Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 14:09

General

  • Target

    6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe

  • Size

    530KB

  • MD5

    eb81a4e0a5310c3bfd7915462a018ebe

  • SHA1

    044dd97a78e477086bd9dfb2f22dccb9cc4a3306

  • SHA256

    6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc

  • SHA512

    b0652df7fb3c73ac78c13a56d8b1d255cae88fbc49d378bd9654265e7b3ac4248910432bf18a5276b77b5ab338796c613f68ffc9817e8b57be6b6cfa1165ff5a

  • SSDEEP

    12288:tMr+y90d7f/kpsmWkfOuXlH2qQebu96Z8Br+n:DyogHUmH2RQi6sr2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe
    "C:\Users\Admin\AppData\Local\Temp\6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieD8834.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieD8834.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506929.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506929.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142553.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142553.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1248
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieD8834.exe

    Filesize

    388KB

    MD5

    16314b8ced298ef415996546835b8d75

    SHA1

    82532677c117934fee27315eaf66d4ddd78bf617

    SHA256

    44a59a98bbc0d7e51bd8a9d1061eeebb1494b4001ac230159b976f8e58e549f2

    SHA512

    fb9ededd372490dca2dde14e33c73f6ce05f368563860bd425dd0c63185ac8de4908b2f8993c429119539a2b47e8dac8189d76d93137c2acec01d2b09180a87c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506929.exe

    Filesize

    12KB

    MD5

    a23ef152d38d4fd56ac8ac4455d65006

    SHA1

    5357f6a5ca4b1644cf7d9332ef7e4154bab36ac3

    SHA256

    1e3ca3d9520aaaf904b9002fcbeef042628549a603427bddca56d5fc3a6ab041

    SHA512

    b7197627532c062813bd29f12680a5dcc8941e3bfe61d5d6b141428fbea033cf02eea1fd4d13ea4717f6a75bba97ac2d8d0a299ef025669d7e4da09530d3c7eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142553.exe

    Filesize

    435KB

    MD5

    1f9de49b232f87f06e7bd304cdfc3ab5

    SHA1

    c5d7ad45b02aa463d0479824d957ea2e1f26e878

    SHA256

    2793fdec36c40dec9b3e4dd397f9bb6fb40b39ccb6198cdec48d1a36ecc00b98

    SHA512

    62a5f4dad1111c2aa1c8d9764a19bc8704961b350d468b02234bf58f7d5d8f877a9e3fc1da7524cf26456e13beff662f31598cb168ba5eb944d6618289981ac2

  • memory/1248-68-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-22-0x0000000004080000-0x00000000040C6000-memory.dmp

    Filesize

    280KB

  • memory/1248-935-0x0000000007890000-0x00000000078DC000-memory.dmp

    Filesize

    304KB

  • memory/1248-62-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-23-0x0000000006AB0000-0x0000000007054000-memory.dmp

    Filesize

    5.6MB

  • memory/1248-24-0x0000000004450000-0x0000000004494000-memory.dmp

    Filesize

    272KB

  • memory/1248-25-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-80-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-66-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-26-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-64-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-86-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-60-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-82-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-78-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-76-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-74-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-72-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-70-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-934-0x0000000006A20000-0x0000000006A5C000-memory.dmp

    Filesize

    240KB

  • memory/1248-88-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-933-0x0000000006A00000-0x0000000006A12000-memory.dmp

    Filesize

    72KB

  • memory/1248-84-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-58-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-56-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-54-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-53-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-50-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-48-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-46-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-44-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-42-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-40-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-38-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-36-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-34-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-32-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-30-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-28-0x0000000004450000-0x000000000448F000-memory.dmp

    Filesize

    252KB

  • memory/1248-931-0x0000000007060000-0x0000000007678000-memory.dmp

    Filesize

    6.1MB

  • memory/1248-932-0x0000000007680000-0x000000000778A000-memory.dmp

    Filesize

    1.0MB

  • memory/2632-16-0x00007FF8A80D3000-0x00007FF8A80D5000-memory.dmp

    Filesize

    8KB

  • memory/2632-14-0x00007FF8A80D3000-0x00007FF8A80D5000-memory.dmp

    Filesize

    8KB

  • memory/2632-15-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB