Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:28

General

  • Target

    156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe

  • Size

    1.4MB

  • MD5

    53aa81febf2a02eacec433f578f405c5

  • SHA1

    06293f2171bc4b11cdabdfc4589c7b0229683ef9

  • SHA256

    156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f

  • SHA512

    a355f6c20f0fa48de61795da00e59bef6dbbf3dfd481b596e59959e82d96f5905209e2da8fcec30f14dd14a91e17537d165581cf465456313f6b1183bb18cee0

  • SSDEEP

    24576:ey4+wf0Lk/wz8MYL89D511xQy0REXbMNgFlTNcutRMbkNSllXfSOi:tBsHw8MF570EMNgPNcARMb3LaO

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe
    "C:\Users\Admin\AppData\Local\Temp\156c42995559fcf31f222df6d2b46d17a590a778cb32d7d6a86c0663d2ac408f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN06pa30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN06pa30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqs86Qs87.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqs86Qs87.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmhv64te00.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmhv64te00.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmky99Hu71.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmky99Hu71.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmqa19AP55.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmqa19AP55.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2088
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iYC44TA23.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iYC44TA23.exe
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1792
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kjj64Hh43.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kjj64Hh43.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN06pa30.exe

    Filesize

    1.2MB

    MD5

    e756827cb637f452f22a0be2ee274740

    SHA1

    dee27bdc76dc4f4d1fa70d546e5d4423366da15f

    SHA256

    5d2b38d743702472b6531244f90d9992935d9e3c0052054210e401965ec26c38

    SHA512

    bf29675b96206235488464bb1242d78adaa8746eee210fa9238fad60147dd95dabe53c8eebb9a5c3b6d648640deb15056c0d306d86007e9d51a30d90d7ff4972

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqs86Qs87.exe

    Filesize

    1.0MB

    MD5

    10945df9a07485518c67727b39a8082f

    SHA1

    8ddc658f3a5ce2c178ad969ed038cf5da299d1df

    SHA256

    11c97de17381c9cecd1819174e0fdda9c6bfcd813b8c43e1221d2156210ee275

    SHA512

    5210b959e502bd21282e417cbf17318b415d727b9f0d48d04e2a5236598676bcae429ff2c79d1e4f52489e1da7221043c0b61b0628f3958d50932886a4f4c2d0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmhv64te00.exe

    Filesize

    969KB

    MD5

    27278c6ef8dc03f13eeb50186d9cf0fb

    SHA1

    50c4f98826ac58a122bad7112bc14a8122e6e7e8

    SHA256

    b452f126d05fe759bcf8377cba18f8a058aed230a9fb90898059a78334a800d7

    SHA512

    098a81660f0870e153f0a84df65b5cfff5a010752fdfb672acae9c2dbf297c5cfaf774597cd8db38800818979e1a9a9b4192e72a21d6cb1dfe883dcef7c863b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmky99Hu71.exe

    Filesize

    689KB

    MD5

    938cb61fa94ab199a5e1f1df146241a2

    SHA1

    dd33ca022b612a617f0652c9a9e19da156a0c577

    SHA256

    33dbcd31e7a25b927eeec2c43b5c4a0a3c16f75c8e636c3b63676c21d8e8b876

    SHA512

    dc5dfd17aa6c321938aeff6d6238b4f08578e23e6fd3a4ea7a02fde656c79a0197cd492143f5e767a80f489c783d28c8d727d6243621ca04e13ddad6bdd1369c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmqa19AP55.exe

    Filesize

    404KB

    MD5

    6bac600c54a683adb67331a6c169af17

    SHA1

    95de8b93497acc9d35d6ea6178a7291c0d417076

    SHA256

    3a710e9366c934be71d7d5114d86ccbdb75679b959bb57bdd71dd8ce24b5bceb

    SHA512

    d0676a5596c7bf7603594e88dcabb93f673710c82baaaa5d16e73255984ae8050157c7c53b0e8b8b9fa69085cff5165e092beaabef6a6cdef68cf159860bd5cb

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iYC44TA23.exe

    Filesize

    15KB

    MD5

    acc23556c09597b1481c68f178b6a193

    SHA1

    b934009fca742e9723c8f359f383a30a0f38527d

    SHA256

    74f7aecb49a321ffad49d08ea486a6ab50e964d54e383edcc4954c9c9ce5fda1

    SHA512

    3a2576090272a8d6d38ea50cdf789d55ad140f87a21db1efd8bf2d5e4fb023db0024d7e03015fac96811c08645c6471d3a8afbc7e0579c219f89fc3c08c7cd13

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kjj64Hh43.exe

    Filesize

    376KB

    MD5

    51d83e219f7908c47e000ced515c41c5

    SHA1

    49860bcc7802e33498d0010de530f67573577ce1

    SHA256

    556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d

    SHA512

    a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4

  • memory/1792-42-0x0000000000900000-0x000000000090A000-memory.dmp

    Filesize

    40KB

  • memory/4952-88-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-76-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-50-0x0000000004D30000-0x0000000004D74000-memory.dmp

    Filesize

    272KB

  • memory/4952-74-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-72-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-114-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-112-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-108-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-106-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-104-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-102-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-100-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-96-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-94-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-92-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-90-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-48-0x0000000004C90000-0x0000000004CD6000-memory.dmp

    Filesize

    280KB

  • memory/4952-84-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-82-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-80-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-78-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-49-0x0000000007260000-0x0000000007804000-memory.dmp

    Filesize

    5.6MB

  • memory/4952-70-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-68-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-66-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-64-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-60-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-58-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-56-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-110-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-98-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-86-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-62-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-54-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-52-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-51-0x0000000004D30000-0x0000000004D6E000-memory.dmp

    Filesize

    248KB

  • memory/4952-957-0x0000000007810000-0x0000000007E28000-memory.dmp

    Filesize

    6.1MB

  • memory/4952-958-0x0000000007EA0000-0x0000000007FAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4952-959-0x0000000007FE0000-0x0000000007FF2000-memory.dmp

    Filesize

    72KB

  • memory/4952-960-0x0000000008000000-0x000000000803C000-memory.dmp

    Filesize

    240KB

  • memory/4952-961-0x0000000008150000-0x000000000819C000-memory.dmp

    Filesize

    304KB