Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:23

General

  • Target

    c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b.exe

  • Size

    1.1MB

  • MD5

    de71c5f1a6451e3b8b1e8f321ddc98e3

  • SHA1

    f2684f1e4c9b53b28196952979179d37f2a756b0

  • SHA256

    c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b

  • SHA512

    dc2c8c4680d6d4a15d81a8bde2f40ab7061bc8ccb0d8cd3defa9a8ba20647f7a937add942761db38cf2298e53beec39a6384a70c19f0f5d7c324bd66a539f4be

  • SSDEEP

    24576:MypTyccchID79eGqzt4YzpJmknf+HJ8CdQ:7ps+ID78G8zbmknf+H1d

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b.exe
    "C:\Users\Admin\AppData\Local\Temp\c497b020b46af87bb55c627357f5a4ff2d2b40427634a112ed7c336bcb34b23b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plku03VQ91.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plku03VQ91.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMY44ss91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMY44ss91.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plED51ia84.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plED51ia84.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwj23yN28.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwj23yN28.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3500
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buiX79ZW51.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buiX79ZW51.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4672
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\carY51Ao85.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\carY51Ao85.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:3988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plku03VQ91.exe

          Filesize

          1018KB

          MD5

          db5c6afb7b61d8c09ccedf21cb0f5fa3

          SHA1

          83ad989f879b2147b5c626d03b16ac7590e95446

          SHA256

          2dded9b33295703636b1572f336c53f887673e4fe4f907f79415d131a63c29f7

          SHA512

          feaeadece129a3b0e8059d0906f9c6b40ada18d750e721a29efc44d449d4ede13389b3cd9875ac5fe112651fb126867df7b195ee9eec3637320dd6070b13bf09

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plMY44ss91.exe

          Filesize

          926KB

          MD5

          dfd91305be7948f076f0328d985cac8d

          SHA1

          d1bb1f4acd4e6ffacc9bb3b5dbf0248dfb7ffbe5

          SHA256

          2e1e8aef8d7bdfefbd6803fbba5a5186f1a3a69c360b129059e6c67856f12379

          SHA512

          e18a7472625481481ef7bb737507facfa47c12f6382949e4007e6a53b15c185c1b64f7541a0a5d05a23a99032e3eaeaaba079325b44ae3607a9712b4a3acda80

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plED51ia84.exe

          Filesize

          660KB

          MD5

          7dd5f168aca8aa0c06bf42c12fb4ea8c

          SHA1

          6ebee77862765fd840f8a36ded44f75a073b637b

          SHA256

          0fe899f4f1158ec0cc6bf8257fec58ab24e37de8e65417f7305702eda773da4b

          SHA512

          861fbd51f5c6cba2d0da82fe0c62bef02faffe32f0b9e675e59ece95ac39d22b2bc3437321edb387e79df250420f4d561fb2196ca3cba27d7dd9ebd8008607ea

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plwj23yN28.exe

          Filesize

          388KB

          MD5

          3939b865246522cb95aeb64ebfc22209

          SHA1

          1a948bc7bc5996a16870f905a1c0047bcf7690a9

          SHA256

          401c4c8328319fdb00bc25a4939f27bf2f9cccf79fe80ff3f13e2a02cbdf84ee

          SHA512

          22d0900a8b977070fbc26f09198d8ad416d8e9afc6f6af1d59568a054bd2eb4f6b7f61c173b0a918eab8c3d09c67c873bcea9dbbaff7807f0052cbd33596e133

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buiX79ZW51.exe

          Filesize

          11KB

          MD5

          5836fc971ad0e822e318efbd37c22203

          SHA1

          c04bbdbf90ba13e3da5ee5b52ad8fb04be0d507f

          SHA256

          c293f1536e043931e997f04839e1eed545c977a71879127ef5dcf5a90929b0fc

          SHA512

          909f763578e5a9287fb544d660151df31cf73302ee0104a5517766e2b419a76793ce5b32a0fe8b0f4cb3ae22bf7d9e44d4f06cdf40c16c0d443d6531e982f928

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\carY51Ao85.exe

          Filesize

          305KB

          MD5

          e11ed6fc64ebc2ac86e3a4e39aa0b6b6

          SHA1

          ad61736c537f06c5eda7ae7064b55a37b514eea1

          SHA256

          8b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695

          SHA512

          43e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880

        • memory/3988-81-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-75-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-42-0x0000000004B90000-0x0000000005134000-memory.dmp

          Filesize

          5.6MB

        • memory/3988-43-0x0000000005180000-0x00000000051C4000-memory.dmp

          Filesize

          272KB

        • memory/3988-44-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-57-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-103-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-107-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-105-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-101-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-99-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-97-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-95-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-91-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-93-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-89-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-87-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-83-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-954-0x0000000005C50000-0x0000000005C9C000-memory.dmp

          Filesize

          304KB

        • memory/3988-79-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-77-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-41-0x0000000002750000-0x0000000002796000-memory.dmp

          Filesize

          280KB

        • memory/3988-73-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-71-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-69-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-65-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-63-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-61-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-59-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-55-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-53-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-51-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-49-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-47-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-45-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-85-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-67-0x0000000005180000-0x00000000051BE000-memory.dmp

          Filesize

          248KB

        • memory/3988-950-0x0000000005300000-0x0000000005918000-memory.dmp

          Filesize

          6.1MB

        • memory/3988-951-0x00000000059A0000-0x0000000005AAA000-memory.dmp

          Filesize

          1.0MB

        • memory/3988-952-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

          Filesize

          72KB

        • memory/3988-953-0x0000000005B00000-0x0000000005B3C000-memory.dmp

          Filesize

          240KB

        • memory/4672-35-0x00000000007B0000-0x00000000007BA000-memory.dmp

          Filesize

          40KB