Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:39

General

  • Target

    b215e3ac6951b3d2d4274d07768b4722d224d0ae3936dc0102a8b5ad2276ed99.exe

  • Size

    479KB

  • MD5

    f11132db90eede19823e515d75bf4ce6

  • SHA1

    11a9760cb59a200b648e2464a5cafdcd7d88177b

  • SHA256

    b215e3ac6951b3d2d4274d07768b4722d224d0ae3936dc0102a8b5ad2276ed99

  • SHA512

    86c9a40180d30da1bebca41ffaa0e76b76cc6a6412532475808ea0c235f330313f1b4e8ac8d5a3641c2ace95b8b955c08e6cf4e6cfca2cf39ff61a3a905bee40

  • SSDEEP

    12288:pMr3y90clRHK4hxhQewfVvnL+41TbI3tZB:OytHKsxMVvL+KoB

Malware Config

Extracted

Family

redline

Botnet

maher

C2

217.196.96.101:4132

Attributes
  • auth_value

    c57763165f68aabcf4874e661a1ffbac

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b215e3ac6951b3d2d4274d07768b4722d224d0ae3936dc0102a8b5ad2276ed99.exe
    "C:\Users\Admin\AppData\Local\Temp\b215e3ac6951b3d2d4274d07768b4722d224d0ae3936dc0102a8b5ad2276ed99.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6410025.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6410025.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3703716.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3703716.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0507974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0507974.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6410025.exe

    Filesize

    307KB

    MD5

    7d93cd1ff850e9a8346a20c6f988233d

    SHA1

    300d4dcf089f47fa4473bb3b5d1a85dabb8f9a4d

    SHA256

    9b01447989e5d444a486e97816271ee561705382c8ae7ac8a2e9b5ad2d01c1da

    SHA512

    d2dbe88bd795e4d009e9cf9a3d6e75d02a565128735eecd1444b3f6e107738cb55b899a4beaf041d198c56fc4f8c08406e016a07c6b707d1e64650f301cd5044

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3703716.exe

    Filesize

    179KB

    MD5

    e1ba189576adae4d0bb5c65dba777ea4

    SHA1

    83097e47f315196f95eb3bfeffa4d99904c74422

    SHA256

    fc8d6b46c8724c8bda2ca7ad6a6059759aab2ac6e4e606fae7bba4168d559dd3

    SHA512

    06973b3f5a478a79ab4d854eaa0c4a6bc642d30b20e2eed95693469bfae92cb84704c4d642672c4b205a9505aa469acabde74b51069137449d10c5679f0f0597

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0507974.exe

    Filesize

    168KB

    MD5

    8f675a4418f46b5fcaef2dd2c82bc154

    SHA1

    fb022f8cb13408d4c8decd02751c3f86aeee3c19

    SHA256

    fd546c799cfa94a93e013c231bf8378362ed8abb2cc4a0adf6ff7b37ee2c0c78

    SHA512

    6859a3e516678a98b05f9dff61b033017ebf4ae444970dbfb78bb14bfc1e3dd3b3390636b976658506b890898f08e7d81829b4ff3af249d71a4e034615850edb

  • memory/2212-62-0x00000000043B0000-0x00000000043FC000-memory.dmp

    Filesize

    304KB

  • memory/2212-61-0x0000000009E30000-0x0000000009E6C000-memory.dmp

    Filesize

    240KB

  • memory/2212-60-0x0000000009DD0000-0x0000000009DE2000-memory.dmp

    Filesize

    72KB

  • memory/2212-59-0x0000000009EE0000-0x0000000009FEA000-memory.dmp

    Filesize

    1.0MB

  • memory/2212-58-0x000000000A3F0000-0x000000000AA08000-memory.dmp

    Filesize

    6.1MB

  • memory/2212-57-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/2212-56-0x0000000000030000-0x0000000000060000-memory.dmp

    Filesize

    192KB

  • memory/3116-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-48-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-25-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-44-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-49-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB

  • memory/3116-50-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/3116-52-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/3116-46-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/3116-20-0x0000000004AC0000-0x0000000004AD8000-memory.dmp

    Filesize

    96KB

  • memory/3116-18-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/3116-19-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/3116-17-0x0000000004B10000-0x00000000050B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3116-16-0x00000000749C0000-0x0000000075170000-memory.dmp

    Filesize

    7.7MB

  • memory/3116-15-0x0000000004A00000-0x0000000004A1A000-memory.dmp

    Filesize

    104KB

  • memory/3116-14-0x00000000749CE000-0x00000000749CF000-memory.dmp

    Filesize

    4KB