Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:47

General

  • Target

    5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe

  • Size

    557KB

  • MD5

    9549dd7d7d07e98d9379925f96fb1639

  • SHA1

    f5adcb25cc85ca09bc80214876229d2258cf02c2

  • SHA256

    5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156

  • SHA512

    0016340b1c91d749d4a9277ecea9d061ef35d641668cd6159dad0fd657276da35034f62264391f25ed88a4d6198c8a50da37ec1790ea34aaf250b66db70a5bf7

  • SSDEEP

    12288:IMrsy906lDsYQR2NrrkvSZob+fknCGkG2zU6Cekr:Ey/lwlRArIKZobcnGkGEU6no

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe
    "C:\Users\Admin\AppData\Local\Temp\5091d1a4f534bce1c24b7613a14d8c74027506547af6c5be6da707235c417156.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhuf7606LD.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhuf7606LD.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98BD66zR70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98BD66zR70.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf92Ux83ve58.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf92Ux83ve58.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhuf7606LD.exe

    Filesize

    412KB

    MD5

    a4997335cb94b8d090e4d1d50f376da0

    SHA1

    aa24e3e38e48b715aeef393d7b9ddb0f4020c7f3

    SHA256

    cc1d54b361c463630aac7cb37e0f5bbee2380d2092d48987fa6280c1333be42e

    SHA512

    10297a526fec03156e6f530ad8c95c2a5102b62dcaa52899c2bad9e6c3726c21b3f1cf9d9f873a016ad96e6dfe698573eb12c87883a06d7be00fa3dcee573194

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf98BD66zR70.exe

    Filesize

    11KB

    MD5

    e4ab14752d54e867226cba4b8e5d12c0

    SHA1

    f823ecebbedfdfbcecf7671804d86db308e27ac5

    SHA256

    096004dd32aef7ccff1e066266ea111a66d99932a3ece1920aa15f4cf5b5438c

    SHA512

    4a4115596fd4ebf83ff3cd4fb0e01c60982d39a514628872a81b26282e7cf4687939e768cb8fdb60e7e2f41e9948f5dd70f8fae456bb6b7b50f41f55b82bdf53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf92Ux83ve58.exe

    Filesize

    409KB

    MD5

    d918db9077504212d04e97bc5857b710

    SHA1

    cbac3bfca65f8dfe4efd408bcf480f3d603f1d06

    SHA256

    ab46765a44c015f420a104a2ffee2d036dc0cb4ce25e72be2540eed2cd521bb3

    SHA512

    f00800d9c2616090029632b5fea54abacc92e9c323feda1ea3c50a2ffdacd0f047d4da66b185b75d4570bee869c9684a3746b1daf58cc66278cbb09a0946f187

  • memory/2564-14-0x00007FFC765E3000-0x00007FFC765E5000-memory.dmp

    Filesize

    8KB

  • memory/2564-15-0x00000000000A0000-0x00000000000AA000-memory.dmp

    Filesize

    40KB

  • memory/2564-16-0x00007FFC765E3000-0x00007FFC765E5000-memory.dmp

    Filesize

    8KB

  • memory/4408-64-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-52-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-24-0x0000000007780000-0x00000000077C4000-memory.dmp

    Filesize

    272KB

  • memory/4408-28-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-36-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-88-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-86-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-84-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-82-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-78-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-76-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-74-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-72-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-70-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-68-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-66-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-22-0x0000000007110000-0x0000000007156000-memory.dmp

    Filesize

    280KB

  • memory/4408-62-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-58-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-56-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-54-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-23-0x0000000007190000-0x0000000007734000-memory.dmp

    Filesize

    5.6MB

  • memory/4408-50-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-48-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-46-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-44-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-40-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-38-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-34-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-32-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-30-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-80-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-60-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-42-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-26-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-25-0x0000000007780000-0x00000000077BE000-memory.dmp

    Filesize

    248KB

  • memory/4408-931-0x0000000007810000-0x0000000007E28000-memory.dmp

    Filesize

    6.1MB

  • memory/4408-932-0x0000000007EB0000-0x0000000007FBA000-memory.dmp

    Filesize

    1.0MB

  • memory/4408-933-0x0000000007FF0000-0x0000000008002000-memory.dmp

    Filesize

    72KB

  • memory/4408-934-0x0000000008010000-0x000000000804C000-memory.dmp

    Filesize

    240KB

  • memory/4408-935-0x0000000008160000-0x00000000081AC000-memory.dmp

    Filesize

    304KB