Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:26

General

  • Target

    f433958487158ef6a3f9271c3474c265781c6e5b410ad5446fc02844a9bb5165.exe

  • Size

    549KB

  • MD5

    07e33e9238f6c0d667f45cb210bbe2d5

  • SHA1

    0db0287f66e08d509c74c1ab51fb56bddbdad14d

  • SHA256

    f433958487158ef6a3f9271c3474c265781c6e5b410ad5446fc02844a9bb5165

  • SHA512

    9ac2370a07710e9af3b0fa9ac52fd6ec9eb4648573cf6f06840f679b1f965a557e4894ff557c3d1a2413a59affc0785720da260414583215c3ca02ff415954f4

  • SSDEEP

    12288:VMrYy90isPEwhts5jnLggW+RdIvYQmKSVXcxWk:FykthOpnLggW+IQi9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f433958487158ef6a3f9271c3474c265781c6e5b410ad5446fc02844a9bb5165.exe
    "C:\Users\Admin\AppData\Local\Temp\f433958487158ef6a3f9271c3474c265781c6e5b410ad5446fc02844a9bb5165.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizD2840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizD2840.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221278.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221278.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364503.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4356
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:6048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizD2840.exe

    Filesize

    395KB

    MD5

    940da6d32bef734f01b6953a62c1dd51

    SHA1

    c3e5ffd0843adc578ecfe8b924209bb9a4b5885b

    SHA256

    3d9639df2ddda602d03f9b3336f55c5fdabc40e0853ce2639dd7ef8323e4630c

    SHA512

    30ad33df7e406bb3f0ec59c915e4c9e86b7b656bc601b7f8799ecf34c307d9588fe66de5e0e07428d62d4e7452055a3ec9f443ba8b5f612a8d4cc88428b324d2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221278.exe

    Filesize

    11KB

    MD5

    27ce2d170ab35b1ab3b0cc00b8ae9a69

    SHA1

    b5de7fba219dfad61b56bfbafc3022cf05959bf7

    SHA256

    911c3a02cac4d3f21ce97ddcff973ba819b691c6ef7f117257631022370f731d

    SHA512

    974f63ffb1dfe203463180281d293d7279648a40e60288c9de3b2a49d36315c4120c5ef02873daa91a07257623d79ebfe9907904c8b665eff591a93a439dfe61

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku364503.exe

    Filesize

    348KB

    MD5

    e2f8cc6a7f0ff00279808e21641551a7

    SHA1

    326830375c8e851a6ffdaed8b2e52f742264a0d9

    SHA256

    106c3dad9232abf3dcef13abb68b0d88dc3c6f1e63025c617eeb7bda73c13510

    SHA512

    86efdb3793a4191c13254d62192bae3a22bf2f079af936641f926d080d32489c1093f438708da78581e2c52ce715ce7abc67bab2e942f71f01b858317df30ff0

  • memory/1384-14-0x00007FFA1A923000-0x00007FFA1A925000-memory.dmp

    Filesize

    8KB

  • memory/1384-15-0x0000000000650000-0x000000000065A000-memory.dmp

    Filesize

    40KB

  • memory/1384-16-0x00007FFA1A923000-0x00007FFA1A925000-memory.dmp

    Filesize

    8KB

  • memory/4356-62-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-48-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-24-0x0000000004F20000-0x0000000004F64000-memory.dmp

    Filesize

    272KB

  • memory/4356-40-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-46-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-86-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-84-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-82-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-80-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-78-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-76-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-74-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-72-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-70-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-66-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-64-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-22-0x0000000004E60000-0x0000000004EA6000-memory.dmp

    Filesize

    280KB

  • memory/4356-60-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-58-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-54-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-50-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-23-0x0000000004FF0000-0x0000000005594000-memory.dmp

    Filesize

    5.6MB

  • memory/4356-44-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-42-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-38-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-36-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-34-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-88-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-68-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-56-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-52-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-32-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-30-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-28-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-26-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-25-0x0000000004F20000-0x0000000004F5F000-memory.dmp

    Filesize

    252KB

  • memory/4356-931-0x00000000055A0000-0x0000000005BB8000-memory.dmp

    Filesize

    6.1MB

  • memory/4356-932-0x0000000005C20000-0x0000000005D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/4356-933-0x0000000005D60000-0x0000000005D72000-memory.dmp

    Filesize

    72KB

  • memory/4356-934-0x0000000005D80000-0x0000000005DBC000-memory.dmp

    Filesize

    240KB

  • memory/4356-935-0x0000000005F10000-0x0000000005F5C000-memory.dmp

    Filesize

    304KB