Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:18

General

  • Target

    f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe

  • Size

    529KB

  • MD5

    d3038d00d2ae93a3863c91571b6a38a3

  • SHA1

    5f929a67add32888a7672f6eacd7d911818cec31

  • SHA256

    f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b

  • SHA512

    0ebafd1e9cd0c39136e36bcb3567c386bce779d399b2059319289755d7c14d44f97a8e045cce8d2f3e5cde1386cc067c692a88100e6dcfb5f6f29a4b00a1e7ed

  • SSDEEP

    12288:AMrBy90j6nKSoi6Gwga83rGj54IfWakcaLDDx:Ry1foi6dY3rGemW1ZDDx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe
    "C:\Users\Admin\AppData\Local\Temp\f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp3340.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp3340.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904567.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904567.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku460007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku460007.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp3340.exe

          Filesize

          387KB

          MD5

          58e338d1fb0822dbe05f6c007f8d916c

          SHA1

          5449f5a606ddaafbdca1e71c9bdb3fb0ce7e63dd

          SHA256

          06562e0fa964b1959b39e0e03982d9c712064a5a2605f849b8ac7d750db824f1

          SHA512

          77bc5035510281ad128b9ffd12c66bd09ebca3d9f9d74aec66977d963d2c4328543b6c381a052b91f7d149c166fbebf62914a000856832862490ec24d8da6f1e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904567.exe

          Filesize

          12KB

          MD5

          07c21572f680f929e2f01151bfde4847

          SHA1

          c95f0cdabfbb3731c85cfb0693dac58b959e81a4

          SHA256

          f0ab8453021717af55e599b6a8d6064630ca56ef7d15c717d092fbe61d1454cd

          SHA512

          a40bb0718eb7024ef1b3a8bd1b9d2a128dce468cefb9daf9fea9253444b9ad28e399f82f76f1d3d27eee4bd38899b544eadbe671d0baf41b96bc14f27e4bc505

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku460007.exe

          Filesize

          342KB

          MD5

          dc8fd62a38ca8c961970b5b22436b63e

          SHA1

          16ead4c24f135073eb67f94d4ba28a8e9539adbc

          SHA256

          6023c8a69c8169cdea03f89f31a127d25339b473eae955e1930dbb6a592f1a05

          SHA512

          1c23fcd74aec1a9543f2cd72bb7e213032759dac9d5575a4cd881b6210343c857febcfc27a0ab569d614566a252bd6b8850bb5a07d71777cfae49f8d84ea84cf

        • memory/2424-14-0x00007FF8970B3000-0x00007FF8970B5000-memory.dmp

          Filesize

          8KB

        • memory/2424-15-0x00000000005B0000-0x00000000005BA000-memory.dmp

          Filesize

          40KB

        • memory/2424-17-0x00007FF8970B3000-0x00007FF8970B5000-memory.dmp

          Filesize

          8KB

        • memory/4116-58-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-48-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-24-0x0000000007160000-0x00000000071A4000-memory.dmp

          Filesize

          272KB

        • memory/4116-82-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-89-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-86-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-84-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-80-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-76-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-74-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-73-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-70-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-68-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-66-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-64-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-62-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-22-0x0000000004B50000-0x0000000004B96000-memory.dmp

          Filesize

          280KB

        • memory/4116-56-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-54-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-53-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-50-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-23-0x00000000072A0000-0x0000000007844000-memory.dmp

          Filesize

          5.6MB

        • memory/4116-46-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-44-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-42-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-40-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-38-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-34-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-32-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-30-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-28-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-78-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-60-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-36-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-26-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-25-0x0000000007160000-0x000000000719F000-memory.dmp

          Filesize

          252KB

        • memory/4116-931-0x0000000007850000-0x0000000007E68000-memory.dmp

          Filesize

          6.1MB

        • memory/4116-932-0x0000000007E70000-0x0000000007F7A000-memory.dmp

          Filesize

          1.0MB

        • memory/4116-933-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

          Filesize

          72KB

        • memory/4116-934-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

          Filesize

          240KB

        • memory/4116-935-0x0000000008110000-0x000000000815C000-memory.dmp

          Filesize

          304KB