Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 10:31

General

  • Target

    960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe

  • Size

    533KB

  • MD5

    8cc772bd63d802fe97cac2d2963ce5b0

  • SHA1

    1dd5031fd159ea6b115f784943f3ab3ef5cad137

  • SHA256

    960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301

  • SHA512

    c12cdbdd8b4e43abc267972ed4b5317fa2568137bd1715c47ab137529b48dd7fd41cea3d4b613a63e761043ecce9de43bcc774c3cc43059a1873a7b72dbc4fff

  • SSDEEP

    12288:CMrUy905YyLnhiwzNElIWjz9NbYdtln5t8OzKJo:qyYYyjhl2lTjpN03tdJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe
    "C:\Users\Admin\AppData\Local\Temp\960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH9089.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH9089.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133674.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133674.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH9089.exe

    Filesize

    380KB

    MD5

    7aa26a3befaa000214723ec47dc9c936

    SHA1

    f3fe85e5e5cad9a9f37eacd38241ad908b910f73

    SHA256

    4841f0c99c5ce545ac0ab3058f66654651debb0c3eb8f35662cf0d505fddc54c

    SHA512

    b546076c080e1d8017636018d80d4cfe7f8d324f3937fb7ff993e8b434089b4fd32b9934764c609f0d0b7bb477d6ff0a65d4dcbeac23691650c6fd7009c92d86

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exe

    Filesize

    11KB

    MD5

    b2cbb8b422ac40b4cf4d78a440238dcb

    SHA1

    cce3616fee8b3d6fee0f5c0a73cb69468d7c6def

    SHA256

    d8f42e61bbfee866ce563c033becece3fbc164364509ab2fe5ebbb3ac9e4a03a

    SHA512

    42333157cf550d0228f3f92ec416bb5b28c2e8e00252dc4aa52e39f26c811e284d519e229fdb7174ecf3861a666cdeaa5045720c432f8fd44b18a33b43e5aef1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133674.exe

    Filesize

    295KB

    MD5

    42c38731e9600a84bbad7ce8ecf8a984

    SHA1

    c6f0c07ac76f7479ff9dd45df42940d85fa74a20

    SHA256

    091dd1558ec50fea193b9ff24d2215d9939dee982178f88adeed2bb8dc072706

    SHA512

    92a7974f129366699870b8a194a1e29d6ee69f6d384b20ded251cae829aba76d321476225baec50e92234fe421f6229392c574c6ac75d7865e699e273282092c

  • memory/3476-63-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-935-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/3476-936-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/3476-61-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-23-0x0000000004A90000-0x0000000004AD6000-memory.dmp

    Filesize

    280KB

  • memory/3476-24-0x0000000004AD0000-0x0000000005074000-memory.dmp

    Filesize

    5.6MB

  • memory/3476-25-0x00000000050C0000-0x0000000005104000-memory.dmp

    Filesize

    272KB

  • memory/3476-35-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-47-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-89-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-87-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-85-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-83-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-81-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-79-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-77-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-73-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-57-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-69-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-67-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-65-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-59-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-934-0x00000000058D0000-0x00000000058E2000-memory.dmp

    Filesize

    72KB

  • memory/3476-933-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/3476-71-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-53-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-51-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-49-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-45-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-43-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-41-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-39-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-37-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-33-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-31-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-29-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-75-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-55-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-27-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-26-0x00000000050C0000-0x00000000050FF000-memory.dmp

    Filesize

    252KB

  • memory/3476-932-0x0000000005100000-0x0000000005718000-memory.dmp

    Filesize

    6.1MB

  • memory/3820-17-0x00007FF93CEF0000-0x00007FF93D0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3820-15-0x00007FF93CEF0000-0x00007FF93D0E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3820-14-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/3820-18-0x00007FF93CEF0000-0x00007FF93D0E5000-memory.dmp

    Filesize

    2.0MB