc413

  • SHA512

    db9d4145f165fb85578b38bfd81dd577b01c62c451ff24e9e829b7e628fbf1defcb55ac4b787d984b124c862cd73575d9f15cfb9c4591f8697d487b108621e99

  • SSDEEP

    12288:oMrsy902JuH0oPocpdHuOnk+B2Y8bqjq5Ri1inqw2RId:Ey0HDPocruOnH/8bvRi1inqw2R6

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af1bafe409249580f4e86a90b3a1e06b1eda642f386b070b809bdef2955fc413.exe
    "C:\Users\Admin\AppData\Local\Temp\af1bafe409249580f4e86a90b3a1e06b1eda642f386b070b809bdef2955fc413.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908144.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908144.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1076.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1076.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1826.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:396
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908144.exe

    Filesize

    540KB

    MD5

    6cdf901d18c4603d36ce6d876e5089fd

    SHA1

    a27f851d8c1a63bfd0f69c53ae04b18115126f8a

    SHA256

    529e44dc526dc1f11082b6acf0525ea00b247d8018443cebd5c8b14ad9678a80

    SHA512

    2ff175ab4be51057470ac27a966e093d99e753f6444b6e88e321dc53680623d77f65a8f9998f0c18f0b249791fb90c51404fef0bb03a82d5a403092b8d7dec35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1076.exe

    Filesize

    322KB

    MD5

    56aa8d272849dbafba2fad4b3a46abba

    SHA1

    393991744b981b592d0390025f1f9ea7de82450f

    SHA256

    cc45b5ba18bb37bb31264b07a19bab1e0d275179e238985bdab015a3f7dcab3e

    SHA512

    b8c0eec9815c7ecc46ced41dba9f8cedaf18e1bbe595acb5b3b32c1f32ab31e84f0752f13b788f93b852159530e1ecffd3eee0f96549f76feb9324dead098702

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1826.exe

    Filesize

    379KB

    MD5

    7c5235aed1c440dbbc6b06148a003a39

    SHA1

    77dfb5818ec0a86666a785d149f7abbe6536eaae

    SHA256

    b68c886c0f1556c29717d2407bd9804026a0094d5ec3efacba9907f042581503

    SHA512

    287131ab3b07cf960256c3f8b31c762aae984c1038540bd438795690c05f8fd79984d11bc28a780c5dacab089ff21b59db4b72cf28b2cc5f91f4379ea58e1536

  • memory/396-79-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-83-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-972-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB

  • memory/396-968-0x00000000077E0000-0x0000000007DF8000-memory.dmp

    Filesize

    6.1MB

  • memory/396-67-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-69-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-71-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-73-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-75-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-77-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-970-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/396-969-0x0000000007E60000-0x0000000007F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/396-81-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-971-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

    Filesize

    240KB

  • memory/396-85-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-87-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-89-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-91-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-93-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-95-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-62-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-63-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-65-0x00000000077A0000-0x00000000077DE000-memory.dmp

    Filesize

    248KB

  • memory/396-61-0x00000000077A0000-0x00000000077E4000-memory.dmp

    Filesize

    272KB

  • memory/396-60-0x0000000007110000-0x0000000007156000-memory.dmp

    Filesize

    280KB

  • memory/728-37-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-54-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/728-55-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/728-51-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/728-52-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/728-50-0x0000000002C50000-0x0000000002C7D000-memory.dmp

    Filesize

    180KB

  • memory/728-49-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

    Filesize

    1024KB

  • memory/728-48-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-21-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-22-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-24-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-26-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-28-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-30-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-32-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-34-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-38-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-40-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-42-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-46-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-44-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/728-20-0x00000000049E0000-0x00000000049F8000-memory.dmp

    Filesize

    96KB

  • memory/728-19-0x00000000072D0000-0x0000000007874000-memory.dmp

    Filesize

    5.6MB

  • memory/728-18-0x00000000047F0000-0x000000000480A000-memory.dmp

    Filesize

    104KB

  • memory/728-17-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/728-16-0x0000000002C50000-0x0000000002C7D000-memory.dmp

    Filesize

    180KB

  • memory/728-15-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

    Filesize

    1024KB