Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 22:27

General

  • Target

    e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe

  • Size

    530KB

  • MD5

    98b3f65b902344ac35b5199e9b5f88a3

  • SHA1

    afef835dd4f2a539b8963cb7cec30e9161b01650

  • SHA256

    e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8

  • SHA512

    44e7bee1ebd04bf53b2c6dc47b5858a0e1a71a0a0463e038a2d15c2d9fcde0dbaa291cfd666fec9dd1efe9a8932fc5f55c9aff3a70f7d620057a4727117da6b4

  • SSDEEP

    12288:fMrzy90+PDj5MHJeEEhV/Jf5KXa/D9POntJQ3w:Ey1ZMHJeEEhTAU9PstJQ3w

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe
    "C:\Users\Admin\AppData\Local\Temp\e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicK9945.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicK9945.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792342.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792342.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5008
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicK9945.exe

    Filesize

    388KB

    MD5

    84383357d2bb688385d539cc13b6e2f3

    SHA1

    cc1ed7e8787e145ca0518fa62ce82a4997427ca8

    SHA256

    b9d7ab037f9ddd3dca7a9f5273c369f2c1f6ba83bbf4d7be77c30e953eccc93f

    SHA512

    e008ec58ec30f7d24b703f683ca14a83c7feeb7a7a57290a481be6595d49c9fe8d224adac3d7f09b714d11ba582b76c33e432ecf973a76d4222df1405805acd5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exe

    Filesize

    12KB

    MD5

    03ce9f155d445597847f4bebe0db6c66

    SHA1

    87f2fe49f1690be07773466cec473fabc6eecbc7

    SHA256

    3962dc8912cff52707da4c912260b33efafd1491d7f0cd2a631394677eeecdac

    SHA512

    9580c9fff5924ed4e91b6d75ba7e34d371ee01035db948d64190ac53556845a838b84464d8f361a22a4a25a2f26521322ff33da4366ed55626469cc6f79dc64f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792342.exe

    Filesize

    434KB

    MD5

    a42c907ff93075ad594ed9b496fca92a

    SHA1

    591f17096a748400030213d0460ce26d713aae12

    SHA256

    fc5d9774661848dbaf699ac00961c411e71386c069d54643500e179311fa460a

    SHA512

    d992b1af7239b619fb516aee5ee9392f934d0bb40e12175af06d9668a12323d631ea7466c54f2f7aa4a3eec02af941c87872a87cceb91c151eadaca0e840283e

  • memory/396-14-0x00007FFCC1DF3000-0x00007FFCC1DF5000-memory.dmp

    Filesize

    8KB

  • memory/396-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp

    Filesize

    40KB

  • memory/396-16-0x00007FFCC1DF3000-0x00007FFCC1DF5000-memory.dmp

    Filesize

    8KB

  • memory/5008-62-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-50-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-24-0x0000000004C00000-0x0000000004C44000-memory.dmp

    Filesize

    272KB

  • memory/5008-82-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-88-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-86-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-84-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-80-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-78-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-76-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-74-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-72-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-70-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-68-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-66-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-64-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-22-0x00000000026D0000-0x0000000002716000-memory.dmp

    Filesize

    280KB

  • memory/5008-58-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-56-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-54-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-53-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-23-0x0000000004D50000-0x00000000052F4000-memory.dmp

    Filesize

    5.6MB

  • memory/5008-48-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-46-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-44-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-42-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-40-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-38-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-34-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-32-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-30-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-60-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-36-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-28-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-26-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-25-0x0000000004C00000-0x0000000004C3F000-memory.dmp

    Filesize

    252KB

  • memory/5008-931-0x0000000005300000-0x0000000005918000-memory.dmp

    Filesize

    6.1MB

  • memory/5008-932-0x0000000005920000-0x0000000005A2A000-memory.dmp

    Filesize

    1.0MB

  • memory/5008-933-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

    Filesize

    72KB

  • memory/5008-934-0x0000000004D00000-0x0000000004D3C000-memory.dmp

    Filesize

    240KB

  • memory/5008-935-0x0000000005B40000-0x0000000005B8C000-memory.dmp

    Filesize

    304KB