Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:41

General

  • Target

    86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe

  • Size

    663KB

  • MD5

    f64931b0d1bf85fc55d60247a4461fed

  • SHA1

    312afe989275e223455bddc29f69a5fd3b2d6c7e

  • SHA256

    86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182

  • SHA512

    2badc01f42975618f497e0602845bc6ec708db606623122ce847f6f4eb714b3c097cc3bc57fa1053030071dae8b804669f46e5af95eba36188a485a0cb4934e2

  • SSDEEP

    12288:EMrmy90HxnumGsApiHfIQtlrL1+k6c/rOo4jKUISOwdvmkyi8Blo+Q:yyIjAp2p4k6AkLvmkyi8Po+Q

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

193.233.20.23:4123

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe
    "C:\Users\Admin\AppData\Local\Temp\86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgy69EP03.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgy69EP03.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izF90xr98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izF90xr98.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\klD70Vo47.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\klD70Vo47.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgy69EP03.exe

    Filesize

    389KB

    MD5

    4c007182b6eff70196e6fe420ce878e1

    SHA1

    0b623ffbe7923bb4bcf352e7be6a1012d017b36d

    SHA256

    47599015881cf76cec31df84d27e67efe92a0f6b8d28b3165d9a3cbe9ff899c4

    SHA512

    aa282a324a1c5fb3456e2dc577088df383aee9dac4fb0a99215808d3fc46cfa3da3f888cac954a552c81f01505fc73009cf9d0bc28ae59f54385690c88b621cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izF90xr98.exe

    Filesize

    11KB

    MD5

    b975d3458649d99f72a20025f14c1a0b

    SHA1

    8f8f73e48c8551367ea9f963d46c95478ec344fa

    SHA256

    405ee0e68d1e7888c944ea842e2b6bfda9a6f1ce20e6936969bdc5c28e152c50

    SHA512

    45fa5bc5d9eb93744e47f65cacb93042b16448a56ac5930a1b69bdf05297bc9e2e4c82c172f14a832c3d69e144b9304de05c517d87edcd3555c31a9501ccb7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\klD70Vo47.exe

    Filesize

    308KB

    MD5

    268eb6c29660b671081e908c7edff532

    SHA1

    e43f244273c197c44bb8bc7ad1ae2583545724bf

    SHA256

    44dcf8fd0be32702a4246205f7ac38abfed0f072fa42bbe79044476c5f2903d0

    SHA512

    a141e4bdedfcd313468ac3a967ed9a866efc5db3d060edeaa409f1fb278f02595921480192b0b43d02cc18fd2872ac045af2f01c86660d40b6b2f527074a3689

  • memory/1220-66-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-22-0x00000000026C0000-0x0000000002706000-memory.dmp

    Filesize

    280KB

  • memory/1220-935-0x0000000005C60000-0x0000000005CAC000-memory.dmp

    Filesize

    304KB

  • memory/1220-62-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-23-0x0000000004CD0000-0x0000000005274000-memory.dmp

    Filesize

    5.6MB

  • memory/1220-24-0x00000000052C0000-0x0000000005304000-memory.dmp

    Filesize

    272KB

  • memory/1220-28-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-26-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-25-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-36-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-64-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-86-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-60-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-80-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-78-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-76-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-74-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-72-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-70-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-934-0x0000000005B10000-0x0000000005B4C000-memory.dmp

    Filesize

    240KB

  • memory/1220-88-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-933-0x0000000005AF0000-0x0000000005B02000-memory.dmp

    Filesize

    72KB

  • memory/1220-84-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-58-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-54-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-52-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-50-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-48-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-46-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-44-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-42-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-40-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-38-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-34-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-32-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-30-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-82-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-68-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-56-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/1220-931-0x0000000005310000-0x0000000005928000-memory.dmp

    Filesize

    6.1MB

  • memory/1220-932-0x00000000059B0000-0x0000000005ABA000-memory.dmp

    Filesize

    1.0MB

  • memory/4388-16-0x00007FFA13223000-0x00007FFA13225000-memory.dmp

    Filesize

    8KB

  • memory/4388-14-0x00007FFA13223000-0x00007FFA13225000-memory.dmp

    Filesize

    8KB

  • memory/4388-15-0x0000000000840000-0x000000000084A000-memory.dmp

    Filesize

    40KB