Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:44

General

  • Target

    0627fd8e4cd2edf198df750cbccde5b215e769bb53de400feccd3ecb8150e51e.exe

  • Size

    1.0MB

  • MD5

    fd72638187809785837731bc632ec65e

  • SHA1

    4321913b21ce37288568711502b3b18e938674bc

  • SHA256

    0627fd8e4cd2edf198df750cbccde5b215e769bb53de400feccd3ecb8150e51e

  • SHA512

    ad7e9d770e247636feb11b951827847570fb6f24c9cdf36fa34b6e55a386294ce9c9ccb2ebb3c509eadef896aeb6bff080c7d4534a7d38770c69f3d80278565e

  • SSDEEP

    24576:oyf5nmiO1lJ0ft14U9EiG/yJc3XLEVWzLQqf:vxnml6fb4U9PYYGXL5

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0627fd8e4cd2edf198df750cbccde5b215e769bb53de400feccd3ecb8150e51e.exe
    "C:\Users\Admin\AppData\Local\Temp\0627fd8e4cd2edf198df750cbccde5b215e769bb53de400feccd3ecb8150e51e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will5526.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will5526.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will6741.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will6741.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will3765.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will3765.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx7850Dx.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx7850Dx.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns8371Os.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns8371Os.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py53uK58.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py53uK58.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will5526.exe

    Filesize

    865KB

    MD5

    db0ed47c4feb0d781a01bf553b44c0a7

    SHA1

    78adfe4812f15db1100b5299c9307cc14c72fd4d

    SHA256

    c3cff292435e8080e05ae81a58d9e61e83347a6181ac8171b541e03ac27d4f84

    SHA512

    23d504ed79573160b095b6a04735104512ea1762ddbd085f172b7c5c6635c06e4cb041931ef423a1b053b2115ff82870138dcbe595fcaadf1097a1b2fe58aa65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will6741.exe

    Filesize

    720KB

    MD5

    fe687125ec1e7c3f42d99c22b48c02f0

    SHA1

    a8383c8d2f77f75d4a8f2ccd09dd6a4b1a67b465

    SHA256

    79e796590301e12db49cbd7bfdcb220d0e1d67f2a03e779ab84ac981f72c8883

    SHA512

    8f369afedfc0e80b1f48e4d6253c5acd5b37538b10615d25a6856887352f85898ac5bee9e429d079ceed6caf477915979805848b4328af7084a1d89f1462870b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py53uK58.exe

    Filesize

    391KB

    MD5

    ce0d4802a11131dcb59ad10dd7fe8f5f

    SHA1

    f124ab5eea3cf094f8b2fb9dd6feb40614d76348

    SHA256

    805cecf3a9a2a84250eed3ba5fd630e2ad448f553e5044cfc6a9db7cef57823e

    SHA512

    c79b05bb4c3a8b1a6a6a8cf5cd2aa0cd228fc342f8d30f171d01cb3bddd9c87a16b67cd809d3e314005f18cdb3e32aef0e4e3d268e2303658800f27101e0666f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\will3765.exe

    Filesize

    367KB

    MD5

    de84badbaa7e52091a9cd5e634770b76

    SHA1

    8ebd454135a7df7599084306d36871e76fdacb22

    SHA256

    8ec9ce67fa7f475a26d2943edfc822b0b4460541e3f5cc90caba5f41df0bbc51

    SHA512

    e1ead358c0288a843cb151c61076d11406571debea49d7d0fae1127c6e49dcd917899167dd5354a73a35481e05dc25eeebf07287d80ac0c1bad58618f53197c0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mx7850Dx.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ns8371Os.exe

    Filesize

    371KB

    MD5

    3a39cf2183b38d934799bd43ad7b0e6b

    SHA1

    5f240301ee1a777ffa1035cc8b9ea7c6362069a3

    SHA256

    515984cddb83441aaa501e7068519ccd71438375131bdf2775cd1d505f4c66e0

    SHA512

    e61b82694204a908e70058ebb2d9736bc7a04569539ac6fd03eceaaa40e49097866b10196d390e544d135a31e725f0b37e8e27e4b67764306d68dae37a94da88

  • memory/1736-67-0x0000000000400000-0x0000000002B0C000-memory.dmp

    Filesize

    39.0MB

  • memory/1736-35-0x00000000070B0000-0x0000000007654000-memory.dmp

    Filesize

    5.6MB

  • memory/1736-36-0x0000000007660000-0x0000000007678000-memory.dmp

    Filesize

    96KB

  • memory/1736-37-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-46-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-64-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-62-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-60-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-58-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-56-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-54-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-52-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-50-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-48-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-44-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-42-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-40-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-38-0x0000000007660000-0x0000000007672000-memory.dmp

    Filesize

    72KB

  • memory/1736-65-0x0000000000400000-0x0000000002B0C000-memory.dmp

    Filesize

    39.0MB

  • memory/1736-34-0x00000000049A0000-0x00000000049BA000-memory.dmp

    Filesize

    104KB

  • memory/3156-75-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-89-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-73-0x0000000004CC0000-0x0000000004D04000-memory.dmp

    Filesize

    272KB

  • memory/3156-984-0x00000000080A0000-0x00000000080EC000-memory.dmp

    Filesize

    304KB

  • memory/3156-107-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-105-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-103-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-101-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-99-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-97-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-95-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-93-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-91-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-72-0x0000000004B50000-0x0000000004B96000-memory.dmp

    Filesize

    280KB

  • memory/3156-87-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-85-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-83-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-81-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-79-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-77-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-74-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/3156-980-0x00000000078E0000-0x0000000007EF8000-memory.dmp

    Filesize

    6.1MB

  • memory/3156-981-0x0000000007210000-0x000000000731A000-memory.dmp

    Filesize

    1.0MB

  • memory/3156-982-0x0000000007F30000-0x0000000007F42000-memory.dmp

    Filesize

    72KB

  • memory/3156-983-0x0000000007F50000-0x0000000007F8C000-memory.dmp

    Filesize

    240KB

  • memory/3516-28-0x00000000004B0000-0x00000000004BA000-memory.dmp

    Filesize

    40KB