Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 02:25

General

  • Target

    81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183.exe

  • Size

    482KB

  • MD5

    fc17a8b8ca885cee5f5b38a0806a9fdb

  • SHA1

    ef9064de5a4f160a054098a3094b6b66ddc53668

  • SHA256

    81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183

  • SHA512

    466ae5343c290b26fa2b21e9c461ecf746e8a00d21149ed08e66ceb9e7c444721442a7bd5d643e5a477191cb3db94ea962af725d6eae48189cbc30816428b8db

  • SSDEEP

    12288:AMrjy904VyGVKiEhvr0IkjhQ6ec54vdT5TP:TyjVlEhvQy6ec5ydTlP

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183.exe
    "C:\Users\Admin\AppData\Local\Temp\81e02bbc06f3bd176e259639b49089b6da836cffba81af69619bd9321ff8f183.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnS32xX31.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnS32xX31.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dje80Yi.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dje80Yi.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHg77DI.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHg77DI.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fuM62RC.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fuM62RC.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fuM62RC.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nnS32xX31.exe

    Filesize

    337KB

    MD5

    f132f70b329af06c9552b656b9d148ed

    SHA1

    b5d9875e9a3a4b669040e61fea567c3dca63875b

    SHA256

    dfd02604251db7ce0a12d170dc601e3c2ba07750492dc74738170a50b4f7ada4

    SHA512

    2dd9a4a1d106a90408a7056af205cb38655023a733b8ccb63251a0b36faf36555b74c4ba444932121eb5f2b1a8e059baac741309e355c7befb9ead46d628e78c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dje80Yi.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHg77DI.exe

    Filesize

    248KB

    MD5

    ee5d95fc580a7da82999ec7f548e65ce

    SHA1

    48ea3889f13175ccee6b0117a442b09ed1aa99e3

    SHA256

    419cd55347c4ae44caacaa3c83e6644c4690a30d33ff293f4e1a8a924e6d8b44

    SHA512

    2c0d4cb64f1a352ea20b07faccbece44eacc5edfcd0eb214bef040e9f6ec9c83ec8603a9c57d7a0dec9ef100a1411bbc7b3605db5c61b0921bee2d5568d3fa73

  • memory/1236-14-0x00007FFC27673000-0x00007FFC27675000-memory.dmp

    Filesize

    8KB

  • memory/1236-15-0x00000000008A0000-0x00000000008AA000-memory.dmp

    Filesize

    40KB

  • memory/1236-16-0x00007FFC27673000-0x00007FFC27675000-memory.dmp

    Filesize

    8KB

  • memory/1432-42-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-34-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-25-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-32-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-52-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-51-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-48-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-46-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-44-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-23-0x0000000004CB0000-0x0000000005254000-memory.dmp

    Filesize

    5.6MB

  • memory/1432-40-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-38-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-36-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-24-0x00000000022C0000-0x00000000022D8000-memory.dmp

    Filesize

    96KB

  • memory/1432-30-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-28-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-26-0x00000000022C0000-0x00000000022D2000-memory.dmp

    Filesize

    72KB

  • memory/1432-53-0x0000000000400000-0x0000000000570000-memory.dmp

    Filesize

    1.4MB

  • memory/1432-55-0x0000000000400000-0x0000000000570000-memory.dmp

    Filesize

    1.4MB

  • memory/1432-22-0x0000000002240000-0x000000000225A000-memory.dmp

    Filesize

    104KB

  • memory/4436-59-0x0000000000090000-0x00000000000C2000-memory.dmp

    Filesize

    200KB

  • memory/4436-60-0x0000000004FF0000-0x0000000005608000-memory.dmp

    Filesize

    6.1MB

  • memory/4436-61-0x0000000004B70000-0x0000000004C7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4436-62-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

    Filesize

    72KB

  • memory/4436-63-0x0000000004B10000-0x0000000004B4C000-memory.dmp

    Filesize

    240KB

  • memory/4436-64-0x0000000004C80000-0x0000000004CCC000-memory.dmp

    Filesize

    304KB