Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:24

General

  • Target

    301ede0d52356c600e510493e741e36532aacc8b4864e188eed25beb3a8d3686.exe

  • Size

    560KB

  • MD5

    3993aa691659d72099814d6d8f4b2a32

  • SHA1

    b66d9c2359b92b3cb33520d0bfba4f7988d4f018

  • SHA256

    301ede0d52356c600e510493e741e36532aacc8b4864e188eed25beb3a8d3686

  • SHA512

    10acd16cf86e89e006ec3b3dcc0577ee023f9e403973d02a9d3203d59d4a099f3cd6615fd07ca72ae865164460343ee1a21e02178bd71fcc57c9ed6ddf0c321e

  • SSDEEP

    12288:bMrey90kEvqVI7+s8aGhGDK83qyy0JGB88WCfchTOuntCFA2h:5yiSVqTtb3qyfc5WCkROuntsh

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301ede0d52356c600e510493e741e36532aacc8b4864e188eed25beb3a8d3686.exe
    "C:\Users\Admin\AppData\Local\Temp\301ede0d52356c600e510493e741e36532aacc8b4864e188eed25beb3a8d3686.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhst6994VG.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhst6994VG.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf69Uh62LF97.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf69Uh62LF97.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf69Au82nf21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf69Au82nf21.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhst6994VG.exe

    Filesize

    415KB

    MD5

    70a2ec60e00d4e13e0518468ad12e114

    SHA1

    68fb09aad760885f08726f71dd42d0a82d25ae7f

    SHA256

    2bd0ef984e31a564d6c37df3102d35fd62ba4003b0cf4470ea285549a4db28e6

    SHA512

    b0b69bed49853b329c947bf43f85d4ef5b30c56c6bb155c51e342aff7ccfe6915455d331045bd857eda003679f6ee6d1fd761fd2e2d5c1b78a68e6a428a94de3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf69Uh62LF97.exe

    Filesize

    11KB

    MD5

    cf605ce1483b04336a810286d2774a46

    SHA1

    99711b2041f39879c8f5b7895ad283e080dd1047

    SHA256

    507a5b1c6383bf48782cc1d4b62220190c555c257c595604599dd8c1cd998606

    SHA512

    bbf05852d9e3231ee9c9bbc52bb24773cbba7fda0964cec946ec4bb0bb81cab82909d6c6d34a8661fda38a73ab9ce5af3f5308219bb6568128cb73784c5741dd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf69Au82nf21.exe

    Filesize

    415KB

    MD5

    79645f4c4f6de9b74ca0120b7a2ff217

    SHA1

    e093a94b5415be8ebbc90a52807b811eb339823e

    SHA256

    cfa90800c04f1f257f52d7f8d63b001b37796b3f1da67b271d6c76feeda8306a

    SHA512

    13ae7f81ffa0ff1196334f870cdcaa7ac46be0bd6de36caceda5251b77a3dac0ccc8b33dc2ec7ca4a06bb96bf5017d68ea74ba373ebcdebf0e9318bb11803cd0

  • memory/2424-14-0x00007FFBE8773000-0x00007FFBE8775000-memory.dmp

    Filesize

    8KB

  • memory/2424-15-0x0000000000760000-0x000000000076A000-memory.dmp

    Filesize

    40KB

  • memory/2424-16-0x00007FFBE8773000-0x00007FFBE8775000-memory.dmp

    Filesize

    8KB

  • memory/4796-64-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-52-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-24-0x0000000004EC0000-0x0000000004F04000-memory.dmp

    Filesize

    272KB

  • memory/4796-58-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-74-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-88-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-86-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-84-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-82-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-80-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-78-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-76-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-72-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-70-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-68-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-66-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-22-0x0000000004E40000-0x0000000004E86000-memory.dmp

    Filesize

    280KB

  • memory/4796-62-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-60-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-56-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-54-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-23-0x0000000007480000-0x0000000007A24000-memory.dmp

    Filesize

    5.6MB

  • memory/4796-50-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-48-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-46-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-44-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-42-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-40-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-36-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-34-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-32-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-30-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-28-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-38-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-26-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-25-0x0000000004EC0000-0x0000000004EFE000-memory.dmp

    Filesize

    248KB

  • memory/4796-931-0x0000000007A30000-0x0000000008048000-memory.dmp

    Filesize

    6.1MB

  • memory/4796-932-0x0000000008050000-0x000000000815A000-memory.dmp

    Filesize

    1.0MB

  • memory/4796-933-0x0000000007440000-0x0000000007452000-memory.dmp

    Filesize

    72KB

  • memory/4796-934-0x0000000008160000-0x000000000819C000-memory.dmp

    Filesize

    240KB

  • memory/4796-935-0x00000000082A0000-0x00000000082EC000-memory.dmp

    Filesize

    304KB