Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 05:19

General

  • Target

    1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe

  • Size

    560KB

  • MD5

    562a3701c1c68ced57ccf731b5363195

  • SHA1

    5d4646eb309549d6aaa0f2e5ed97d051960329f1

  • SHA256

    1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38

  • SHA512

    9f91cbb04412f3d71175f5ae69e078824c44204425b46214cb21a97fa9f57d55dd6005e7beff29bd9797738338f3c69894f7cf9bf46d317fdbe573aaf8970228

  • SSDEEP

    12288:+MrKy90bRt0mkO07iskGBfw/zMZey9ElxJ+89RVCQVcw37Ni0LEl5:IyQkqszoYZey9ElT9RTcwrE3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe
    "C:\Users\Admin\AppData\Local\Temp\1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAC9921.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAC9921.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku553728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku553728.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAC9921.exe

    Filesize

    406KB

    MD5

    ef360bc427e94c46b0be5c64ba04bc9d

    SHA1

    db8f95b21f3c0527110674f2845c617bed69a858

    SHA256

    2e5b5d3efbe39ab19bfb62e2fde3b43ab891671a49b84c7237168b722794b9ff

    SHA512

    1cfe00522db70eb5308d66970af3bde804e165351bb1f035e66614d7b128988c4ed87da738ca3e221b0ab4c5173d3ed5490ca22153fd0c44f6aaeb7c9bcaa41c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exe

    Filesize

    12KB

    MD5

    8751bd643d39995fa22993d1b9ec8ed0

    SHA1

    33fe43fc1f3b9321a1078fe27441f4691588c969

    SHA256

    a336b26a4344f779815b11c35eef8c3766580cf7e3b7d999f592ba71896bc9f5

    SHA512

    cdd6a2166f26183e8e454d4f3aa83b3c4a08e11f19d4dedfa4fa591d8e51e96afaf21c91bedcb62eabd66dedebb24ac4a233bd572cde8591f37018b806b81bab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku553728.exe

    Filesize

    372KB

    MD5

    0e6fce7ba5bb8d471319c60336fcb595

    SHA1

    32ef7ed5f96e81dab407cdc896a1548a8cc72f88

    SHA256

    746acaa24b311f16d84736a83912866896894bc8d69312a665b41ab7b669ddea

    SHA512

    c1ece45852e422a9b5f8a0c9ef213a028d9303af2b01e7d767a336b390ae6719339b359028c4d04b2a66c4c8a4e3eed087a5696785c49320bd6d528dc5ff1025

  • memory/1120-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-22-0x0000000002710000-0x0000000002756000-memory.dmp

    Filesize

    280KB

  • memory/1120-935-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

    Filesize

    304KB

  • memory/1120-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-23-0x0000000004FC0000-0x0000000005564000-memory.dmp

    Filesize

    5.6MB

  • memory/1120-24-0x0000000004E10000-0x0000000004E54000-memory.dmp

    Filesize

    272KB

  • memory/1120-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-87-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-934-0x0000000004F60000-0x0000000004F9C000-memory.dmp

    Filesize

    240KB

  • memory/1120-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-933-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/1120-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-62-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-60-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-42-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1120-931-0x0000000005570000-0x0000000005B88000-memory.dmp

    Filesize

    6.1MB

  • memory/1120-932-0x0000000005B90000-0x0000000005C9A000-memory.dmp

    Filesize

    1.0MB

  • memory/2448-16-0x00007FFC7B7F3000-0x00007FFC7B7F5000-memory.dmp

    Filesize

    8KB

  • memory/2448-14-0x00007FFC7B7F3000-0x00007FFC7B7F5000-memory.dmp

    Filesize

    8KB

  • memory/2448-15-0x0000000000DF0000-0x0000000000DFA000-memory.dmp

    Filesize

    40KB