Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:14

General

  • Target

    a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b.exe

  • Size

    544KB

  • MD5

    81fe7a52ae7d7aa2653ded37b9011bfd

  • SHA1

    3d21925f8fc5dedc7c790ac3d14bb4dbf144d882

  • SHA256

    a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b

  • SHA512

    d8d26f33ee5efb1dcc550ecf0810fd382f7517d2c62e411fa394e5376165a2a41d57ad6bfd8a61547fa436f8faac45e676c4a8050b7fed1741b5da1ea11447e7

  • SSDEEP

    12288:pMrJy90gcHjdOY7GfQs3K/JYlflluArIJ65+by+QzgxKLBw:MyOjdQfQEK/6luAW652y+QzZLBw

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b.exe
    "C:\Users\Admin\AppData\Local\Temp\a9c2c416ba7bc23b84ad7dfb01e84cd733bd829956e75663fae0090fa6f4619b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCz5585Su.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCz5585Su.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw18CT47La44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw18CT47La44.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thC07kn13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thC07kn13.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCz5585Su.exe

    Filesize

    399KB

    MD5

    8824489b77f3b15d22934607e84699f1

    SHA1

    c1bec0956fdac27ea1ff8c2b044740e3c66369f0

    SHA256

    32179703caf8cb7068673288a292ec5d2871d60207c9a36bb42fb583eabef8dd

    SHA512

    a82016e8cd1ecff04053abae2688157127538168ed26ea78701c08445c7a36d013a3dc9951b434aabe6a263139ddea36a887479f1f98896793d0b4fdcd8be1d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw18CT47La44.exe

    Filesize

    13KB

    MD5

    6c98170d0c9c87557809d76e3100fc77

    SHA1

    b882e2a85d27983ad9a5426247b38d1166348ef2

    SHA256

    8ba8f5ed83112bcd9d068b859be2909df8e495bf9aedaae69207cbef1e4a4dd2

    SHA512

    24f97d2a55f3f763d336ddab65c708ee4878cc511be9b9971e6ed416462e2a4fce1cd2d6a4883f037527e92d3221e6b1791cd7a8b2e9953bb20c23e913b6a088

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\thC07kn13.exe

    Filesize

    374KB

    MD5

    049b7e9c3b3777fd130ad01127cd8268

    SHA1

    7f56ea5b4e7029a2da226d899ddfce99ff960e0f

    SHA256

    aff2553c6b6d9a7f84838eb4a2b47cbb3891e122ba04e305c020e68b27847b68

    SHA512

    d89cdb1b58ceb4d9b83ab498fc69e5c423b9f44ea2eb24a07b860a6594462899cb1d08e5427dd57473fa2b15d233744f7f7e9fd5f7ae082387a0072c278e0aa1

  • memory/1952-82-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-22-0x0000000004A20000-0x0000000004A66000-memory.dmp

    Filesize

    280KB

  • memory/1952-935-0x0000000008170000-0x00000000081BC000-memory.dmp

    Filesize

    304KB

  • memory/1952-79-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-23-0x0000000007390000-0x0000000007934000-memory.dmp

    Filesize

    5.6MB

  • memory/1952-24-0x0000000004D00000-0x0000000004D44000-memory.dmp

    Filesize

    272KB

  • memory/1952-32-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-38-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-36-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-34-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-80-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-84-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-76-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-46-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-28-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-26-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-25-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-88-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-86-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-934-0x0000000007310000-0x000000000734C000-memory.dmp

    Filesize

    240KB

  • memory/1952-30-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-933-0x00000000072F0000-0x0000000007302000-memory.dmp

    Filesize

    72KB

  • memory/1952-58-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-74-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-72-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-70-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-68-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-66-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-64-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-62-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-60-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-56-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-54-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-52-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-50-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-49-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-44-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-42-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-40-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/1952-931-0x0000000007940000-0x0000000007F58000-memory.dmp

    Filesize

    6.1MB

  • memory/1952-932-0x0000000007F60000-0x000000000806A000-memory.dmp

    Filesize

    1.0MB

  • memory/4428-16-0x00007FFC03C23000-0x00007FFC03C25000-memory.dmp

    Filesize

    8KB

  • memory/4428-14-0x00007FFC03C23000-0x00007FFC03C25000-memory.dmp

    Filesize

    8KB

  • memory/4428-15-0x0000000000870000-0x000000000087A000-memory.dmp

    Filesize

    40KB