Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:14

General

  • Target

    2037bc614a456cad5b22f529be511740b10ec5aa638ddc555238d161c05a6251.exe

  • Size

    558KB

  • MD5

    72aece8a4c811ebd1ed5321dfb888eff

  • SHA1

    8e28484dadf1527a640a4a5c4670213eac0458db

  • SHA256

    2037bc614a456cad5b22f529be511740b10ec5aa638ddc555238d161c05a6251

  • SHA512

    e0e7e26b0102fb29de20393ff03a3cdfeb624ba7ef59cd4675753e3836e0a820e9280eac288a176e4e40d01d847310386ecc39372cbc8d645911a5476520e7c8

  • SSDEEP

    12288:eMrmy90Ans6I4STp/A1JxKvWrHtuBBZnxgK0i24Tx:YyJU4+/A1OvWrN6Z2XiDx

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2037bc614a456cad5b22f529be511740b10ec5aa638ddc555238d161c05a6251.exe
    "C:\Users\Admin\AppData\Local\Temp\2037bc614a456cad5b22f529be511740b10ec5aa638ddc555238d161c05a6251.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkOV4159rP.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkOV4159rP.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9064le.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9064le.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t53sd68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t53sd68.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkOV4159rP.exe

    Filesize

    414KB

    MD5

    b8169c8a610d3375663ac740099c28b2

    SHA1

    f1778cf0fd3ea647002e2b933a011a4df3a7847b

    SHA256

    c9e01f08d26d406fbb054aaea162327a65c5472489b5b732a3ef3cf5fede6a80

    SHA512

    9398a3340164d97310e63272a6d48a149fe0e0b4dd54e84ad5e90d5e6d15c618da3c9f0ac8e68ee8561e5d59078bdcf4c75cc28f166a60f51403e60c06aec3df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s9064le.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t53sd68.exe

    Filesize

    391KB

    MD5

    945b263a725208c255afd2b55d136e6a

    SHA1

    40c3b96eeee53351d23bb1eea75f42150f2c17ab

    SHA256

    dd66c64dfae20a40f719ead09ecf868f5ee504ada893de1b4a2e2f379e57cd6a

    SHA512

    f93a7c38f6216013ceceec7594aa72114b9c8a2cd304fc4fb3bd2a2515e81b3c507b6b78ba184e6ccf05049b831bca31f55d97614a8b02feaebdb1e0b3cbf293

  • memory/3372-14-0x00007FF92B323000-0x00007FF92B325000-memory.dmp

    Filesize

    8KB

  • memory/3372-15-0x0000000000240000-0x000000000024A000-memory.dmp

    Filesize

    40KB

  • memory/3372-16-0x00007FF92B323000-0x00007FF92B325000-memory.dmp

    Filesize

    8KB

  • memory/5100-84-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-70-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-24-0x00000000027C0000-0x0000000002804000-memory.dmp

    Filesize

    272KB

  • memory/5100-34-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-25-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-36-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-32-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-30-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-28-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-26-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-82-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-72-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-54-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-44-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-88-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-86-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-22-0x0000000002130000-0x0000000002176000-memory.dmp

    Filesize

    280KB

  • memory/5100-80-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-78-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-76-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-74-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-23-0x0000000004E20000-0x00000000053C4000-memory.dmp

    Filesize

    5.6MB

  • memory/5100-68-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-66-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-64-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-62-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-60-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-59-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-56-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-52-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-50-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-48-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-46-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-42-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-40-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-38-0x00000000027C0000-0x00000000027FE000-memory.dmp

    Filesize

    248KB

  • memory/5100-931-0x00000000053D0000-0x00000000059E8000-memory.dmp

    Filesize

    6.1MB

  • memory/5100-932-0x00000000059F0000-0x0000000005AFA000-memory.dmp

    Filesize

    1.0MB

  • memory/5100-933-0x0000000004D50000-0x0000000004D62000-memory.dmp

    Filesize

    72KB

  • memory/5100-934-0x0000000004D70000-0x0000000004DAC000-memory.dmp

    Filesize

    240KB

  • memory/5100-935-0x0000000004DC0000-0x0000000004E0C000-memory.dmp

    Filesize

    304KB