Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:41

General

  • Target

    8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b.exe

  • Size

    533KB

  • MD5

    f6cef7753517093597288a2c0b6ce9ab

  • SHA1

    cd564536c6ca8dd932e40f12c1f03774b140b4af

  • SHA256

    8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b

  • SHA512

    bcece2db56ea9665fb4f2989b1099c077090c9cea4870cbafd68bf9214f0728b20297ca857dc5353fa36201de210485a0a87148bef9f4c3e2ecee4dfbc33c922

  • SSDEEP

    12288:mMrmy90WpEdMIDfwUdpYUpkUtKhnxaUO0zBLfLv8nKaX7R:Ey7hVwKhnxaI1bLYxLR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b.exe
    "C:\Users\Admin\AppData\Local\Temp\8da80397f775e1736be42d7eb466e2aecca2998905f62ed611e6f8a672c7242b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikI9559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikI9559.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr084044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr084044.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106222.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikI9559.exe

    Filesize

    380KB

    MD5

    03e3f9919505b41cb18e7a87479d4f9d

    SHA1

    aca71b1f8193185e5ef867ea5830d183477ef468

    SHA256

    00eef82f50fb6e74851b71a6e6239239fb8cd09bedf67234acdca272a93229c2

    SHA512

    8391fe2de738734799b28a956a6acb838862946bef13f8ab7d3ed1919437e855a18e62d7ac9ba5d4b5e196e1020dfe3e948cbf0ea0e39dfc15db6dd988b77d5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr084044.exe

    Filesize

    15KB

    MD5

    fdc2f0513da8ca06d95079b4e72ccf4e

    SHA1

    f9d6725ad9dce2866ce276ef4dfb3995576717cc

    SHA256

    e47e39f67bd46de8abfdaf79c9364642f6d332e46e7c0c89c95a7b669fb1818c

    SHA512

    4964a0ba5e6844e9623791f1380cc1d25b6172d70d340f1b99d4c27ac040dd7648032805257e731474772ed1858dafc7b1897cec277bc06da1775a3866a5bbd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106222.exe

    Filesize

    295KB

    MD5

    06434fc9adbaba85cb777c484265d301

    SHA1

    f739e80a735218f1284d9bc6127053189b0ae814

    SHA256

    6e1e8beab0105c6f958008bdeeba456ea56fcd387efedc3648079264e6527b8c

    SHA512

    5da5d7cdbc5958f6faa30c6ea6210772760a1706d71057b9a4aba7d79c868e371519d20b3af1cc41c1d61de403c759872343e6e833419cfc76aece8369d68b7c

  • memory/584-64-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-22-0x0000000002410000-0x0000000002456000-memory.dmp

    Filesize

    280KB

  • memory/584-935-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/584-60-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-23-0x0000000004C10000-0x00000000051B4000-memory.dmp

    Filesize

    5.6MB

  • memory/584-24-0x00000000024C0000-0x0000000002504000-memory.dmp

    Filesize

    272KB

  • memory/584-28-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-76-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-88-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-86-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-62-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-82-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-58-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-78-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-74-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-72-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-70-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-68-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-67-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-934-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/584-84-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-933-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

    Filesize

    72KB

  • memory/584-80-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-56-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-52-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-50-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-48-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-46-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-44-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-42-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-40-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-36-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-34-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-32-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-30-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-54-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-38-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-26-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-25-0x00000000024C0000-0x00000000024FF000-memory.dmp

    Filesize

    252KB

  • memory/584-931-0x00000000051C0000-0x00000000057D8000-memory.dmp

    Filesize

    6.1MB

  • memory/584-932-0x00000000057E0000-0x00000000058EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4044-17-0x00007FFBB8273000-0x00007FFBB8275000-memory.dmp

    Filesize

    8KB

  • memory/4044-14-0x00007FFBB8273000-0x00007FFBB8275000-memory.dmp

    Filesize

    8KB

  • memory/4044-15-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB