Analysis

  • max time kernel
    148s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:28

General

  • Target

    9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe

  • Size

    1.1MB

  • MD5

    d9b3578cb8831a40d68e391b0eb7169e

  • SHA1

    7fd8d8c17c747c0c59e34be8c6a2c49a6d233372

  • SHA256

    9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16

  • SHA512

    7ff544e9cfca0c723c6488bd9be105c29a09fdab1b4d4c11965d5e8fcb5763690cf63b3156a14531bc956b548a5b20b58e8da9a27a812d619937f5f3037d27ef

  • SSDEEP

    24576:fyLTyul17HVMuHvAERcxXCCG8/Lj7XyW709ALQtjPsg:qLTyuHABz/LjeoGALQdU

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe
    "C:\Users\Admin\AppData\Local\Temp\9ac0264c0eb9ad11c008e3b95b43c8fdb20a375a8b1b222249b48e9ececb1e16.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plln69ze58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plln69ze58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzO01Ag92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzO01Ag92.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plEw08dB76.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plEw08dB76.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYc63Sf65.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYc63Sf65.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2888
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\busO06sd21.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\busO06sd21.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4132
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRm23ku87.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRm23ku87.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plln69ze58.exe

    Filesize

    985KB

    MD5

    a579441d45ff529ec9bfc87d4e803d3b

    SHA1

    62efb95ec72fe11cdb7e089b92bf813116e28956

    SHA256

    e9a405338d30f7dc136838284edf7aa2e0ee78d6985a42d85b31c5e993bf9571

    SHA512

    b684ef14253c74eb1cf566233b799c94f0e5b0d60757faaf3a7e12ef56dd0dc91e76097a0b4712e9b9479b2f0fe7745bf0d38f5a946d6450b15660d31f6e7187

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plzO01Ag92.exe

    Filesize

    885KB

    MD5

    339c53d89e52dafcefe6ec1c4d9ae713

    SHA1

    514748f7c6b19b26cda435c385375f5a0fb2bda4

    SHA256

    b692d0901626e7583f15e2ca7b17a607cd248e02adbe1df63acad1e3e7e57572

    SHA512

    abefad21a4a7de93b6c7c0cf8fd5aeb125b6c0cc5462c5d5dcd6fd3ba88c5abe146921eb79fe6e8a9802b7e971c73db63a14594706da82358cdc0411361613a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plEw08dB76.exe

    Filesize

    661KB

    MD5

    62071b1fb070202e195b7a7e88b471c4

    SHA1

    a9b35508baab3470c57daf4dc8f41f769a4b8c68

    SHA256

    a87a3a9d55939e77689974bb2b8d72a4f567b44d9ea648b07c2dc1d2580c4eb2

    SHA512

    07cbb34049d6118426618129f2fc850584588ab58fa01abec86447086539ddd072abecbc72c8f72a72563d435d0afdc6888c142b0cd87695fe94ec9d42784380

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plYc63Sf65.exe

    Filesize

    389KB

    MD5

    8b1be3036b7f84c566d2ba4adac54405

    SHA1

    8a9d54e0011cb711252cdd0e80ae7052453d819b

    SHA256

    13d30d981410d737b89144ff7cb9ffcc9d3e3f8e6261641330c7a6b09af5f663

    SHA512

    75d50e765f18ac4b427c56fc82f9f1435823976415e0af6d3f9db41aa9da311690d6b62ba10f413100f122d62b6f1c8af2f29ccf3b6fd1f7189e8fdada45e302

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\busO06sd21.exe

    Filesize

    11KB

    MD5

    2bc53be68540feae2531f8d8646412f3

    SHA1

    f47017b31762c12d905383fd42404657e78bc0dc

    SHA256

    7bb32a032817d13005d548d23f7c14258074926d17c614935cd9a65e1e80e12c

    SHA512

    6b26f0272433f688ad6bc1103437a561ea750056df916644cc222f6d78572596a6c8d379228d83c809af7c723c8afa525a3adbc44f00213f849daa38bf58372a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRm23ku87.exe

    Filesize

    306KB

    MD5

    9792900c815b23017f946773359ebe08

    SHA1

    15629567cf9023b6a9a7a4b69a805e8314a6bb2d

    SHA256

    edbe4131b7bd5f130c9650d2585d97337834a62073e58fcce4d3b6d2f95d3907

    SHA512

    cf27fc151b7d74daebdad990da0e26bea2337d2b2b90b2d5586343c077e9540e3f1a0a94099b603ffe4eaf6263e864e009795ec4ff900063237d6b44b0ec7465

  • memory/1572-81-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-75-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-42-0x0000000004D00000-0x00000000052A4000-memory.dmp

    Filesize

    5.6MB

  • memory/1572-43-0x0000000004CA0000-0x0000000004CE4000-memory.dmp

    Filesize

    272KB

  • memory/1572-45-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-53-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-107-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-105-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-103-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-101-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-99-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-95-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-93-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-91-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-89-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-87-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-85-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-83-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-954-0x0000000005C50000-0x0000000005C9C000-memory.dmp

    Filesize

    304KB

  • memory/1572-79-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-77-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-41-0x0000000002660000-0x00000000026A6000-memory.dmp

    Filesize

    280KB

  • memory/1572-73-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-71-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-67-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-65-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-63-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-61-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-59-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-57-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-55-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-51-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-49-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-47-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-97-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-69-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-44-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1572-950-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/1572-951-0x00000000059A0000-0x0000000005AAA000-memory.dmp

    Filesize

    1.0MB

  • memory/1572-952-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

    Filesize

    72KB

  • memory/1572-953-0x0000000005B00000-0x0000000005B3C000-memory.dmp

    Filesize

    240KB

  • memory/4132-35-0x0000000000330000-0x000000000033A000-memory.dmp

    Filesize

    40KB