Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:25

General

  • Target

    b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe

  • Size

    548KB

  • MD5

    e28c453cba40b0848177b4fae6899952

  • SHA1

    e8ad9b42dda168bc2a982fe78134240f2fbffa7f

  • SHA256

    b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61

  • SHA512

    0bcf5f4867ced4a34dbda044c8893aca3e8cfddde992de20904a561e9490bb7663090e9f9d8c3acfd8a8d92b0c0f0cced468d41d2c3de514c188659a63cca25a

  • SSDEEP

    12288:4Mrhy90+YfTgSdbPBfAYqjAqMCaWdmXLfgew6UrG:5yBgPNmrFk79UrG

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe
    "C:\Users\Admin\AppData\Local\Temp\b5a061b9750c98d4c4c71ffe760ed493e22dd812d244aa2fa8cf26c298168b61.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vOe3629FW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vOe3629FW.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw69xO12ep63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw69xO12ep63.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tej30Tf31.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tej30Tf31.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vOe3629FW.exe

    Filesize

    403KB

    MD5

    6a52a0845364f08e1f94433b22ac6112

    SHA1

    e16965838eecf847ad3b64c7df6e005969e2b31d

    SHA256

    b1ce3b37a6114e9611881952eddcdf2264618270e0c9041fe45e4b70415bcd9b

    SHA512

    b665803a690d4fd41369084d57545c1a4fbba0d3d93efbfd1cbe6f0106ba96a58cff00aa276b241fd3a63900dddfaea779d3f5f1a1bde3bb230faab8c41df941

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw69xO12ep63.exe

    Filesize

    15KB

    MD5

    50b7a7a971e4cd9c844954c12013894d

    SHA1

    f1b51fc2770484eade0755b61314acb833f40e16

    SHA256

    2d2a52d5a6c151989ab4c64fb4b90db3518a2756f3d893892cb9900516397338

    SHA512

    cd68d6407a106bb158a98892b8339d85164a3e46a9290b864d47ec64b1881276dc2ec9bb7b5d14d45939a69886a7e3ec00a6298c2396192843b3c99077e53791

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tej30Tf31.exe

    Filesize

    378KB

    MD5

    0699a3dd8a0bfbef309a3c474b22b56d

    SHA1

    8f8218184e8f28b14b8a3d5f828e28b9d8cd40a8

    SHA256

    0fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178

    SHA512

    6dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd

  • memory/1220-66-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-22-0x0000000004AA0000-0x0000000004AE6000-memory.dmp

    Filesize

    280KB

  • memory/1220-935-0x0000000008290000-0x00000000082DC000-memory.dmp

    Filesize

    304KB

  • memory/1220-62-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-23-0x0000000007450000-0x00000000079F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1220-24-0x0000000004D80000-0x0000000004DC4000-memory.dmp

    Filesize

    272KB

  • memory/1220-84-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-60-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-48-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-88-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-64-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-82-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-58-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-78-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-77-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-74-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-72-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-70-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-68-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-934-0x0000000008150000-0x000000000818C000-memory.dmp

    Filesize

    240KB

  • memory/1220-86-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-933-0x0000000008130000-0x0000000008142000-memory.dmp

    Filesize

    72KB

  • memory/1220-80-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-56-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-54-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-52-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-50-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-46-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-44-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-42-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-41-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-38-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-36-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-34-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-32-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-30-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-28-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-26-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-25-0x0000000004D80000-0x0000000004DBE000-memory.dmp

    Filesize

    248KB

  • memory/1220-931-0x0000000007A00000-0x0000000008018000-memory.dmp

    Filesize

    6.1MB

  • memory/1220-932-0x0000000008020000-0x000000000812A000-memory.dmp

    Filesize

    1.0MB

  • memory/4504-16-0x00007FFF47EB3000-0x00007FFF47EB5000-memory.dmp

    Filesize

    8KB

  • memory/4504-14-0x00007FFF47EB3000-0x00007FFF47EB5000-memory.dmp

    Filesize

    8KB

  • memory/4504-15-0x00000000008C0000-0x00000000008CA000-memory.dmp

    Filesize

    40KB