Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2024 21:41

General

  • Target

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe

  • Size

    530KB

  • MD5

    3fd6d5f18bf08b4b813b6cc8c533ba26

  • SHA1

    219181babf1539a1700aefaab3d76dec6e8800a0

  • SHA256

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

  • SHA512

    8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59

  • SSDEEP

    12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe
    "C:\Users\Admin\AppData\Local\Temp\92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe

    Filesize

    388KB

    MD5

    add044658a447aefe61f8ed8060b63da

    SHA1

    5b636d5d16940fee0c1b4b062510c0cbdd02f2ec

    SHA256

    a1f5cc3f80ed509e0cb144a092d011b5a119d98ab083624241269d98efa4c051

    SHA512

    9f1c9f440c821b46791526668a75853a073077cc81a612ddc971373a4097553b09d31a8449f03b47d47c330ef8f5fede176ba5a0939e2094eca8726526398134

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe

    Filesize

    12KB

    MD5

    4bc2c6f93dc57bc281e509c28695d10c

    SHA1

    bf31cd0c8b54fe127125eb8a46710ea2f94dd935

    SHA256

    250a3899c3714d74f299ed48fbae6a6e711fbf661ad307da9e60c37dc6db9212

    SHA512

    0793902dd1499cb24a7b995e45c98ba702a7294b4104241e05119dbe3b63efd28ed099d9a1f2332e8ccc02019a98276f6d08abf2bac09f52c1792659a2906c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe

    Filesize

    355KB

    MD5

    bc1a2339b3c6fe4fe6de713a378175bf

    SHA1

    b1c47c0db380ec5ee5a403d6b784e859d9d9b713

    SHA256

    7f4445cb1eaeef02700827529ef3a022f634d5cdfcbadb0123ec0b34e853f5a2

    SHA512

    88498fcd66733cb018998f559c88bce9619925a0dc24354c577a225f044067775f4227237c1f0cc076e868263327160797303bd46496cd77b8437012cbb52d95

  • memory/2896-15-0x00000000002B0000-0x00000000002BA000-memory.dmp

    Filesize

    40KB

  • memory/2896-14-0x00007FFA89713000-0x00007FFA89715000-memory.dmp

    Filesize

    8KB

  • memory/4100-55-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-47-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-23-0x0000000004B90000-0x0000000004BD4000-memory.dmp

    Filesize

    272KB

  • memory/4100-39-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-63-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-87-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-85-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-81-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-79-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-77-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-75-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-73-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-71-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-67-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-61-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-59-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-58-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-21-0x00000000049A0000-0x00000000049E6000-memory.dmp

    Filesize

    280KB

  • memory/4100-53-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-51-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-49-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-22-0x0000000007620000-0x0000000007BC4000-memory.dmp

    Filesize

    5.6MB

  • memory/4100-45-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-43-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-41-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-37-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-35-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-34-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-31-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-29-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-27-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-83-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-69-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-65-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-25-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-24-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4100-930-0x0000000007BD0000-0x00000000081E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4100-931-0x0000000007460000-0x000000000756A000-memory.dmp

    Filesize

    1.0MB

  • memory/4100-932-0x0000000004EA0000-0x0000000004EB2000-memory.dmp

    Filesize

    72KB

  • memory/4100-933-0x0000000004EC0000-0x0000000004EFC000-memory.dmp

    Filesize

    240KB

  • memory/4100-934-0x0000000007570000-0x00000000075BC000-memory.dmp

    Filesize

    304KB