Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 11:55

General

  • Target

    ea29d800d57126fa2b0876c68c9a18693371b905ada393ceba44874cf60c09e9.exe

  • Size

    522KB

  • MD5

    d2841f69269a302ca143a67c39c7ff34

  • SHA1

    5e88b69c35cf4924294aef3727fb3b57bc6bd225

  • SHA256

    ea29d800d57126fa2b0876c68c9a18693371b905ada393ceba44874cf60c09e9

  • SHA512

    056eddda1a6071a3a790df5ecc2d9928da6f095f15e18c1f63d02affd68dadb02ecde4dbfeed63b4735b2065b463000358d37999da3c2e59f126cb4ad8926a76

  • SSDEEP

    12288:TMrVy90khPqUnJLE9vnsMw8on7KmKhVdYWsOrLihuaDSraJacf:uy/hPZE9PsMw8s+mqdvsO6n8cf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea29d800d57126fa2b0876c68c9a18693371b905ada393ceba44874cf60c09e9.exe
    "C:\Users\Admin\AppData\Local\Temp\ea29d800d57126fa2b0876c68c9a18693371b905ada393ceba44874cf60c09e9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDh2183.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDh2183.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr182133.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr182133.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku698418.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku698418.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3628
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDh2183.exe

    Filesize

    380KB

    MD5

    0daf22d4ea98c6e82fe8c5b57eab6f34

    SHA1

    28835b08ff09ce54209a78fef1d0de7669270a68

    SHA256

    b6ed89eb22c4a09e32af4b0c66f86571697c0bfeb56e2b2392df3ffd65ff45f4

    SHA512

    e9af37f8f670df7afc2df696da76f0f213ec7391442853cd10cd2fe636ecf9ee56747ba3adde0c8e4098cf1eedd82b6a5c2c671ae63b486b3582fcaa07bc7b95

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr182133.exe

    Filesize

    15KB

    MD5

    5ff80822a33ee9204a463d02d7354071

    SHA1

    3ebff0c33c295c96eee8c794d0ba2b3cd3830f53

    SHA256

    91d7ea6d4ef1027fa26692daa58467da3e04ac793ac4f8e450da21fb3cd4d05e

    SHA512

    3a704b39908ca0f9f832fbe00b56680a167f26805f57efa649835debaf67199465de1813a4506c9dcdefd2a818829aac00c9738715ee4dc846ae01ac444665c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku698418.exe

    Filesize

    295KB

    MD5

    4a5defc0bcbb014af14bf7bab951e172

    SHA1

    ea60d053a915b3aa883698aee186cd2533bb424f

    SHA256

    67abeab36a339e2a1d8e74953afe2423bbc09e080213a9da508e3d9156712016

    SHA512

    7a604d2ddea4d8183085d1b012afedeb01fec809bfe9e0d2eaa844f1abfe029a483b25dce0c101e271519d06149fd51758686d6be248606a597cd4d0b18b23a7

  • memory/1040-14-0x00007FFEC5CA3000-0x00007FFEC5CA5000-memory.dmp

    Filesize

    8KB

  • memory/1040-15-0x0000000000940000-0x000000000094A000-memory.dmp

    Filesize

    40KB

  • memory/1040-16-0x00007FFEC5CA3000-0x00007FFEC5CA5000-memory.dmp

    Filesize

    8KB

  • memory/3628-64-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-52-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-24-0x0000000004A80000-0x0000000004AC4000-memory.dmp

    Filesize

    272KB

  • memory/3628-32-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-40-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-88-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-86-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-84-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-82-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-80-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-78-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-74-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-72-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-70-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-68-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-66-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-22-0x00000000025A0000-0x00000000025E6000-memory.dmp

    Filesize

    280KB

  • memory/3628-62-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-60-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-56-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-54-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-23-0x0000000004C10000-0x00000000051B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3628-50-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-48-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-46-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-42-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-38-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-36-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-34-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-30-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-28-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-76-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-58-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-44-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-26-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-25-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/3628-931-0x00000000052C0000-0x00000000058D8000-memory.dmp

    Filesize

    6.1MB

  • memory/3628-932-0x00000000058E0000-0x00000000059EA000-memory.dmp

    Filesize

    1.0MB

  • memory/3628-933-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3628-934-0x0000000005A20000-0x0000000005A5C000-memory.dmp

    Filesize

    240KB

  • memory/3628-935-0x0000000005B70000-0x0000000005BBC000-memory.dmp

    Filesize

    304KB