Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 07:19

General

  • Target

    40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe

  • Size

    529KB

  • MD5

    1734a6dd789ff9b6448b6f3b8ea6af35

  • SHA1

    15a962e3f87ef85c8a5193bb68cdf44a8d305dd3

  • SHA256

    40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604

  • SHA512

    8f44ebabe2337cc18e3dd18892ad2e9d3b8981ef1be91ae86db2216859fbb639a2569c2a8eb37cd99a13c7954e838396aef8c32a437b561147e28ee752e504f1

  • SSDEEP

    12288:5MrFy90fUm4Mr07t6SmUdiMV22ramVE8lx27amrk9G90IGlQ:cyyG60RnQZlmVE8P25I0aS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe
    "C:\Users\Admin\AppData\Local\Temp\40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg2339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg2339.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku569703.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku569703.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg2339.exe

    Filesize

    388KB

    MD5

    a5555a9a6846f816059fa5df31bde888

    SHA1

    f94fab601ddc8e8ccaa0b0f38db4d3449780da06

    SHA256

    2498a4d9970e7dea97833a299a63a06107d50183ac59942bb227a01fcd36c395

    SHA512

    d9a713d027e5154ab1fc100d3a341cb189300128ecf4ea3a1ed5d2905952cdade7815232870960425a59aa1bdbc4f27921979baa3bcb51a0c57e8810fc9241c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exe

    Filesize

    11KB

    MD5

    f773988705d4c2cb8ac80ea55e717edf

    SHA1

    ee899e4d8fbfecc41d13290970d323ab6f0e3657

    SHA256

    d47e87c0be91911b8d09585b6ee33a2c19615ebbae9910e9e30249d615c0ca9a

    SHA512

    529d3ce18379974beb9d076e8caf046efbfc1e008e6888dbee19533c4acaf6cbe004f0dda275b86b67cd777cbb373ac7ac6336805378cbbbb82ecf94e9f2c6a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku569703.exe

    Filesize

    354KB

    MD5

    e1955908666e8783f8cd595409ae4c86

    SHA1

    7c1b5332b4d9a29f733d4bcd4cba9c384acaef14

    SHA256

    d9cf93fc6ef778753a8c128a21f213c27cb27eda4b8ca43f37d14a26b067c453

    SHA512

    a36d914a88639f7127ea996770755958a1b9c07eb05c03b8c348942bd68a72985d7bea66a544446105103835bd583481a4030924fe6af8f5ad7734d8e4a2f592

  • memory/2580-60-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-22-0x0000000007090000-0x00000000070D6000-memory.dmp

    Filesize

    280KB

  • memory/2580-935-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB

  • memory/2580-56-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-23-0x0000000007120000-0x00000000076C4000-memory.dmp

    Filesize

    5.6MB

  • memory/2580-24-0x0000000007720000-0x0000000007764000-memory.dmp

    Filesize

    272KB

  • memory/2580-50-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-72-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-86-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-82-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-58-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-78-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-55-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-74-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-70-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-68-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-66-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-64-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-62-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-934-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/2580-80-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-933-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/2580-76-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-52-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-48-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-46-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-44-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-42-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-40-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-36-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-34-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-32-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-30-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-28-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-88-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-84-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-38-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-26-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-25-0x0000000007720000-0x000000000775F000-memory.dmp

    Filesize

    252KB

  • memory/2580-931-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/2580-932-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4344-16-0x00007FFE0C473000-0x00007FFE0C475000-memory.dmp

    Filesize

    8KB

  • memory/4344-14-0x00007FFE0C473000-0x00007FFE0C475000-memory.dmp

    Filesize

    8KB

  • memory/4344-15-0x0000000000F70000-0x0000000000F7A000-memory.dmp

    Filesize

    40KB