Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:45

General

  • Target

    9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe

  • Size

    1.2MB

  • MD5

    81d89345c64329675959fd66c47543a8

  • SHA1

    9bd22a3565ea09cb2a7022b7a733579185cf64bb

  • SHA256

    9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01

  • SHA512

    c126ecb25078c137573d3c1052f74fdfbcaa18dd4d34f041227a3daa405034d29531ddff9a372b52f29ec7f0f7cde87424ff6e63ed709ff36f37abf7af3fb7d5

  • SSDEEP

    24576:vyWzXxtKYK3gn3TfxSvVNrznmuzESqIU3Mfo/sguOhB:6Ws+zc9N/nmuueo/sguk

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe
    "C:\Users\Admin\AppData\Local\Temp\9f6f4b4c850067c467b05b79f9200e7c30da1f86b355cfa5dd0ca93e227a9b01.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmwT15lR04.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmwT15lR04.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmpb79cp51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmpb79cp51.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmYM35Gd18.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmYM35Gd18.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3412
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmJm92Ac05.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmJm92Ac05.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:944
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iCO10Vj71.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iCO10Vj71.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:564
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kCS00fR87.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kCS00fR87.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:780
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmwT15lR04.exe

    Filesize

    1.0MB

    MD5

    37052bdc94f92f75e905585ca7b06a99

    SHA1

    0dd4e2c059dcd06ffb5236929e8a1d3b930845de

    SHA256

    ca178c79fa18eaace5a3e203f4e3d668aef2a99d016130ea7b5ab02c4d98335b

    SHA512

    9d818772749cff88053d79bc9bfab460ef78eca79fc1f8a0ad58b5dceb224720f84d7a3aae9a080b7892a2a89d732cfc040fb2daa11b798b94f2ecf0a9f600b8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmpb79cp51.exe

    Filesize

    959KB

    MD5

    b694b3866c55a6fe8f9dad165278a63d

    SHA1

    5be9bd63e22b2d521b7e062106e0b8a53a51e64a

    SHA256

    a04b5239936bf23f0160eb754f35cc488d374429e5fe733b3c8826612b1fd1e3

    SHA512

    f1ce673e0c1b2481ba18cce2afe021d9e49d732dda748923b8556a44b00c4800e0f1b75bbb7d147552694a1a56d6e3f2c7ca7edc62d0e4bc52128ce1524ebc91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmYM35Gd18.exe

    Filesize

    682KB

    MD5

    9ad87167d32a3bb0b3b8a6d2e172f62c

    SHA1

    de438c5b44459b7b5bc8e9d90412248eb776430d

    SHA256

    ac597893571af28c6b6c0997644cd8c5446f7d9c840cf9fc8541641f81d5217c

    SHA512

    7035e7d99b1b7c6bc5ee4e12dc63a010a740e5cbd4f87899f28ebee44c3eb1b85c83db00d47359f98a5f42026f7b2118d18d4ce4798ba45cb8e714601adeb55c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmJm92Ac05.exe

    Filesize

    399KB

    MD5

    0b24f82e6c9f69facc5134c1d54ca06c

    SHA1

    86a74f8ac6b8e0ed47c15f9b093d8c903e972b22

    SHA256

    53aae8d9eb6db7fc09d2041d2b497239f154092f89bedc1225dc29b46f3e010b

    SHA512

    2d6fce1b31bc539c269b4cc5dd3fb265c82f323e95546c7e038512b304b9fb38366d7986729d1fcd3ab0f03583a1759944b8649b001b5a8887308fe48f31359d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iCO10Vj71.exe

    Filesize

    13KB

    MD5

    c45b27d5d452ab26e3e391439fbf1e12

    SHA1

    ce75bd10e689b89581cc2a7c9df5d22d9287f40b

    SHA256

    8721f76103d7a1c31a5673ac16006dbbc93ed6b4027dc4c6491ee7990a08cb63

    SHA512

    3bdd693f5f01bc516b6bcd511552abca528f54f35d4cbee7f3e3ce5bee8dd71e60041bd5a962d99135696ce09f1fabf21f963fa99cfc30fe9c664f1eb5d15b64

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kCS00fR87.exe

    Filesize

    374KB

    MD5

    534196314ab3a6ddde9383161e04bb1c

    SHA1

    1aada3e9ec093f011c9e1c4c557f2e9da73861cd

    SHA256

    d4eb393c9ee03f90888b37f01abdb6bb09d44416bacdfd5216c29f2739993c7e

    SHA512

    4d134be97ff5f2af6d2b9f8dadff10ace57447cf3a51f13a1d69b933de3a94673bf5c3c3899ff68036a2c4ec579248c015b974c5bdb51488ed8819227950ff8b

  • memory/564-35-0x00000000002C0000-0x00000000002CA000-memory.dmp

    Filesize

    40KB

  • memory/780-81-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-73-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-43-0x00000000071E0000-0x0000000007224000-memory.dmp

    Filesize

    272KB

  • memory/780-51-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-57-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-107-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-105-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-103-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-101-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-99-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-97-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-95-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-91-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-89-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-87-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-85-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-83-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-41-0x0000000007160000-0x00000000071A6000-memory.dmp

    Filesize

    280KB

  • memory/780-79-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-77-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-75-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-42-0x0000000007320000-0x00000000078C4000-memory.dmp

    Filesize

    5.6MB

  • memory/780-71-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-69-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-65-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-64-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-61-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-59-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-55-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-53-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-49-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-47-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-93-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-67-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-45-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-44-0x00000000071E0000-0x000000000721E000-memory.dmp

    Filesize

    248KB

  • memory/780-950-0x00000000078D0000-0x0000000007EE8000-memory.dmp

    Filesize

    6.1MB

  • memory/780-951-0x0000000007EF0000-0x0000000007FFA000-memory.dmp

    Filesize

    1.0MB

  • memory/780-952-0x00000000072F0000-0x0000000007302000-memory.dmp

    Filesize

    72KB

  • memory/780-953-0x0000000008000000-0x000000000803C000-memory.dmp

    Filesize

    240KB

  • memory/780-954-0x0000000008150000-0x000000000819C000-memory.dmp

    Filesize

    304KB