Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 23:38

General

  • Target

    8cda87c3e19c8469bdd1f3ab61eda7346cd1b8fb7b3800452b35df90050fbd65.exe

  • Size

    662KB

  • MD5

    5129ae6df70d0b5b965825db6d5eaf23

  • SHA1

    fcf856942ee1cf9c0419446b46791df09621756f

  • SHA256

    8cda87c3e19c8469bdd1f3ab61eda7346cd1b8fb7b3800452b35df90050fbd65

  • SHA512

    d59b628a7b5c40c54a436e411d152396c9be077250447bace870c30a456af8540924193efb9c855f4c6349b4a42ef18a803e4f683b32b167930a25b31654a012

  • SSDEEP

    12288:WMrKy90ZvWwDIEE4qpgtrP0vk/udB1u/f1B2q7hex3M7HuDtP+HLr:wy+WsYiBczx69B2q7wx87HuDQP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cda87c3e19c8469bdd1f3ab61eda7346cd1b8fb7b3800452b35df90050fbd65.exe
    "C:\Users\Admin\AppData\Local\Temp\8cda87c3e19c8469bdd1f3ab61eda7346cd1b8fb7b3800452b35df90050fbd65.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519918.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519918.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7465.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7465.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8828.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8828.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:396
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519918.exe

    Filesize

    520KB

    MD5

    0a84579d716cdc0195b0bb0e052a887d

    SHA1

    61a01f72db62db630d58e0a693abd0ce9553144b

    SHA256

    29ce5988f99428cf882b28c7c397547a62378ecac4ba01e538b4a0460ad78ce5

    SHA512

    7105f8e5ed53414d7b31493145298ec0498e01c7b4575d5dd8f0b286e56f36cc16bf9dc9a5f6f9b8790281c80d42d2ecf914cf4e5f8695e04da651888f481575

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7465.exe

    Filesize

    236KB

    MD5

    9a2517453244bcacac6baf0a88d70ff8

    SHA1

    cc12c00933dbb53b6b9269734481edb3e4c3a80e

    SHA256

    103eb5b2c40a67cfc173471e043e2dbff4e043de0ed0109657bb369d019e35dc

    SHA512

    ef699015f509b51127264adff1e3051df70c9d4bf5171c6a455c2acfa737f66c97888a5dff25f3dca4c3a6f725b9b16f845e542184485b714b9cb9b0106f82f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8828.exe

    Filesize

    295KB

    MD5

    a5b6d35269c35d9180908afa00662d43

    SHA1

    b904b29480ab7a4240b924ac6a8a3b41553714fe

    SHA256

    24e8f64b9092dd18c075ba42224b61729d57c38fc32a7a5ec487018bcc8d43ea

    SHA512

    4d34bb49ecdcdcbebb255843391a78a513a512603641a828468d61e965828022d748452977ef75900d416433a939182079660a5e22de22df451210eb95c725c3

  • memory/396-86-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-90-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-970-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/396-969-0x0000000005130000-0x0000000005748000-memory.dmp

    Filesize

    6.1MB

  • memory/396-74-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-76-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-78-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-80-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-82-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-84-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-972-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/396-973-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/396-89-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-971-0x00000000058D0000-0x00000000058E2000-memory.dmp

    Filesize

    72KB

  • memory/396-92-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-96-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-63-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-64-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-66-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-72-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-94-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-70-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-68-0x00000000026D0000-0x000000000270F000-memory.dmp

    Filesize

    252KB

  • memory/396-62-0x00000000026D0000-0x0000000002714000-memory.dmp

    Filesize

    272KB

  • memory/396-61-0x0000000002650000-0x0000000002696000-memory.dmp

    Filesize

    280KB

  • memory/1368-45-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-55-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1368-56-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1368-52-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1368-51-0x0000000000640000-0x000000000066D000-memory.dmp

    Filesize

    180KB

  • memory/1368-50-0x00000000004C0000-0x00000000005C0000-memory.dmp

    Filesize

    1024KB

  • memory/1368-23-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-25-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-28-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-29-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-33-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-35-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-37-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-39-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-41-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-43-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-47-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-49-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-31-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-22-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1368-21-0x0000000002730000-0x0000000002748000-memory.dmp

    Filesize

    96KB

  • memory/1368-20-0x0000000004DD0000-0x0000000005374000-memory.dmp

    Filesize

    5.6MB

  • memory/1368-19-0x00000000025B0000-0x00000000025CA000-memory.dmp

    Filesize

    104KB

  • memory/1368-18-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/1368-17-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1368-16-0x0000000000640000-0x000000000066D000-memory.dmp

    Filesize

    180KB

  • memory/1368-15-0x00000000004C0000-0x00000000005C0000-memory.dmp

    Filesize

    1024KB