Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:49

General

  • Target

    23e80d088bbf7828699c2cff3ec35722ea27cc5b05731d5b2198379285df36f1.exe

  • Size

    529KB

  • MD5

    68a39e44973249672b4bd0329e82e82c

  • SHA1

    d00599880e166d0a2dc6b526b4288e49c4327303

  • SHA256

    23e80d088bbf7828699c2cff3ec35722ea27cc5b05731d5b2198379285df36f1

  • SHA512

    c8a68ce4ce905ed248a593f5ef7ac565da2cd8d1e50110f8aaebc55b6230e00374f8c058fec604b4050f62b02ee414707899c2ab51cd23268bac9cf874efd1f3

  • SSDEEP

    12288:aMrBy90tnc0RyoT8FlXc9hbTJlAWyeCOz1cwnjJWf:nyuMtCTJOb/Oz1hwf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e80d088bbf7828699c2cff3ec35722ea27cc5b05731d5b2198379285df36f1.exe
    "C:\Users\Admin\AppData\Local\Temp\23e80d088bbf7828699c2cff3ec35722ea27cc5b05731d5b2198379285df36f1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLb0378.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLb0378.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr555512.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr555512.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku150331.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku150331.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLb0378.exe

    Filesize

    387KB

    MD5

    0e9e4a199a1ecb4c6ed9f718d35fc650

    SHA1

    c82c8b8527837c79ccacbcc23eeea7b9a44fb698

    SHA256

    6cfe516e82e52db095881e0b923a5b5acac9423f92eb4ca59109bfe14ea49614

    SHA512

    68610d9bc1b067ff6b32e71219262d470fc8cdca186873f1c17b123c282d48d4777e24d039cab202c694c38407bf17a035ec8f6adff096326da0d7dd20a4f030

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr555512.exe

    Filesize

    12KB

    MD5

    003b42752525a642feae12a67fac9184

    SHA1

    52acabb321dcd509f3079211769d9ae6f55a6716

    SHA256

    9849f807a2a23a27f8eda7fc5b3610cb50b9162606fa78ec9728285d89e40f94

    SHA512

    50f5fb53f8de929f8bdab105352aa353f60641e6a2459711fe471c3a7ffb69cc1ceabfea1697b2941b6ceeedb5aad9e88956718a9d0be1d52a4e972d106d54b2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku150331.exe

    Filesize

    353KB

    MD5

    a2fc347d3f29132f2478f631627e6c2f

    SHA1

    00304c1aab2f05557858e603254f64ae349f5eff

    SHA256

    e207d0a7ad8b690244fd1a73adf5da840f838ffe3610f0d713f18d95fecd033a

    SHA512

    4eef3e6a3e77fcee52789b87aed0db0fbbd2d3568b046143de5398dfe433422e9ff59978ad7e39f38889f4fe2cec0a2ff986d39b1aa8a3b6b397decf92c2c783

  • memory/4632-62-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-22-0x0000000000B30000-0x0000000000B76000-memory.dmp

    Filesize

    280KB

  • memory/4632-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB

  • memory/4632-58-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-23-0x0000000004E30000-0x00000000053D4000-memory.dmp

    Filesize

    5.6MB

  • memory/4632-24-0x00000000053E0000-0x0000000005424000-memory.dmp

    Filesize

    272KB

  • memory/4632-28-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-40-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-88-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-86-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-60-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-82-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-56-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-76-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-74-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-72-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-70-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-68-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-66-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/4632-84-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/4632-78-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-54-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-52-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-50-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-48-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-46-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-42-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-39-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-36-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-34-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-32-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-30-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-80-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-64-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-44-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-26-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-25-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/4632-931-0x0000000005440000-0x0000000005A58000-memory.dmp

    Filesize

    6.1MB

  • memory/4632-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/5016-16-0x00007FFF28A13000-0x00007FFF28A15000-memory.dmp

    Filesize

    8KB

  • memory/5016-14-0x00007FFF28A13000-0x00007FFF28A15000-memory.dmp

    Filesize

    8KB

  • memory/5016-15-0x0000000000260000-0x000000000026A000-memory.dmp

    Filesize

    40KB