Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 16:02

General

  • Target

    578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1.exe

  • Size

    479KB

  • MD5

    7e1ced01148b1743ae02f48d9d05f5e6

  • SHA1

    6817c59c3e9a5bb05f014603f1b717b23db73310

  • SHA256

    578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1

  • SHA512

    4bc4749a231ba0ac537e30e6c6e6fbe2500d0112673d8f09090f8ee6bbab505dc575bb1e713da2d5876deea6d48e1727d3363558c4dbe898513fd18ac5fd138e

  • SSDEEP

    12288:3MrEy90LNiwiF0Qx7ops1VgarKq6OvmA3xD0Dl8:byEkwK1hoAOIKUmA3x68

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1.exe
    "C:\Users\Admin\AppData\Local\Temp\578f99fc07e1da99ed56af076bf0616c4e79676f563948e0735373a677e225e1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7665480.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7665480.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7211566.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7211566.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2647183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2647183.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7665480.exe

    Filesize

    307KB

    MD5

    4b0522655443f2849ae0d6ee46ec6ae8

    SHA1

    6af9fb2bcddb46584b060b1a018ca55de2977cf1

    SHA256

    8b668eadcc1a67b0b37133cdc88dea22717c3ad6a0ab96153115db2e313ea24f

    SHA512

    b387fb72d99e98fc312bef20fb9fd4fc0c82174b88a03a933efaf0163fef1e453b1fda72c5741eae6a5b9e53f75e31bf0d73543d71b8288b92ef263243e735c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7211566.exe

    Filesize

    180KB

    MD5

    3dd727e3352b71bc1ee4961dfeddd23f

    SHA1

    2867ff7a3c0d59b53f4e131e52b728ea4efe173e

    SHA256

    fff73998b66206ca6d5bbf07ac5c357e4361d6d146b7a2f489e0f0a10aec007a

    SHA512

    9500251791110f6047788d9ce2c01308dbac10636e8db7b9f2dcb506022a041781e19093097c6fb8c9eb191b94a0904c6a59b18f499c67653a7309266fcf0383

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2647183.exe

    Filesize

    168KB

    MD5

    10b4407412d60c72091e3350be781e11

    SHA1

    3355ea12eb7ae22dd0a0bf2f4a11fe74506ecb6b

    SHA256

    c12609e563e627cca7a71461a56eaa52dc35fac347100ef8fdc53c1b4b76b5e3

    SHA512

    2e90bfef8b82b22d03f8c809e1223c5b132cc0f4417a3d64b51e9fb6cc3f5ab1905ea6f9d6d8b79531a38c8a9ffb082b9a39d3be8eaf4bf2a4461906ad026daf

  • memory/2244-62-0x0000000002B30000-0x0000000002B7C000-memory.dmp

    Filesize

    304KB

  • memory/2244-61-0x000000000A810000-0x000000000A84C000-memory.dmp

    Filesize

    240KB

  • memory/2244-60-0x000000000A7B0000-0x000000000A7C2000-memory.dmp

    Filesize

    72KB

  • memory/2244-59-0x000000000A880000-0x000000000A98A000-memory.dmp

    Filesize

    1.0MB

  • memory/2244-58-0x000000000AD00000-0x000000000B318000-memory.dmp

    Filesize

    6.1MB

  • memory/2244-57-0x00000000051B0000-0x00000000051B6000-memory.dmp

    Filesize

    24KB

  • memory/2244-56-0x00000000008D0000-0x0000000000900000-memory.dmp

    Filesize

    192KB

  • memory/3760-35-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-21-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-43-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-41-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-39-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-37-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-48-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3760-33-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-31-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-29-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-27-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-25-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-23-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-45-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-49-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/3760-50-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3760-52-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3760-47-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-20-0x0000000005090000-0x00000000050A2000-memory.dmp

    Filesize

    72KB

  • memory/3760-19-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3760-18-0x0000000005090000-0x00000000050A8000-memory.dmp

    Filesize

    96KB

  • memory/3760-17-0x0000000004AA0000-0x0000000005044000-memory.dmp

    Filesize

    5.6MB

  • memory/3760-16-0x0000000073E30000-0x00000000745E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3760-15-0x0000000002310000-0x000000000232A000-memory.dmp

    Filesize

    104KB

  • memory/3760-14-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB