Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:07

General

  • Target

    e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe

  • Size

    521KB

  • MD5

    f8d8599f4771dd76d044b3903a447637

  • SHA1

    dfd7e9655f05ab38d1ff423664fb596d4691cda4

  • SHA256

    e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912

  • SHA512

    e97e13ec25508e987efa050a697657c46405696d7ecbfcc4a4421399c6975380738991faf4afa2cd0afab34127cba9d7da633f4a3302af9921a3e0615105cf5f

  • SSDEEP

    12288:QMruy90ISCJzqj5XFIq/nfTrJVP8K7449zW3R9Oe7mAV:uybadqq70Kk4A3R9OeH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe
    "C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe

    Filesize

    379KB

    MD5

    f4029cf68018709a48529fcf0343987b

    SHA1

    9921a3d11c8379dedda9c81098aac45e2accce21

    SHA256

    cf7a413c67e4e0640a62151ad563436a58ec8599515a537f39b5bc3f6f0e52af

    SHA512

    14e1a441384d5457609bbdf8a47d31c40f2e455dbd484965e807d6c4a0cdba84d090c91bd4b39e0ea9bf7a87bf093453ae8df701eb2720b951244878aaf5d8de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe

    Filesize

    15KB

    MD5

    27e4a495b2168b2964127f58501fe3b9

    SHA1

    1f1c8861dfdc021455975c5d20b3c081548b5c7b

    SHA256

    092acbb0e785cb3e61448150e2cd0986a165ddb6f40497b095134957513a491f

    SHA512

    0e60a80b6d9b95b88dcefb3110836b12b81b5192ee626904e30453f4b3a5812d295b88ebdaed41564fe4eac01edd4fad33d89c54d20da8248e0209fcddb4ef53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe

    Filesize

    294KB

    MD5

    1321c634e7eeee5734bed3850cef99a9

    SHA1

    e9a665a99a6816a928675a95339d8017ee78eb33

    SHA256

    2dbd1a21be1100b2846df51948a229c9a7cd1dccabd8af20194e774d1df95bfd

    SHA512

    41171b663b8a7f87f7bcb6a350e0da07f1db2de7f0a233d30d308eff7037fa47e5df26662aab066f6358e104abfbb26ae3c3ab2ff31b331cc2afa38b9ddca281

  • memory/2088-64-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-22-0x0000000004A60000-0x0000000004AA6000-memory.dmp

    Filesize

    280KB

  • memory/2088-935-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/2088-60-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-23-0x0000000004AA0000-0x0000000005044000-memory.dmp

    Filesize

    5.6MB

  • memory/2088-24-0x0000000005090000-0x00000000050D4000-memory.dmp

    Filesize

    272KB

  • memory/2088-25-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-42-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-89-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-86-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-62-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-82-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-58-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-76-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-75-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-72-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-70-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-69-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-66-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-934-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/2088-84-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-933-0x00000000058D0000-0x00000000058E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-80-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-56-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-54-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-52-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-50-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-48-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-46-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-44-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-40-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-38-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-36-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-34-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-32-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-30-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-28-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-26-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-78-0x0000000005090000-0x00000000050CF000-memory.dmp

    Filesize

    252KB

  • memory/2088-931-0x00000000050F0000-0x0000000005708000-memory.dmp

    Filesize

    6.1MB

  • memory/2088-932-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/3148-16-0x00007FF9E7FE3000-0x00007FF9E7FE5000-memory.dmp

    Filesize

    8KB

  • memory/3148-14-0x00007FF9E7FE3000-0x00007FF9E7FE5000-memory.dmp

    Filesize

    8KB

  • memory/3148-15-0x00000000003C0000-0x00000000003CA000-memory.dmp

    Filesize

    40KB