Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:57

General

  • Target

    366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe

  • Size

    479KB

  • MD5

    ef486ccc6db5f323638a22f5d3e09de1

  • SHA1

    06da0362843e45ebf70596a08b97589e10269bb0

  • SHA256

    366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575

  • SHA512

    d4b1111aca558b7d958693ddea16133e4b47afa97ee85347a0502b34e85b045c11a6f6ddcdc354d159e5c4e71bc7733143adc824be0442a24e2a7015dae75045

  • SSDEEP

    12288:uMrpy90dk57lIqw2Qvd3rKvnG77eSYuQzBD1kT:3ybzwXv5A5DB5M

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe
    "C:\Users\Admin\AppData\Local\Temp\366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8388898.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8388898.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2715721.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2715721.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6503885.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6503885.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8388898.exe

    Filesize

    307KB

    MD5

    bce5d734a57f984aef7a56a7f725ff03

    SHA1

    afe3b017c7195c999ca32d9d7eb0f970e821691a

    SHA256

    3d836046b5e08543e5f19474ac371559401f9cfbd930b25efe9c9e79fcb1da60

    SHA512

    41e788d045ce2fb352824eefea5f08c0c6fe5ee28474088edb317ec3cb96d9e467b9b19af53ba86b5f05fb8bc82ae9d6f5de90e84ca8981f789bb39422d24c43

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2715721.exe

    Filesize

    182KB

    MD5

    c36e89a40241202e0eb87fe36dd96ba3

    SHA1

    d62cd1842a3d80ee3dd2e5f78d407831c462c925

    SHA256

    4bdfb8216ea0655b3ac87c13408f7b143f91ffecdb267c2eccd117bc8681f6a6

    SHA512

    5a7f2499ae6d4a2707afcb85fa3c43d9d134acc2f7dabc680cca6aa83f45afa283aa00d67f45f09160aa4b3cc40671e30e520e07a7624c6030bfb7bc784a481f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6503885.exe

    Filesize

    168KB

    MD5

    35900c6d6b083730d55b281ce2549080

    SHA1

    2c4017ac2937d3834d7bdb663115abb16d69aa52

    SHA256

    2873631074bbda5b79042db900d6cc0f3710eedaed9caf6bdb2dba5947e8476b

    SHA512

    9001d98a7cad30de8bf332ed3a5f3986bff722de269c8d568ab555e3ff68adf1d07ceaeb8018d58b7176a98af9e86a1c1b2af72447d2718be644a729e13b4a5b

  • memory/3604-62-0x0000000005010000-0x000000000505C000-memory.dmp

    Filesize

    304KB

  • memory/3604-61-0x000000000AB60000-0x000000000AB9C000-memory.dmp

    Filesize

    240KB

  • memory/3604-60-0x000000000AB00000-0x000000000AB12000-memory.dmp

    Filesize

    72KB

  • memory/3604-59-0x000000000ABD0000-0x000000000ACDA000-memory.dmp

    Filesize

    1.0MB

  • memory/3604-58-0x000000000B090000-0x000000000B6A8000-memory.dmp

    Filesize

    6.1MB

  • memory/3604-57-0x0000000002ED0000-0x0000000002ED6000-memory.dmp

    Filesize

    24KB

  • memory/3604-56-0x0000000000D60000-0x0000000000D8E000-memory.dmp

    Filesize

    184KB

  • memory/4936-22-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-48-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-42-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-40-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-38-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-36-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-46-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-20-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-19-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-32-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-30-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-28-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-24-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-44-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-49-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/4936-50-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-52-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-47-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-26-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-34-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/4936-18-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4936-17-0x0000000002540000-0x0000000002558000-memory.dmp

    Filesize

    96KB

  • memory/4936-16-0x0000000004B20000-0x00000000050C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4936-15-0x0000000002140000-0x000000000215A000-memory.dmp

    Filesize

    104KB

  • memory/4936-14-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB