Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:28

General

  • Target

    112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe

  • Size

    1.2MB

  • MD5

    5ba58f88e971aeaa74356ed861020f70

  • SHA1

    60fc11f3f90bb1362c4ae218813b5d5333f45790

  • SHA256

    112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed

  • SHA512

    1e09a8d721e30cdc716625732eb541fb22438a9307920ab5491cf6f682abd6c2e3c6aa4ac15d1bdb2bd4f062d2e9aed82b63cc245effccd4712742382d612d3a

  • SSDEEP

    24576:0yF6IMWNz6KmLTvcIFREFO8W4MxAUNpWVQmn6Y7J:DFA4mhcIEO8W3AUNpWVQmnL

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe
    "C:\Users\Admin\AppData\Local\Temp\112c5e81c28205edb73e258c94782430d85179ff10c32ca43cbd049398cc85ed.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOc28Dz20.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOc28Dz20.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plpW62Dk01.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plpW62Dk01.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyl54Lr34.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyl54Lr34.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plPi11hk82.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plPi11hk82.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butE60TT27.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butE60TT27.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3828
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cafl01bh01.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cafl01bh01.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plOc28Dz20.exe

    Filesize

    1.0MB

    MD5

    038964ab68edecce24761a26e64f16e7

    SHA1

    feca591f7b0e2da5250e7a8409771488543395b2

    SHA256

    a6fa4932f95d29b668e37652c6037d686768e19634488cb6d759303bd44786a3

    SHA512

    2490fac0ea4bfb88daefb19e5edf4105c2d43a24217376daa8fe385e54871cd43064f163595fb972726e16996ed28813759ee2f793b61b2dd2ba2e7262e66a8e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plpW62Dk01.exe

    Filesize

    968KB

    MD5

    f8ee75f0e912fd17a2080799016f30b1

    SHA1

    496c85577d85da41e06b0ea26a611dafe29b1562

    SHA256

    eeca7a806d60cefc0fbb4bc7a0f8b8be313dd01777be4564a1a867206f93f45e

    SHA512

    0cf732a79f3f514f6df46d5c703fe77d49300ba87f9590514e0293b5d3513c150d403dfe9daf022474179831376a071a0ccdc340c38edd6914b932a9459f76e2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plyl54Lr34.exe

    Filesize

    688KB

    MD5

    af30dd400db1ecbc0e2b96c93d1006bf

    SHA1

    b378212b3c337f28cb3bf8be392ca341fbbefa96

    SHA256

    b20676abc4831d47054ae36c8d50a3bec7b28a3ddeb965bf7c670478b7fdbb07

    SHA512

    a19a98abe7d174d0a5bb57af7a36c237d5c1463dd326379b78827d3f069352ad504350ba4a1a79563b49d994688d0a4cf4df54fa2480044061c615fd42d90cd1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plPi11hk82.exe

    Filesize

    403KB

    MD5

    fce71c75231026507bd696dad9520ed5

    SHA1

    040f22883769fa029af52b6d26c9f4a619713c1d

    SHA256

    ffef87e9c9f4f52a270764b415e9a6d4c20fc34c7f575828a0c07bdfe6e28830

    SHA512

    4f723371343bfd0919a9720c7514261a874b794fcec8e325325a84ac99915d1def08c35f06359a542ce29a993e3eded7f095ef0fe7e3a6ebfdd95b4b390aa2dc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\butE60TT27.exe

    Filesize

    15KB

    MD5

    61fade53c503e4f34734e184946d0d1b

    SHA1

    42ec3d18afa90ca5a92e81eac30bec43224f5538

    SHA256

    7fa491ab038fd82ec3487194cd4291b17d006ad128ff544722d1fbeda093bbcb

    SHA512

    bea2c5c7fe1568049688fc8e0aef2d340ea451f69bc3a6a2df16cd0f6ee5c404aa350164be2662e74ce820b4f934db57d0eb191bb2967dc17304f9f45296804a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cafl01bh01.exe

    Filesize

    376KB

    MD5

    51d83e219f7908c47e000ced515c41c5

    SHA1

    49860bcc7802e33498d0010de530f67573577ce1

    SHA256

    556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d

    SHA512

    a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4

  • memory/3828-35-0x0000000000940000-0x000000000094A000-memory.dmp

    Filesize

    40KB

  • memory/5052-49-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-105-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-43-0x0000000007220000-0x0000000007264000-memory.dmp

    Filesize

    272KB

  • memory/5052-59-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-107-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-103-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-99-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-95-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-89-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-85-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-81-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-77-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-71-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-57-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-55-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-53-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-51-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-41-0x00000000071A0000-0x00000000071E6000-memory.dmp

    Filesize

    280KB

  • memory/5052-47-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-45-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-44-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-42-0x0000000007370000-0x0000000007914000-memory.dmp

    Filesize

    5.6MB

  • memory/5052-101-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-97-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-93-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-91-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-87-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-83-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-79-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-75-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-73-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-69-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-67-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-65-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-63-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-61-0x0000000007220000-0x000000000725E000-memory.dmp

    Filesize

    248KB

  • memory/5052-950-0x0000000007920000-0x0000000007F38000-memory.dmp

    Filesize

    6.1MB

  • memory/5052-951-0x0000000007F40000-0x000000000804A000-memory.dmp

    Filesize

    1.0MB

  • memory/5052-952-0x00000000072F0000-0x0000000007302000-memory.dmp

    Filesize

    72KB

  • memory/5052-953-0x0000000007310000-0x000000000734C000-memory.dmp

    Filesize

    240KB

  • memory/5052-954-0x0000000008150000-0x000000000819C000-memory.dmp

    Filesize

    304KB