Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:31

General

  • Target

    1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe

  • Size

    1.2MB

  • MD5

    1ed6f0b555ae2699936479ebd191e607

  • SHA1

    dc5dc3d32c7956237369d78b435cf210cdeeb220

  • SHA256

    1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2

  • SHA512

    53a513401536c05062d63a93ebaa468f5713e65bfb60125aa562aa62c6967f27da5e70058932f4308698e7dfea8e361407e8c1c8af50576dbd2283011d15a639

  • SSDEEP

    24576:dyI5/EbN1yap4ORISJYoq2dNwIZwMhEJvUI3aDW:4g/EbN174OR8oBdJP+ZUI6

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe
    "C:\Users\Admin\AppData\Local\Temp\1861f30b9b0aebde5941315ad80e2df8771aa6a31cb53ba4d8c3786194e31ab2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plEQ38Eg99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plEQ38Eg99.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plvX91Kw82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plvX91Kw82.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plsv36dc44.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plsv36dc44.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploy87dU19.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploy87dU19.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGA49CR20.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGA49CR20.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3668
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRn70Om17.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRn70Om17.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1360
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plEQ38Eg99.exe

    Filesize

    1.0MB

    MD5

    dfe1b99c22373b5db1ddbd8a2f1999ed

    SHA1

    1c3089e7feab4e3d2fc40b50550a08c6331364ed

    SHA256

    b9648c41bec9df400b0e125080299cd35b5702d24237d9474da58e5465f82142

    SHA512

    bd4dd2a72e0aaf9b10d3ca11a729f2226ce3bfdeea22117ace502c0e56e1e07c527a957ebb98166726d238b6991614c428293dcf5669d077406fed234d9897cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plvX91Kw82.exe

    Filesize

    937KB

    MD5

    d8830e3d3c3ccac241abac5ebefa6365

    SHA1

    03548b97f74835fe30435a821cfb55114e29dac4

    SHA256

    410bf4f76920b56bf346381393631d107a2f64ccfcdd2728b67972cebba501ee

    SHA512

    cdc9eab0127c641aa42f973b6873f5518764c64c99040ec0d4027efa98661c2a3c51a9b01f6b5ff1a8c9c5e142f5e1fdbc1dd1f211fbbc4f15b11bbe60faf375

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plsv36dc44.exe

    Filesize

    668KB

    MD5

    1b245ce24d0ec9972c1a995ab5327be7

    SHA1

    61a7114639a1db63828ebe7ed2c908e3b2ace272

    SHA256

    cea81a7f546957f27c42666587e528512f9beab0cfb30ddf6d00c7b339c5e614

    SHA512

    8634fbdd154dd0219bf2945f02e8598c3b10ac610ab7db0e604ef09acd6d318c1ed09d76199f41182c3b6edc7f3d9c5ff9305dc5cb3d8540b7f945a98844e9bf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploy87dU19.exe

    Filesize

    392KB

    MD5

    426caa05a6ead15b3300cf6934afda5b

    SHA1

    d380004e2bd95ffdae3ef149c1873b0209ee7aa6

    SHA256

    3f499450b8176992774832db44e46fca207a9442f16b09113867dc55f71ce2a9

    SHA512

    3929ab97a2806b369aaecd8ac1dbb143eb1411f23913aab19e1b92ff6c9a737361c4fbdff5a119ce805f955a0b0015c8db51b71fc01a63a2af2a5e6c2cfedb51

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buGA49CR20.exe

    Filesize

    12KB

    MD5

    0b2d0fce7b606187272ea91e36b4af19

    SHA1

    3ae126fc5122e2f88f7c361895f06c0c45a9fb28

    SHA256

    2129d8e890f8c824f37e23fd2ccb1ef81531e5eed619c2afbefea9c696504165

    SHA512

    ad2027c46cf51718f15f7a6df4d2f81ec0daddbd3a89c4bb8f72428bb312ea03d63a4312b96d4c263c785efa24c248730ddb994d1d7fe27218c2c4a79f326108

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caRn70Om17.exe

    Filesize

    304KB

    MD5

    6940451e769c094029427d1531775121

    SHA1

    03c763ca8ebc6896fb35c9f8d4d3fc64d03fe850

    SHA256

    ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca

    SHA512

    53578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06

  • memory/1360-75-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-69-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-42-0x0000000004D40000-0x00000000052E4000-memory.dmp

    Filesize

    5.6MB

  • memory/1360-43-0x0000000004B60000-0x0000000004BA4000-memory.dmp

    Filesize

    272KB

  • memory/1360-91-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-105-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-103-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-101-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-99-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-98-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-95-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-93-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-89-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-87-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-85-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-83-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-81-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-79-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-954-0x0000000005B20000-0x0000000005B6C000-memory.dmp

    Filesize

    304KB

  • memory/1360-73-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-71-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-41-0x0000000002520000-0x0000000002566000-memory.dmp

    Filesize

    280KB

  • memory/1360-67-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-63-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-61-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-59-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-57-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-55-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-107-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-77-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-65-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-53-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-51-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-49-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-47-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-45-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-44-0x0000000004B60000-0x0000000004B9E000-memory.dmp

    Filesize

    248KB

  • memory/1360-950-0x00000000052F0000-0x0000000005908000-memory.dmp

    Filesize

    6.1MB

  • memory/1360-951-0x0000000005910000-0x0000000005A1A000-memory.dmp

    Filesize

    1.0MB

  • memory/1360-952-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/1360-953-0x0000000004CD0000-0x0000000004D0C000-memory.dmp

    Filesize

    240KB

  • memory/3668-35-0x00000000003F0000-0x00000000003FA000-memory.dmp

    Filesize

    40KB