Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:02

General

  • Target

    e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272.exe

  • Size

    480KB

  • MD5

    8c7aa3c8b63b0a68c9717c388ed7a165

  • SHA1

    81ff10cfb60d2ea2625f08924103fbd226baf325

  • SHA256

    e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272

  • SHA512

    99f7a2f15799fd495ee44bb94bae33a72459ea73bdb91c9835247c717b60f19e4be3a9cdc0115a4f5af5e2f6ac64fa4e9b86f9ccfc5746e691e2226cea14df28

  • SSDEEP

    12288:wMrVy90iqwoXPOQlWXXga3NUlbaCgv3Q8q:1y7o/Jba3NU9/gv7q

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272.exe
    "C:\Users\Admin\AppData\Local\Temp\e60d16502d73b3b594e16b21488e4490f05a8809f65fe571966a9f620fe3d272.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9835051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9835051.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0474007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0474007.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2643101.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2643101.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9835051.exe

    Filesize

    309KB

    MD5

    54fa815aeb23f27d49c1dbc3ddf228d5

    SHA1

    c564bda1ca3c7e729f36fbed08aa01e7b0d4464f

    SHA256

    7475b061c3b3786615f5081cf07461a0a36f4d6b9e0e7d8444d33bf59efd6989

    SHA512

    55a004896163e1972df86f4cfe2f9a910c6cfe276dc00877984cb9c3c540a97cfdc8b567b0b4c800ebac952f4b546d6dc3ba51fdd4491d5ab75bae821a4f8188

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0474007.exe

    Filesize

    181KB

    MD5

    8609b73fa371d0a86d7990b1bb5e715f

    SHA1

    d8cd8069e3feb2481d3e5c2656869f2cb3b2efce

    SHA256

    b1f77353f33662cd66d59fbbf1643ccb686d28f018bc4c81319933b95306f5ee

    SHA512

    90aac2d0bafdcc6bd50f293e8edc5d906b97762f0bcdba0bdd1b4e9d557da48d9ea907d9a9e8de32b9de3e3f936ce95d5c652f463dac5aae6e4201999a4fdd48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2643101.exe

    Filesize

    168KB

    MD5

    e45424b260779b983ff2b0a1ff34bb6b

    SHA1

    396f3cc6a4bbfda559322735d6461d04fc6e4314

    SHA256

    b024d73232c4a7cf9df3c21b77ab0ab90054395031cac97ce9d16dcaf92eccf1

    SHA512

    74fc5e8ba152f79b3ed4b80a7dd64817e535f1e326fe450d44bd8608611db3e87eb9abf61549b5f1ef3b181d6705e73e13accca7ae8ab3b4ceefcbc4b4462b42

  • memory/2360-61-0x0000000004D20000-0x0000000004D6C000-memory.dmp

    Filesize

    304KB

  • memory/2360-60-0x0000000004CD0000-0x0000000004D0C000-memory.dmp

    Filesize

    240KB

  • memory/2360-59-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/2360-58-0x0000000004D80000-0x0000000004E8A000-memory.dmp

    Filesize

    1.0MB

  • memory/2360-57-0x0000000005290000-0x00000000058A8000-memory.dmp

    Filesize

    6.1MB

  • memory/2360-55-0x00000000002F0000-0x000000000031E000-memory.dmp

    Filesize

    184KB

  • memory/2360-56-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2428-31-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-37-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-35-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-33-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-43-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-29-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-27-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-25-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-23-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-41-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-20-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-48-0x00000000749BE000-0x00000000749BF000-memory.dmp

    Filesize

    4KB

  • memory/2428-49-0x00000000749B0000-0x0000000075160000-memory.dmp

    Filesize

    7.7MB

  • memory/2428-51-0x00000000749B0000-0x0000000075160000-memory.dmp

    Filesize

    7.7MB

  • memory/2428-45-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-47-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2428-18-0x0000000004C00000-0x00000000051A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2428-19-0x0000000004AC0000-0x0000000004AD8000-memory.dmp

    Filesize

    96KB

  • memory/2428-17-0x00000000749B0000-0x0000000075160000-memory.dmp

    Filesize

    7.7MB

  • memory/2428-16-0x00000000749B0000-0x0000000075160000-memory.dmp

    Filesize

    7.7MB

  • memory/2428-15-0x00000000023B0000-0x00000000023CA000-memory.dmp

    Filesize

    104KB

  • memory/2428-14-0x00000000749BE000-0x00000000749BF000-memory.dmp

    Filesize

    4KB