Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:44

General

  • Target

    f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe

  • Size

    535KB

  • MD5

    09808de3efaa4891f59727d08929c27a

  • SHA1

    3e232c38f57f3134f2bb5ba07670bda8f8f4a230

  • SHA256

    f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8

  • SHA512

    35c2d6f2672b961f4377e75b32922eb3fa53277036ef5efff388254e8262287cea835d01e0086e7a46df308e885d76953ddd7bfb1ca1914e7b41d4f697ba4b95

  • SSDEEP

    12288:aMr3y9040QC2afDfXEeSkSKgKpP7TwEpHry7DqY:Zy7afDPQgrpPQ8I

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe
    "C:\Users\Admin\AppData\Local\Temp\f0651bcfd983825d4fc142bde7fe6f0f47ccf0c54130d2e0b359ad042f48f2b8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlV1050tw.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlV1050tw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw48ks95AT80.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw48ks95AT80.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thy55zJ34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thy55zJ34.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vlV1050tw.exe

    Filesize

    391KB

    MD5

    a121f67ce69af940986c17df427f3082

    SHA1

    494b4d33f3f59e4b4617e1838624669f3b7a7775

    SHA256

    792251703d2a7faa77c5840fd0adceef92414853545f8a08adfb7c79a79a3f61

    SHA512

    813091f537c44fdc81bfec47fee02ec8ec22aea629364378a595eb4a6d01cd8b81b8844b7291657c771ccfe924ba38bb2430e634fdd23c9a55ec092a62db5b29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw48ks95AT80.exe

    Filesize

    11KB

    MD5

    84e0d5f7f225a60c1bfa614b4fd14bab

    SHA1

    2ceaa3f0d33e3eec0d4ed6e3924215e814098733

    SHA256

    edf3bc0fe7ca86b560de85dbff70a90f7e3c343c6f3f00a9fa31d4a939262983

    SHA512

    0cd05b6a7cce98529f6bee8488e029f6d93596ff1e2663377d40c15993cb353348737ac9b9aa6693e6837bd632c9751c7bf1cd7a99abf40980b34dad75cdfa7c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thy55zJ34.exe

    Filesize

    303KB

    MD5

    003ebed48d2fda6c315c683d32b6a6dc

    SHA1

    677088017218065e750a178b68fe2388ac74920a

    SHA256

    0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

    SHA512

    26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

  • memory/1456-15-0x0000000000970000-0x000000000097A000-memory.dmp

    Filesize

    40KB

  • memory/1456-14-0x00007FFD776A3000-0x00007FFD776A5000-memory.dmp

    Filesize

    8KB

  • memory/1456-16-0x00007FFD776A3000-0x00007FFD776A5000-memory.dmp

    Filesize

    8KB

  • memory/4784-66-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-54-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-24-0x0000000004BC0000-0x0000000004C04000-memory.dmp

    Filesize

    272KB

  • memory/4784-28-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-40-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-88-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-86-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-84-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-82-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-80-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-78-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-76-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-74-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-72-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-70-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-68-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-22-0x0000000002420000-0x0000000002466000-memory.dmp

    Filesize

    280KB

  • memory/4784-64-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-60-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-58-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-57-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-23-0x0000000004DA0000-0x0000000005344000-memory.dmp

    Filesize

    5.6MB

  • memory/4784-52-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-50-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-48-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-46-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-44-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-42-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-38-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-36-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-34-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-32-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-30-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-62-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-26-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-25-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/4784-931-0x0000000005350000-0x0000000005968000-memory.dmp

    Filesize

    6.1MB

  • memory/4784-932-0x0000000004C80000-0x0000000004D8A000-memory.dmp

    Filesize

    1.0MB

  • memory/4784-933-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/4784-934-0x00000000059C0000-0x00000000059FC000-memory.dmp

    Filesize

    240KB

  • memory/4784-935-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB