Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 03:09

General

  • Target

    5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe

  • Size

    1.0MB

  • MD5

    d407723d85865f2ecaacf5d960deb280

  • SHA1

    db1df9a5e3e6ff87045848e404a1afcceb54e6b8

  • SHA256

    5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7dd

  • SHA512

    b59c6da3cccdc8d1267fdade110956435ad1d449cbf5a760600f4d8c1ef3ac962988da8f57276b64801095c2143143f98794f27653aea4e5f81c7b699349c8cd

  • SSDEEP

    24576:ayZ1XIWfI1bF/E21jDJ1fnaMpMzOv+FecyKheTAgwne7/4EsM:hZC3j1vbPaM+e+LO2nI4E

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe
    "C:\Users\Admin\AppData\Local\Temp\5fe576d842c0e1e9df87a7ae6d0306d9b04b34fb77941592af2fa17220f7b7ddN.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptBE1705lQ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptBE1705lQ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWI1188zO.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWI1188zO.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxw1625lv.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxw1625lv.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beBq41cn92.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beBq41cn92.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cuVf00PI73.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cuVf00PI73.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:64

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptBE1705lQ.exe

    Filesize

    936KB

    MD5

    99b4c46ab6c2e74cb4420cf6a37cf7ed

    SHA1

    7168715c75c96b94c9f7a2be99b6b80142718561

    SHA256

    4c9aed95952b6446ac8960b6b837bab84ea05ea1bbefde1c3b935766e19dd6a3

    SHA512

    ee7aa53145b1803de8c13a1d99361b9909137666ffed7344745f9b58de67252053bdc770a0fc58ee8c77657faeec07c65e7900de91ff44f0554df48210239fb9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWI1188zO.exe

    Filesize

    667KB

    MD5

    441cd6cafea8f5b4b37aaa363e521d43

    SHA1

    60bdccdd66251a759d7ee9397e7da87b88444536

    SHA256

    4aec930e016c3b5b557f467e6ad28032e913c129406768c4686655ef86dbc0fc

    SHA512

    747390dc2308bb236ebc2a42ba4ad84e7e44f896a3babb31c5136a3f9d3feaf2575082ac309bfccd2122980e53830ee9406aa3c1ee924a70010762d1cfadebe9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxw1625lv.exe

    Filesize

    391KB

    MD5

    c898632e50ae4d02eaa06c07502461ea

    SHA1

    f7ce95b84e29ca5e1883383fd4b5d38d09481b77

    SHA256

    d3b06f368acb8274001cbaef40b3742eb49edc24de2af4c43dabe2301eb49840

    SHA512

    bbc4d72e81476ecffeb4c8ae72c385f40faf08db810ecb2c459131cfd16a65cba01ee9443a36ee70a122561c2a46d8222f78c09b1b31f5a64896cd7de194ba29

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beBq41cn92.exe

    Filesize

    11KB

    MD5

    03de47a528e4b7d3f0b33b2b7ddf07eb

    SHA1

    9380f4bdd2e3d73b89ae5066f037224b5774f43e

    SHA256

    e1c229ec6ba698c85f32fdd6d765f619d53e469643d0a68242c446779bd0ba46

    SHA512

    47dd68f5eea5a337fdbdfcc2cf6a459339afd193d10f31e9f6e3ec66347cccd554952631d6c7846620836531921bd055333bc3d33b6bc75ffda12f2cfc7e5ffb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cuVf00PI73.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • memory/64-91-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-82-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-35-0x0000000004CB0000-0x0000000005254000-memory.dmp

    Filesize

    5.6MB

  • memory/64-36-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/64-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-70-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-62-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-42-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-40-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-38-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-37-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-100-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-98-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-97-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-94-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-92-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-947-0x0000000005B10000-0x0000000005B5C000-memory.dmp

    Filesize

    304KB

  • memory/64-88-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-86-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-34-0x0000000002760000-0x00000000027A6000-memory.dmp

    Filesize

    280KB

  • memory/64-80-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-76-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-74-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-72-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-68-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-66-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-64-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-60-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-58-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-56-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-52-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-50-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-48-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-46-0x0000000004B80000-0x0000000004BBE000-memory.dmp

    Filesize

    248KB

  • memory/64-943-0x0000000005260000-0x0000000005878000-memory.dmp

    Filesize

    6.1MB

  • memory/64-944-0x0000000005880000-0x000000000598A000-memory.dmp

    Filesize

    1.0MB

  • memory/64-945-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/64-946-0x0000000005AC0000-0x0000000005AFC000-memory.dmp

    Filesize

    240KB

  • memory/3704-28-0x00000000003C0000-0x00000000003CA000-memory.dmp

    Filesize

    40KB