Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:49

General

  • Target

    6c532c306ea4d168b16fd2eefdb662a1e5a3a25d1ca9e46151f4384f8bf08642.exe

  • Size

    539KB

  • MD5

    1407242cd03bf536394e3bd82bb5c6b4

  • SHA1

    9b069fb1ac43635827f656ef897696676f9d0302

  • SHA256

    6c532c306ea4d168b16fd2eefdb662a1e5a3a25d1ca9e46151f4384f8bf08642

  • SHA512

    713185faf8a4cab266071ab68e02cc35c3f9a95041cd1694ad9a3d3b032212d5510001bc6c396e5a33c9ba8ed4ab76d407d73d0a69e837cbeb7811361b1923c3

  • SSDEEP

    12288:lMrny908F3lIid84lpn2dIofBMqQEf1+1avXaz:eydFxJlpUQEfoEk

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c532c306ea4d168b16fd2eefdb662a1e5a3a25d1ca9e46151f4384f8bf08642.exe
    "C:\Users\Admin\AppData\Local\Temp\6c532c306ea4d168b16fd2eefdb662a1e5a3a25d1ca9e46151f4384f8bf08642.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8022.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2179.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0964.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0964.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8022.exe

    Filesize

    397KB

    MD5

    befa2b36d58f607205512795240cd6f8

    SHA1

    bac186024f24a72493e6a964e21205af5035573f

    SHA256

    b9bf141c66f7109495250d6f2914fbfa464fdbd44d579ef0ef2d5bb3b58ddd21

    SHA512

    3b7c1e6f38d82f24e59e111ec5db42a6dde91039dd38e436a591bc49ec597049ed1a56743ed36de0cacae7a1b9b32ebee85eb06b872e5a271b0772d2e73b2085

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2179.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0964.exe

    Filesize

    355KB

    MD5

    369e740ca56490572a228f8bb210df1e

    SHA1

    d3ed4a600c243153417b348ad2462540ab4e2fe9

    SHA256

    172ea62cdc856bd5ec7c4702f5828aec0a21c49aa70a9707dd70d42db4be01c3

    SHA512

    f2c2d811e40c661019fb1245109cd971a01c4b170030ab345986cb41298842d8386dbb8b105af3fee4748e21bb77c297fcfcfdc3a02d75fefb9e172a400dff4d

  • memory/2772-61-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-55-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-21-0x0000000004B10000-0x0000000004B56000-memory.dmp

    Filesize

    280KB

  • memory/2772-22-0x00000000072B0000-0x0000000007854000-memory.dmp

    Filesize

    5.6MB

  • memory/2772-23-0x0000000004D10000-0x0000000004D54000-memory.dmp

    Filesize

    272KB

  • memory/2772-27-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-37-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-87-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-85-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-83-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-81-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-77-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-75-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-73-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-71-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-69-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-67-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-57-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-63-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-934-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB

  • memory/2772-933-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

    Filesize

    240KB

  • memory/2772-59-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-65-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-53-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-51-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-47-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-45-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-43-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-41-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-39-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-35-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-33-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-31-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-29-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-79-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-49-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-25-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-24-0x0000000004D10000-0x0000000004D4E000-memory.dmp

    Filesize

    248KB

  • memory/2772-930-0x0000000007860000-0x0000000007E78000-memory.dmp

    Filesize

    6.1MB

  • memory/2772-931-0x0000000007E80000-0x0000000007F8A000-memory.dmp

    Filesize

    1.0MB

  • memory/2772-932-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4528-15-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB

  • memory/4528-14-0x00007FF9E7FE3000-0x00007FF9E7FE5000-memory.dmp

    Filesize

    8KB