Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:37

General

  • Target

    3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe

  • Size

    1.0MB

  • MD5

    b7e85c3713a5883df1bc19721fed12ac

  • SHA1

    ba7d253a87b4693eda2ed84f8a51dac4d1958e8d

  • SHA256

    3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f

  • SHA512

    607d446acc3a0df873b2b102845e767020a62f9247c2dbe1a97307d972b6e5e0022eb3c49da06f458803799c035e86ca689d967dd1636a176b1b3b8426a863a1

  • SSDEEP

    24576:QysdH13l3o7+oafOmlLFQ60tcjGPQKgn3Nt:XOHhl3w+HfOm5FQRqjEQKgnv

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe
    "C:\Users\Admin\AppData\Local\Temp\3b58e80c5e20f5951a5b5b26b19162318b7427785ba6125f3ad4bc7f3018b30f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plur57ss42.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plur57ss42.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqe10jg14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqe10jg14.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plwA09RD26.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plwA09RD26.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buuX06du23.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buuX06du23.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caSV45an44.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caSV45an44.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plur57ss42.exe

    Filesize

    956KB

    MD5

    9285a12d435f7af743efe3ceac080d50

    SHA1

    9eb37db5d585005964969ceebc3a21c14ef3e890

    SHA256

    86992bd0e10cd7c487f5e39ebeda29f95a231d8bb44c3eb7fb9c4a3f0ebacdb9

    SHA512

    5bb156d55c2c77bca17d3ddac73e109577bbec25fc9cf69395e48c1f8ff335b7f6e3edda1b6716146c57c970fec6cab7bb82f87bd72757a551d4a1c73e9f1ee3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plqe10jg14.exe

    Filesize

    680KB

    MD5

    f7c5118a77412c2909265548ecb08c98

    SHA1

    73888704a385a2c17bc634408d69badb62405c4c

    SHA256

    0fb9d38623d89a5f71b302f2f4cf45e58604d40c01b3080ca4ffabf4e943458c

    SHA512

    42495051eadc16e51b188522ee27585c955187583b9c65e47031f0f23dc012d5a554efa3457bc3c59fc8548a66988f19d785d14a8ffe310149fbc8ada49eac13

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plwA09RD26.exe

    Filesize

    398KB

    MD5

    356f8b9374355890579f25bee0d4f5e9

    SHA1

    566acedca8e2ee1130bb7b5776411a982fdc45b0

    SHA256

    ba758e277ed2d4237dbbca8f9492b1c8e83e0a0026a45052c71ad88ed1c24964

    SHA512

    493aea5dcb1912510ce53699db0afd35ce4f426966f70f407d53267a352123095bdafefeeaa972c351420dc83be3dd16db3d4837c007a230f69057938162b950

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\buuX06du23.exe

    Filesize

    13KB

    MD5

    6b09b9afdf8c1877285b9c87ba86f11a

    SHA1

    51b401b1c95b5b36fe37a69f83761c6fa8587843

    SHA256

    068df4bdcf73d160ecd1ae5e7049225cd075f4866dc70ea6548f0def0ab70715

    SHA512

    6c6f41811dbcbd1c723397d14e3a271605c43a1370f38173fcf2e5f2271b54362da7f124990d28506a4770a06ef06df527d9e4c98e0dadb6a1d025546619f3e5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\caSV45an44.exe

    Filesize

    311KB

    MD5

    df8b658ff430e07a3083de9d55e38d9f

    SHA1

    a1c69254ba895096f75660ca5c9c09f46486e65f

    SHA256

    885045b17ae6220ea794be50c2290b1c771323b5ff3680879e7d2bd8d1576a74

    SHA512

    ce534ec18d6e3f3f30a21c0749818ae89895281164262fe118610f4609d98d78f3164659cc8114d2d4767eff56cb446a118b72488982989c0e722fff8bcdae8a

  • memory/1948-78-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-70-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-35-0x0000000004C90000-0x0000000005234000-memory.dmp

    Filesize

    5.6MB

  • memory/1948-36-0x0000000004C10000-0x0000000004C54000-memory.dmp

    Filesize

    272KB

  • memory/1948-40-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-38-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-37-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-100-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-98-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-96-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-94-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-93-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-90-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-88-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-84-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-82-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-80-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-947-0x0000000005BB0000-0x0000000005BFC000-memory.dmp

    Filesize

    304KB

  • memory/1948-77-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-74-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-72-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-34-0x0000000004B90000-0x0000000004BD6000-memory.dmp

    Filesize

    280KB

  • memory/1948-68-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-66-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-64-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-63-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-60-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-58-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-56-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-54-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-52-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-50-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-48-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-46-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-44-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-42-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-86-0x0000000004C10000-0x0000000004C4E000-memory.dmp

    Filesize

    248KB

  • memory/1948-943-0x0000000005260000-0x0000000005878000-memory.dmp

    Filesize

    6.1MB

  • memory/1948-944-0x0000000005900000-0x0000000005A0A000-memory.dmp

    Filesize

    1.0MB

  • memory/1948-945-0x0000000005A40000-0x0000000005A52000-memory.dmp

    Filesize

    72KB

  • memory/1948-946-0x0000000005B60000-0x0000000005B9C000-memory.dmp

    Filesize

    240KB

  • memory/4348-28-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

    Filesize

    40KB