Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:38

General

  • Target

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe

  • Size

    560KB

  • MD5

    dfe366e83e0734432ae0d34d4084bf2f

  • SHA1

    eeb9fa9d7c608b2ff32f9e05aee51d7086010f76

  • SHA256

    4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e

  • SHA512

    48d8cad9d449bf8da02a408b14324fc00c4a9d05198b57d34a4bf9b83b94c244ed86956f72174d6f010d352f42b22c324a0f604fbf02f8a45391ccf96292e3cd

  • SSDEEP

    12288:zMrNy90zV/haONjJzyKuWx8NDryqTd1u6yBx5rkE4Lh:uyEnNRyK7eJug1unBx5rkZt

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe
    "C:\Users\Admin\AppData\Local\Temp\4293ecc783af8a25607d5c3d46e20492aa77c0d91fabc7ae9f0402582ee15b6e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhyJ7631rq.exe

    Filesize

    415KB

    MD5

    7c80fc48674f3dfff6bc05ad8a71d15b

    SHA1

    d61a5800c2831deed711e5be8d3460bb7ff9afee

    SHA256

    e4cacd065c73bf5c022b0b961f3777e069bfaa4187843e345b20010e06d1c604

    SHA512

    bece4681615fb7a8ca132b7473feeea9e378cac734a35771ce6fcf5264e1f855793f0d03d59c253a5ee279c751eaca3c55aeab80595f3d4124ca44f205be00cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf27yF23Gd87.exe

    Filesize

    11KB

    MD5

    8d81e111cd05bea98c0b430e1cc3a382

    SHA1

    485eeefc15c6dfc9f929cb92870a6bcd30979590

    SHA256

    cd59155f0f491654a54dfd0abf0820f2baaab9f37dac537963a6902e37afbb6a

    SHA512

    debaeb28a53cc19eccfdabc5c70c0315a4b4137d905c77b51023dfbfe474710fbf0a2ac0c7f9b44caa1fb6437610ad568edc893a281f548ccff56d2b86c865d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf28qU92WT74.exe

    Filesize

    416KB

    MD5

    197d8f3be31e2a0e255e510348dccf49

    SHA1

    c55404597c3904b99ebb6eac727feeef78fda213

    SHA256

    e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c

    SHA512

    efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2

  • memory/3316-73-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-22-0x00000000072E0000-0x0000000007326000-memory.dmp

    Filesize

    280KB

  • memory/3316-935-0x0000000008290000-0x00000000082DC000-memory.dmp

    Filesize

    304KB

  • memory/3316-68-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-23-0x00000000073F0000-0x0000000007994000-memory.dmp

    Filesize

    5.6MB

  • memory/3316-24-0x0000000007360000-0x00000000073A4000-memory.dmp

    Filesize

    272KB

  • memory/3316-80-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-58-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-40-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-28-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-70-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-25-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-66-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-86-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-84-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-82-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-78-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-76-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-74-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-934-0x0000000008140000-0x000000000817C000-memory.dmp

    Filesize

    240KB

  • memory/3316-26-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-933-0x0000000008120000-0x0000000008132000-memory.dmp

    Filesize

    72KB

  • memory/3316-88-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-64-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-62-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-60-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-56-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-54-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-52-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-50-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-48-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-46-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-44-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-42-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-38-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-36-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-34-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-32-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-30-0x0000000007360000-0x000000000739E000-memory.dmp

    Filesize

    248KB

  • memory/3316-931-0x00000000079A0000-0x0000000007FB8000-memory.dmp

    Filesize

    6.1MB

  • memory/3316-932-0x0000000007FE0000-0x00000000080EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-17-0x00007FFE4C513000-0x00007FFE4C515000-memory.dmp

    Filesize

    8KB

  • memory/4748-14-0x00007FFE4C513000-0x00007FFE4C515000-memory.dmp

    Filesize

    8KB

  • memory/4748-15-0x00000000007C0000-0x00000000007CA000-memory.dmp

    Filesize

    40KB