Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 21:11

General

  • Target

    329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002bN.exe

  • Size

    381KB

  • MD5

    ce0d06cb212127ad1e74972464fd5d70

  • SHA1

    2b14273451ab3c59c3885c62dbce2e73e38d1c30

  • SHA256

    329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002b

  • SHA512

    e133fee44413bfefbc4ca8794aa8aedcef347f2c090d4a7a1514bc58bd59a4742e281ac7453afb056c3438a23536c5d901ca44f08e2695ad1eb515e43e81dfdd

  • SSDEEP

    6144:KOy+bnr+0p0yN90QE7rLxVpWkE+QpnqVk1fSsIYBoMdOgfDZfDvip9hh7:yMr0y90xrfgOQpzvI+oM7DNvip9v7

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002bN.exe
    "C:\Users\Admin\AppData\Local\Temp\329a42063ffec8046d42056a2998d639427e4a2ad659d0203601704fae7c002bN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sf22ec10yC74.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sf22ec10yC74.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tf06cz30rM11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tf06cz30rM11.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sf22ec10yC74.exe

    Filesize

    11KB

    MD5

    036116115ab9622ae5e42117bb20db6a

    SHA1

    ad597c5c21afae12511a30191ee3a1d2326c1654

    SHA256

    730bde99bd70063e39c20056d3ca04365b199d06e3d01dbaf6201e04f258735e

    SHA512

    6cf43fdafc3cffde3003243634633a7d8b0ebffbe86c6796b083bb040707903e6007840e8defafc6aace75d2e72f9c21c30493c565415ac70a5903dfc1796474

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tf06cz30rM11.exe

    Filesize

    292KB

    MD5

    33eef0ef7d3d426c664f6e3380b0a87c

    SHA1

    66eea27c3262719cb51de3a08a47b13da67f33b7

    SHA256

    4dec2b62f8f47bed9dad690b372fe7ab707a251657470a0cc9b85cf603ce441e

    SHA512

    cc0b998114447a96d23f8cbd4ede81b5f103f204cd5a887fbe892b67ce836226bcc0d15ec60f9a754d166e57c5d9fd10c6e2b1851416654f504860ffd93cd6c5

  • memory/1864-15-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1864-16-0x0000000000680000-0x00000000006CB000-memory.dmp

    Filesize

    300KB

  • memory/1864-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1864-18-0x0000000004C40000-0x0000000004C86000-memory.dmp

    Filesize

    280KB

  • memory/1864-19-0x0000000004C80000-0x0000000005224000-memory.dmp

    Filesize

    5.6MB

  • memory/1864-20-0x0000000005270000-0x00000000052B4000-memory.dmp

    Filesize

    272KB

  • memory/1864-28-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-30-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-26-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-68-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-46-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-24-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-22-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-21-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-84-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-82-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-80-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-78-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-76-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-74-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-72-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-70-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-66-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-64-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-62-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-60-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-58-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-56-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-54-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-52-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-50-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-48-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-44-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-42-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-40-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-38-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-36-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-34-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-32-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1864-927-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/1864-928-0x00000000059A0000-0x0000000005AAA000-memory.dmp

    Filesize

    1.0MB

  • memory/1864-929-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

    Filesize

    72KB

  • memory/1864-930-0x0000000005B00000-0x0000000005B3C000-memory.dmp

    Filesize

    240KB

  • memory/1864-931-0x0000000005C50000-0x0000000005C9C000-memory.dmp

    Filesize

    304KB

  • memory/1864-932-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1864-934-0x0000000000680000-0x00000000006CB000-memory.dmp

    Filesize

    300KB

  • memory/1864-935-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4148-7-0x00007FFCD3E83000-0x00007FFCD3E85000-memory.dmp

    Filesize

    8KB

  • memory/4148-8-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/4148-9-0x00007FFCD3E83000-0x00007FFCD3E85000-memory.dmp

    Filesize

    8KB