Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:55

General

  • Target

    18c3998cacb135653bc628a2baba325d65f7cc6db520c2093bd315378085c7c4.exe

  • Size

    531KB

  • MD5

    e02c26a39953e257e6f5029748366daf

  • SHA1

    1a18c60dec2f2e49a5f4babef9927f21b50a1bc7

  • SHA256

    18c3998cacb135653bc628a2baba325d65f7cc6db520c2093bd315378085c7c4

  • SHA512

    e899a6142648dce038acc7778539b045e9f0d0b64fa27ee4ccfce4f7ccda31eacc5f4bc1f2f20b5965bbc715c06ec8c94ac89ff48206e41e6dca788c475af7cb

  • SSDEEP

    12288:WMryy90PcpEJq2k1SpnuTE2Nm8ptEAOfdIEOOlRL0:UyJEJq+uTE2sytTOFI5MZ0

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18c3998cacb135653bc628a2baba325d65f7cc6db520c2093bd315378085c7c4.exe
    "C:\Users\Admin\AppData\Local\Temp\18c3998cacb135653bc628a2baba325d65f7cc6db520c2093bd315378085c7c4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPm9534th.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPm9534th.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf96uT48Mg28.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf96uT48Mg28.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72nC72mf41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72nC72mf41.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhPm9534th.exe

    Filesize

    386KB

    MD5

    e917be2bb4fbd59445a21e6528e05a2e

    SHA1

    82f6252a88d6111754d76efc35afda5ef668ae29

    SHA256

    6980b5d034268ca0ecf240268001c9abd6b959e70461abdad7f42fdf6e78c709

    SHA512

    443c3a506ed52f0158975e19b071bb63ef80a47a4f80b6a8c4bda0c81e7cb2a832eee7d2fb21c4642006065c310a59bbdc271711d2fbd9e5af3d4ee20d24a845

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf96uT48Mg28.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72nC72mf41.exe

    Filesize

    288KB

    MD5

    a2389b490db029957c7a571d7858d21b

    SHA1

    4eaf0f744ac9fab48d89259ee51ffb13534631ed

    SHA256

    b663fd624820be2417c7252aac74fb054f04fad76aff8cd82f624bc43dd440fb

    SHA512

    d38a46a900c7df0b6b5398476b498db12d5e24217f337cc332741b37b4a55853911194012694eeacbdc98b7d93be80dbcccea6b961bcb9beeb70b3fd589e4279

  • memory/3580-60-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-22-0x0000000004C20000-0x0000000004C66000-memory.dmp

    Filesize

    280KB

  • memory/3580-935-0x0000000005C50000-0x0000000005C9C000-memory.dmp

    Filesize

    304KB

  • memory/3580-54-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-23-0x0000000004DD0000-0x0000000005374000-memory.dmp

    Filesize

    5.6MB

  • memory/3580-24-0x0000000004CA0000-0x0000000004CE4000-memory.dmp

    Filesize

    272KB

  • memory/3580-84-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-88-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-86-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-82-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-58-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-78-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-52-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-74-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-72-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-71-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-68-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-64-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-62-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-934-0x0000000005B00000-0x0000000005B3C000-memory.dmp

    Filesize

    240KB

  • memory/3580-80-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-933-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

    Filesize

    72KB

  • memory/3580-76-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-50-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-48-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-44-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-42-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-40-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-38-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-36-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-34-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-32-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-30-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-28-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-26-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-66-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-56-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-46-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-25-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/3580-931-0x0000000005380000-0x0000000005998000-memory.dmp

    Filesize

    6.1MB

  • memory/3580-932-0x00000000059A0000-0x0000000005AAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4832-16-0x00007FFFF2FD3000-0x00007FFFF2FD5000-memory.dmp

    Filesize

    8KB

  • memory/4832-14-0x00007FFFF2FD3000-0x00007FFFF2FD5000-memory.dmp

    Filesize

    8KB

  • memory/4832-15-0x0000000000E80000-0x0000000000E8A000-memory.dmp

    Filesize

    40KB