Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 02:52

General

  • Target

    b90b640b27f6f175293cd5ea87417ba317d06a79efdcda18e83e04c31dc15b86.exe

  • Size

    561KB

  • MD5

    1ec65bb9de863d382dbf1d2e6d1fe05a

  • SHA1

    425b576f983b27ded4ce19c4b34d9e14356b2550

  • SHA256

    b90b640b27f6f175293cd5ea87417ba317d06a79efdcda18e83e04c31dc15b86

  • SHA512

    67025152a6bc0261c9b1ad086888632bae89bf8dbe0ed05da99e2b7e3f08dc2951d33f8dbe450132d47edcbd4785450c42016a931c5e9fb88f5f6698724e04ff

  • SSDEEP

    12288:TMrWy90mM8RyIUXddjQfVyCgMib2M+2aMCI2kmU0Vaad:pyJ3YIUX8fOMAU20Hkmbr

Malware Config

Extracted

Family

redline

Botnet

ronam

C2

193.233.20.17:4139

Attributes
  • auth_value

    125421d19d14dd7fd211bc7f6d4aea6c

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b90b640b27f6f175293cd5ea87417ba317d06a79efdcda18e83e04c31dc15b86.exe
    "C:\Users\Admin\AppData\Local\Temp\b90b640b27f6f175293cd5ea87417ba317d06a79efdcda18e83e04c31dc15b86.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEA59Vn59.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEA59Vn59.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddR08kC.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddR08kC.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHH45ml.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHH45ml.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEA59Vn59.exe

    Filesize

    416KB

    MD5

    c011ad5b41821163af8dc95ed62668e2

    SHA1

    1c639e5186660a45e0c90dfca31aee5ae55ce9ca

    SHA256

    e8d3127ff7ccb0595cba8db698b52d1f60c511a0d507bc96216c447a0eb5805f

    SHA512

    8467204ad39e7a19e265339028dd42c04e2aab6cc6560db7aaff686a7a5921e48a247545f5bd12dc3cf3bb7609cd4dac61c29dcfde90f32db4e46a18afec2afb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ddR08kC.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eHH45ml.exe

    Filesize

    346KB

    MD5

    44951f31d59f8cb13f6c5901066974b0

    SHA1

    fbc86eb6dc3ddc1a16059e22967787be8df78272

    SHA256

    1082b5292b1bf0ebec465ed623a09486fcb115346dd1babdce6d1ebe54fdcd81

    SHA512

    09ffdb56d9a464614d49eb8a29e849d2921c19a485775ffd972df9948273c1f86eaf668a8eb9709ca97e020d02f5e67dd30a71ae170462a35f7bf978f0ac1e0b

  • memory/404-14-0x00007FFC76C43000-0x00007FFC76C45000-memory.dmp

    Filesize

    8KB

  • memory/404-15-0x0000000000C40000-0x0000000000C4A000-memory.dmp

    Filesize

    40KB

  • memory/404-16-0x00007FFC76C43000-0x00007FFC76C45000-memory.dmp

    Filesize

    8KB

  • memory/2688-70-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-60-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-24-0x0000000004A50000-0x0000000004A94000-memory.dmp

    Filesize

    272KB

  • memory/2688-56-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-40-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-28-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-26-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-25-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-82-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-88-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-86-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-80-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-78-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-76-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-74-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-72-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-22-0x0000000002350000-0x0000000002396000-memory.dmp

    Filesize

    280KB

  • memory/2688-68-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-66-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-64-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-62-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-23-0x0000000004B40000-0x00000000050E4000-memory.dmp

    Filesize

    5.6MB

  • memory/2688-58-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-54-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-52-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-50-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-48-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-46-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-44-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-42-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-38-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-36-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-34-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-32-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-30-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-84-0x0000000004A50000-0x0000000004A8E000-memory.dmp

    Filesize

    248KB

  • memory/2688-931-0x00000000050F0000-0x0000000005708000-memory.dmp

    Filesize

    6.1MB

  • memory/2688-932-0x0000000005750000-0x000000000585A000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-933-0x0000000005890000-0x00000000058A2000-memory.dmp

    Filesize

    72KB

  • memory/2688-934-0x00000000058B0000-0x00000000058EC000-memory.dmp

    Filesize

    240KB

  • memory/2688-935-0x0000000005A00000-0x0000000005A4C000-memory.dmp

    Filesize

    304KB