Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:58

General

  • Target

    d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe

  • Size

    1.1MB

  • MD5

    ae931ffc22f5d1af5e7483e22ce7e974

  • SHA1

    91a74cd8efd82f000dd81a5aa10d89a189d3affb

  • SHA256

    d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8

  • SHA512

    f38b1644ebc7c592f6eca226b970712679714858620be808a2bd523c463238740265f56283121c39b407e5f029e22c2eba5ef755bfae3b115d50ff5972c7a20d

  • SSDEEP

    24576:DyHXwrfmp0sT9jY9xteh220t1yIzRVmEUc:WH8Hs9YdY220+IzREE

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe
    "C:\Users\Admin\AppData\Local\Temp\d45a5a631cffa9a2cc0b9b42c43f997c00a153fb39fbf46f1f76bb92d1927ed8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plIC97dt23.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plIC97dt23.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUF68BS80.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUF68BS80.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plZi58PF71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plZi58PF71.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4976
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plWS33Vb48.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plWS33Vb48.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:412
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buOV76iH24.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buOV76iH24.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1460
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWp53lX33.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWp53lX33.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2148
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:6140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plIC97dt23.exe

    Filesize

    1.0MB

    MD5

    2c9bd590a819430d1b83a8c078d73278

    SHA1

    87c506b038cb5b0ea828491da8627a986ab28cdc

    SHA256

    a9f8dea888083b9ea4ebba3c910bbf5b82761d357e36d1b40408cc2f889a73d0

    SHA512

    7a6631102c5cb95033d236630e01310979fc4ce3f70b1e2fc470deb0a875c12033d3966a751a7733807a3f6a71f91d58e23919f0bfdef9e4d4b913f538e1f9b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUF68BS80.exe

    Filesize

    936KB

    MD5

    fbbe3d8fc8b9fc35ac801fdc171f57df

    SHA1

    a4e5656b80828deade5c81c130af39d996aa109e

    SHA256

    e1284660bc7ff1dc4abf807f7ca89d35b0fb31bbe961b93d14139a920901f373

    SHA512

    b58e3a0daeb01c111b005efc6dcfe9a777b737e439b65954dbac99646e91c10c8eece764d3b32515560a056043052109f0dc09019a239f68ea6e8d3d980f723b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plZi58PF71.exe

    Filesize

    667KB

    MD5

    bf908bac68c6d3b1a720d4e65dd49c0f

    SHA1

    def4ff20f6df958db4c9a971fdd4eb16c24b6c2c

    SHA256

    8115f0b5f8ee3bd2255eb9c346b6146cc7e6c3672ecf88392a656e1ff3304757

    SHA512

    e09bb338f085bccff706b6014c2126ed561e14b2a50e5385c33c6fcda77559eb95c7de72d09c9dcdbc8f5e38e888eb509d95858e1840edf2eec27d6f36019883

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plWS33Vb48.exe

    Filesize

    391KB

    MD5

    a0316ad2190c4b2650b492d7ea3eaac1

    SHA1

    7db2738200de48e7a443860db6d01ef03d046890

    SHA256

    56848b9aba8f6a31fc280593c4aed4d7587e7ac9d0b21e61bf16a406b2befc07

    SHA512

    4fc070de108f344b3f712e80a07b6fd126877d2e5b071f6490b5f5c672f58ff69445e7fd2e102df492141679381900488ca60b1189ffaa4f0d87ec806ecdea69

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buOV76iH24.exe

    Filesize

    17KB

    MD5

    c107a7544d234a8885c1890c96c54fc6

    SHA1

    d889167c2c6d5103493d44189ae0143452b6d504

    SHA256

    d81950b5e1fc9fc9bc4b173bffcb6ba22cc6b94e34d928b4c5dd37378ed7ffb3

    SHA512

    16e38e650f6257e085754a8c6a2eb387df718018e18bc40ac9fefa7527cb57cdd6b97ec28f563eaaaaf7e1838e9fd4b88ea091a1097336bab23129236f92761a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caWp53lX33.exe

    Filesize

    303KB

    MD5

    12a07204bf4c65efdd968689ed260c4e

    SHA1

    8430e5110448dc962c4191a1a06b05c4e3c1a140

    SHA256

    e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b

    SHA512

    61dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a

  • memory/1460-35-0x0000000000F50000-0x0000000000F5A000-memory.dmp

    Filesize

    40KB

  • memory/2148-77-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-65-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-43-0x0000000004BE0000-0x0000000004C24000-memory.dmp

    Filesize

    272KB

  • memory/2148-59-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-69-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-107-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-103-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-101-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-99-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-97-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-93-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-91-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-89-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-87-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-85-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-83-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-79-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-41-0x00000000025E0000-0x0000000002626000-memory.dmp

    Filesize

    280KB

  • memory/2148-75-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-73-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-67-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-42-0x0000000004CA0000-0x0000000005244000-memory.dmp

    Filesize

    5.6MB

  • memory/2148-63-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-61-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-57-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-55-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-53-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-51-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-49-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-105-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-95-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-81-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-71-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-47-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-45-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-44-0x0000000004BE0000-0x0000000004C1E000-memory.dmp

    Filesize

    248KB

  • memory/2148-950-0x0000000005250000-0x0000000005868000-memory.dmp

    Filesize

    6.1MB

  • memory/2148-951-0x0000000005870000-0x000000000597A000-memory.dmp

    Filesize

    1.0MB

  • memory/2148-952-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/2148-953-0x00000000059C0000-0x00000000059FC000-memory.dmp

    Filesize

    240KB

  • memory/2148-954-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB