Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:10

General

  • Target

    23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe

  • Size

    554KB

  • MD5

    73f1c50e1c9a462c4fa5590fb983c00b

  • SHA1

    6e8b140ffb48258128aa6357e385d58115910005

  • SHA256

    23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401

  • SHA512

    9756fc9f45f678fa33eae1c751fd678f949ca24a56f3a5b48f34bb288748b73af99f08500c16b146978acc328580e2c1255ffcd8cc4d03eba952a89acdf4a45f

  • SSDEEP

    12288:KMrjy905zS6TXfeFafw/hHKJXKyjjJsoCHbdAwZx:tya5Safw/hH2zC7Px

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe
    "C:\Users\Admin\AppData\Local\Temp\23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7513.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7513.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8862.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8862.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5204.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7513.exe

    Filesize

    412KB

    MD5

    a370430d4661047f8ffad6f29ffcc5e4

    SHA1

    6287f293deb4404fc6cbc5dfce91e2df72f789eb

    SHA256

    13a070c9e82f25fba81ac4c2d067739b20de4f245f006f3b35271726e4a831ef

    SHA512

    56aabfce0190a4c53aaafbfea87467bf5e380fe8b7bb8d6728aa070af7fc3bf9461cc075e6ca92b202c7bded46be7c1503d5c87164687f6e7040bcbada737b2a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8862.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5204.exe

    Filesize

    386KB

    MD5

    c75aac3c458d9d75e926787e9b69f5e1

    SHA1

    f36ac6ebed8b9546a375b3785e5a2f486c2b5317

    SHA256

    a141ef226e8ac92e02addcd502eeb53052452d3103814cea1a519aa188be3446

    SHA512

    0dd1e8c06779cf1502f33cc7884e70909d317ef99382f3b9cb6684cd3cd8a7c64d97588604a45996e8fcc32b796c860aad7bcca375d73cffcf6079dcbc188695

  • memory/1172-62-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-22-0x00000000070B0000-0x00000000070F6000-memory.dmp

    Filesize

    280KB

  • memory/1172-935-0x0000000008100000-0x000000000814C000-memory.dmp

    Filesize

    304KB

  • memory/1172-58-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-23-0x0000000007150000-0x00000000076F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1172-24-0x0000000007740000-0x0000000007784000-memory.dmp

    Filesize

    272KB

  • memory/1172-40-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-38-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-88-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-86-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-60-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-80-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-56-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-76-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-74-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-72-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-70-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-68-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-64-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-934-0x0000000007FB0000-0x0000000007FEC000-memory.dmp

    Filesize

    240KB

  • memory/1172-84-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-933-0x0000000007F90000-0x0000000007FA2000-memory.dmp

    Filesize

    72KB

  • memory/1172-78-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-52-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-50-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-48-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-46-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-44-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-42-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-34-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-32-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-30-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-29-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-82-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-66-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-54-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-36-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-26-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-25-0x0000000007740000-0x000000000777F000-memory.dmp

    Filesize

    252KB

  • memory/1172-931-0x00000000077B0000-0x0000000007DC8000-memory.dmp

    Filesize

    6.1MB

  • memory/1172-932-0x0000000007E50000-0x0000000007F5A000-memory.dmp

    Filesize

    1.0MB

  • memory/5064-17-0x00007FFB27603000-0x00007FFB27605000-memory.dmp

    Filesize

    8KB

  • memory/5064-14-0x00007FFB27603000-0x00007FFB27605000-memory.dmp

    Filesize

    8KB

  • memory/5064-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp

    Filesize

    40KB