Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:25

General

  • Target

    6c92206cb77ac5804b777681f9645991d5255ffcb0bdeca387c90a426f391afc.exe

  • Size

    554KB

  • MD5

    a1d2441da928ecb9633b193c625069ff

  • SHA1

    406a8c14b7e778c12c32b4cfd6b58686ee664dd4

  • SHA256

    6c92206cb77ac5804b777681f9645991d5255ffcb0bdeca387c90a426f391afc

  • SHA512

    648a10566e30fab4255e636072a06fc34804b1aa4425d4beb9005827fa86dabe37eae6254f6ff3ae064ddc8980de3f13d8a3a90f8adc0c5cd05b37097221d6d9

  • SSDEEP

    12288:ZMr9y90C/N6MgxZLNLlF/jwtBZa4Uogpzt0bsU30+GEJb:Uy7g1h/stB4BoGLe0yR

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c92206cb77ac5804b777681f9645991d5255ffcb0bdeca387c90a426f391afc.exe
    "C:\Users\Admin\AppData\Local\Temp\6c92206cb77ac5804b777681f9645991d5255ffcb0bdeca387c90a426f391afc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3153.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3153.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9273.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9273.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2053.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2053.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3153.exe

    Filesize

    412KB

    MD5

    55655b23c7725a65fc852e45a4c0248c

    SHA1

    f99a431059c7a13e1fdcfeea55ab719992ec1e91

    SHA256

    1aec96bb3638835e16f4a63149b5aa5af19750994ee22c84715816a0d1dbf95e

    SHA512

    20c76fc4af7be2f1e165c99426f7497eb282056b5633caa5aa516cd36903911341ffdb82d489aa201937277a1d7c3dd42950d370ea3db1a9f09b47a90d485387

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9273.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2053.exe

    Filesize

    386KB

    MD5

    a506903954933fca1bd0d12ff4715a18

    SHA1

    666658224ee71fbb45b04a668dbcd589db98fabd

    SHA256

    d969f5e5c982e341fe787cc4780401829effc73ea31e0de24b002d6b1fe407a5

    SHA512

    dcea79eb2b4a2acf83e1c491833c46d7e256db815b9da25330d6656a090d336090a21a66bf08ed736df785b70a0be595a5adfcdafcc1d011d9e64a410f500205

  • memory/1520-62-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-22-0x00000000049C0000-0x0000000004A06000-memory.dmp

    Filesize

    280KB

  • memory/1520-935-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB

  • memory/1520-56-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-23-0x0000000007290000-0x0000000007834000-memory.dmp

    Filesize

    5.6MB

  • memory/1520-24-0x0000000007880000-0x00000000078C4000-memory.dmp

    Filesize

    272KB

  • memory/1520-34-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-88-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-86-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-84-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-58-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-78-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-54-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-74-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-72-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-70-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-68-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-66-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-64-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-934-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/1520-82-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-933-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/1520-76-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-52-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-50-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-48-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-46-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-44-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-42-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-40-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-38-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-36-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-32-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-80-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-30-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-60-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-28-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-26-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-25-0x0000000007880000-0x00000000078BF000-memory.dmp

    Filesize

    252KB

  • memory/1520-931-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/1520-932-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2728-16-0x00007FFCC7643000-0x00007FFCC7645000-memory.dmp

    Filesize

    8KB

  • memory/2728-14-0x00007FFCC7643000-0x00007FFCC7645000-memory.dmp

    Filesize

    8KB

  • memory/2728-15-0x00000000008B0000-0x00000000008BA000-memory.dmp

    Filesize

    40KB