Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 09:46

General

  • Target

    bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe

  • Size

    530KB

  • MD5

    dd2ca0147a6563e64d4d2e14294caf36

  • SHA1

    e40bc5bee23128eb13f99256a39b472a21c0f296

  • SHA256

    bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5

  • SHA512

    13ffa7140e8ec5e534b81db129958d1ecbbe203663eb1fdb9f761f6a7bc9f000941807a4427c2705e0e7ce8a29d6b4e752292159f6b912ee27ea50e830125149

  • SSDEEP

    12288:oMrWy90vYfWspvziXhOWBXsDjZQrqB1wxHpYSNfn:+yImeUPNQeJSd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe
    "C:\Users\Admin\AppData\Local\Temp\bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTn0195.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTn0195.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku931965.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku931965.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTn0195.exe

    Filesize

    388KB

    MD5

    956e51adc31312baa51b8429c66227ba

    SHA1

    914cd15ffea8259c5dbb1a220951f7c1ec21bb56

    SHA256

    4b8ab5772a1df8d5347dc8690301a1e4a3826f8282e3c7aa702e026a8ddde6da

    SHA512

    7aa7ce65840c42fa9cd66140f7392526bfd8d8519f57cdae673f00c94b26011a5f85c26d97a8cf5401c1402a3c9622fa342ad850eee28d9896edb7850d45105c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exe

    Filesize

    11KB

    MD5

    49e5bed33e8dfb883881ed8319daf8d2

    SHA1

    75ce20b2981114823bce84b1979816c805e21ad7

    SHA256

    0a7089b8d3e54e43362e8d189c8e4a0806a097393d6feb82aefbaa93ed7dc5c8

    SHA512

    5164846df3ff6ef1e9b766c49bc9ea9dca901bfaaf9affdcd9edbcef5dbfb51b788947cbd2d5e1dfabdf0b9636af9f9b22538c37aa2ccc2c3dea60b08804a382

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku931965.exe

    Filesize

    354KB

    MD5

    6fa2f1bc4a9acfbfd30ba30b212724a3

    SHA1

    3122bd99160dfe859b0b9dc2fc9a68bbb01be390

    SHA256

    73763a90266748a92611b2b9c87da0ca1cfd6ed3138a29e49a97f1e4ef3d9a5c

    SHA512

    f0f9fd0de14e5372398c02166dded617cf0fe1341fd8f75b1fbe03c0d4a527c44e949b91d398a735c2c09cbf6a8c3d7fb2c8796e2c34845d1da941f82edf60aa

  • memory/3008-14-0x00007FF80EEE3000-0x00007FF80EEE5000-memory.dmp

    Filesize

    8KB

  • memory/3008-15-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB

  • memory/3008-17-0x00007FF80EEE3000-0x00007FF80EEE5000-memory.dmp

    Filesize

    8KB

  • memory/4784-64-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-54-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-24-0x0000000007730000-0x0000000007774000-memory.dmp

    Filesize

    272KB

  • memory/4784-26-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-34-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-88-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-86-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-84-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-80-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-79-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-76-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-74-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-72-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-70-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-68-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-66-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-22-0x0000000004980000-0x00000000049C6000-memory.dmp

    Filesize

    280KB

  • memory/4784-62-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-60-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-58-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-56-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-23-0x0000000007180000-0x0000000007724000-memory.dmp

    Filesize

    5.6MB

  • memory/4784-50-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-48-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-46-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-44-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-43-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-40-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-38-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-36-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-32-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-30-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-28-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-82-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-52-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-25-0x0000000007730000-0x000000000776F000-memory.dmp

    Filesize

    252KB

  • memory/4784-931-0x00000000077C0000-0x0000000007DD8000-memory.dmp

    Filesize

    6.1MB

  • memory/4784-932-0x0000000007E60000-0x0000000007F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4784-933-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4784-934-0x00000000080C0000-0x00000000080FC000-memory.dmp

    Filesize

    240KB

  • memory/4784-935-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB