Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 22:42

General

  • Target

    236ae9499a22859e72ad518dda60ca0e9ef3a496e66e6e5f0cf108536273ba42.exe

  • Size

    479KB

  • MD5

    4d2d451e58649e3d1a84a9b42aa6a1b7

  • SHA1

    bb5096979b038b18c4c0b977f9f484313ba33948

  • SHA256

    236ae9499a22859e72ad518dda60ca0e9ef3a496e66e6e5f0cf108536273ba42

  • SHA512

    d17766f3a1efd8e0b073ba1407d2fc6d0c9964a1f2727bf0f3a160de51d6f5a021a2211f5dc9e7ac9f3959d9f310f18dcedec38b9d604ed1f862479345068277

  • SSDEEP

    12288:9Mrjy90l9TsszQGVGK92oWYjugjVE21ckD28u++4Qgwo4:Gyo1B9tWFCPck3u3J

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\236ae9499a22859e72ad518dda60ca0e9ef3a496e66e6e5f0cf108536273ba42.exe
    "C:\Users\Admin\AppData\Local\Temp\236ae9499a22859e72ad518dda60ca0e9ef3a496e66e6e5f0cf108536273ba42.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4465462.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4465462.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5615967.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5615967.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9534423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9534423.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4465462.exe

    Filesize

    307KB

    MD5

    38de31e0565b06e130db78c40a6981dc

    SHA1

    f041b713d514d8c14faad80ad72e21b05c0b14a5

    SHA256

    68f2696de1b63e5dbb382597b33680d215d8609b891518b118dd67dd06d799e5

    SHA512

    ecae8971efeefad03f12b8fe48855c77221ca2957d7faa7ca6d4d018ad5070d5912a251b4f162bad9bf45a3a926873f162a4031c5f6117621a5d3cbaae306c23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5615967.exe

    Filesize

    180KB

    MD5

    37683d897eee92c9b195d172be1a8013

    SHA1

    7f30621daf6937896262c372be4f992df5dbae31

    SHA256

    3b19ff7c92d77fb092d31bb83d1b01401598ce76d9799cdb04dcaca418ae84a3

    SHA512

    0010a65b45935cf1cbcba39f4e40f35438727ee63d2f4272af7edcd7171b7eba6ac87a7da67674afe63c9d6c38fc94c05c81894a13f66c7eedac16b8710f6b52

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9534423.exe

    Filesize

    168KB

    MD5

    ff1676801fcd2e310d9070a9e406ed36

    SHA1

    5bdc5bd16385b4f5880ac8434552d459b858ee7e

    SHA256

    6db76b5fe626e0076fa844a7ac60182a986962397a7a2d361e9058a77ed358da

    SHA512

    631f589db9ba1bac705acc3c1723e41b84e173b339577d498234ae38dc072059d6ac2aab96d6bbaf40187028f30575703e3cfffc017710d9f136ece9d3470113

  • memory/2276-23-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-50-0x0000000073CB0000-0x0000000074460000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-16-0x0000000073CB0000-0x0000000074460000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-18-0x0000000004F50000-0x0000000004F68000-memory.dmp

    Filesize

    96KB

  • memory/2276-45-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-47-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-39-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-43-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-41-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-31-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-29-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-27-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-25-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-15-0x00000000025A0000-0x00000000025BA000-memory.dmp

    Filesize

    104KB

  • memory/2276-21-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-20-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-48-0x0000000073CB0000-0x0000000074460000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-37-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-35-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-33-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2276-19-0x0000000073CB0000-0x0000000074460000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-49-0x0000000073CBE000-0x0000000073CBF000-memory.dmp

    Filesize

    4KB

  • memory/2276-17-0x0000000004960000-0x0000000004F04000-memory.dmp

    Filesize

    5.6MB

  • memory/2276-52-0x0000000073CB0000-0x0000000074460000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-14-0x0000000073CBE000-0x0000000073CBF000-memory.dmp

    Filesize

    4KB

  • memory/2844-56-0x00000000005C0000-0x00000000005F0000-memory.dmp

    Filesize

    192KB

  • memory/2844-57-0x0000000007270000-0x0000000007276000-memory.dmp

    Filesize

    24KB

  • memory/2844-58-0x0000000005610000-0x0000000005C28000-memory.dmp

    Filesize

    6.1MB

  • memory/2844-59-0x0000000005140000-0x000000000524A000-memory.dmp

    Filesize

    1.0MB

  • memory/2844-60-0x0000000005070000-0x0000000005082000-memory.dmp

    Filesize

    72KB

  • memory/2844-61-0x00000000050D0000-0x000000000510C000-memory.dmp

    Filesize

    240KB

  • memory/2844-62-0x0000000005250000-0x000000000529C000-memory.dmp

    Filesize

    304KB