Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:53

General

  • Target

    2171c83a47511681c9074ceed5dd1794db372549a5ee0138fd59e84179fcdeed.exe

  • Size

    1.0MB

  • MD5

    53cfa62e677e878a5adfe9aefb6c9544

  • SHA1

    5dc3646277c581182790c8b806a2a44630c82827

  • SHA256

    2171c83a47511681c9074ceed5dd1794db372549a5ee0138fd59e84179fcdeed

  • SHA512

    84ade5513979a4cf5e5225d99cc8394d5c2e4432fb7fe59dff2693099fc66a7fd6bc3e0cdaa8f4933adbb1089fa6a8b810effaef615dec236bc15a95d353c6ad

  • SSDEEP

    24576:nyL4ubwS0TPxPmDaXebCzVDFikEail3PnRbPVSBS8Li4p8QR6X:ysFS0TPxuDseb0VDkNaO3vRbPRxA8Q

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

193.233.20.23:4123

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2171c83a47511681c9074ceed5dd1794db372549a5ee0138fd59e84179fcdeed.exe
    "C:\Users\Admin\AppData\Local\Temp\2171c83a47511681c9074ceed5dd1794db372549a5ee0138fd59e84179fcdeed.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIo52Tt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIo52Tt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pwc69dN.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pwc69dN.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pDw80SS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pDw80SS.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3460
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\baM23Os.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\baM23Os.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cfc48rs28.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cfc48rs28.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIo52Tt.exe

    Filesize

    884KB

    MD5

    ca788ed02dfb0ad5db462a63af78078d

    SHA1

    76f27053a2142ad7c6de1b3083c6f0328b9fed91

    SHA256

    b2c33c8c7311b30958b555dd11091536ae9258fa69e48d4ee95aa90e1952e94b

    SHA512

    40fc28220cca42d6a3ccee1a6d80a17a793694b56f467ab5e43ef70953e6cb61df972c2f98e60934cebc07a8f2355abe05f0f027cc8ca720f638456f2ffc9fd7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pwc69dN.exe

    Filesize

    661KB

    MD5

    b7fdb43c417df684f4c313c15bba62f9

    SHA1

    9db1accf4edbbed8ebd830a0d7566be0629e7e57

    SHA256

    6efa54bbb4d7c61724c91b5fa437a2df8bec60ab696714392435868657086f43

    SHA512

    16e072dad4a8176fa3a11ac41155eac04551bca15977641dff0bcaf31921411d0aecc265c9aa7f08d7327b5f1a1e3216b4b91ad0d550a8e5e1b543ba66ddc0e5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pDw80SS.exe

    Filesize

    388KB

    MD5

    e39c5e251a608d301ce0c2bc7e796d86

    SHA1

    8e0e2e051337b0e90830615941ac0ea005d64506

    SHA256

    1164f029f4e4a01ab8dd47c9067102bd073f0d9cff8e888ffc02f3d183a4def0

    SHA512

    e368fd6fe01344b29ab3bef7c3a342a420fd5513abd9965cd843140a1bd5a8ca605942f4e5c414e43ecb58484700395f9a9079984add8cd59b631e53f799fe3a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\baM23Os.exe

    Filesize

    11KB

    MD5

    daa8dbddbca6d077a7fc234496923cf1

    SHA1

    4df2b6327e8e75ed71c0e3055c9d17a043ff6b65

    SHA256

    17528baacf916fa9379bb2df7a9cb98e87f6759a74a3dccd565a04c671d67b56

    SHA512

    b8c878f507ad26dfee4caa5f37ad8f6e909ce5354f9aa4df8535fcdeb75e654afbd179ca2c16eedfc4c2ba9d4de13b58e1fdb23424a72c9da893f6b1f5f4890a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cfc48rs28.exe

    Filesize

    306KB

    MD5

    39e68ec5c671803bea570c9c8149ecf5

    SHA1

    93cb8d7be2e1aa555e5541d1d946271d32cf20ba

    SHA256

    7359387553ff87aa91886a0e850132f5024f913e22cc8eb764d401fcdb0d58f5

    SHA512

    5ce2317044a61712de25b803c7bb51a6a6aba6c9606cbaa2b5b340960a59baf98b5041ddc417924fec3f03a9543a8442eeb465a28c1986458e80e292568d9ada

  • memory/2108-28-0x0000000000990000-0x000000000099A000-memory.dmp

    Filesize

    40KB

  • memory/4228-78-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-68-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-36-0x0000000002610000-0x0000000002654000-memory.dmp

    Filesize

    272KB

  • memory/4228-42-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-54-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-100-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-99-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-96-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-94-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-92-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-90-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-88-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-86-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-85-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-82-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-81-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-34-0x0000000002510000-0x0000000002556000-memory.dmp

    Filesize

    280KB

  • memory/4228-76-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-75-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-72-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-70-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-35-0x0000000004C20000-0x00000000051C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4228-66-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-64-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-62-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-60-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-58-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-52-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-50-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-48-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-46-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-44-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-56-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-40-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-38-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-37-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/4228-943-0x00000000051D0000-0x00000000057E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4228-944-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/4228-945-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/4228-946-0x00000000059C0000-0x00000000059FC000-memory.dmp

    Filesize

    240KB

  • memory/4228-947-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB