Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 12:05

General

  • Target

    775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe

  • Size

    537KB

  • MD5

    d5940e773584f1cb5df4424b9e7ead00

  • SHA1

    16360fe75400205b6cd709b756b0cb5a186729ef

  • SHA256

    775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f

  • SHA512

    a180436147d4162c8484a29b3b816cd55824c7c72541433b1b5f2b96d0d08c0f8833b7b0bc298da054864759cd59d20782573954d1c4c0b14bc375fb1b34be42

  • SSDEEP

    12288:zMrWy90Ys+tBi1Ru5ODfZEOW4xl4i1sN15wuUA6AT:JyNDtBiWgD6OJ4LnTr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe
    "C:\Users\Admin\AppData\Local\Temp\775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ5667.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ5667.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706516.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ5667.exe

    Filesize

    383KB

    MD5

    5338d80240b9d6d398cf2f0237606d4a

    SHA1

    d3bf4fa106caf31b5c686d4b767a0f50446edd28

    SHA256

    536ecf1e66ac90211690e5e50003494d8a34d7df0df4c1387114ba1cbf279b19

    SHA512

    0ef99255a3649cd3ead48a815ee6be696b04294e2b7ca1c9805313607c84801b694b060b808e118ccc6a1a33069aa4212a79c25c1d19295b91fe746ef8293ccf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exe

    Filesize

    13KB

    MD5

    6a266dfa4a206f819a896ce11534d0e7

    SHA1

    4761380821b67e5be8f976493595f0c2946eec45

    SHA256

    cc40b0f8a2f0461dbedbc34c4e1be7cc8e5bddd3c039191c06f29c8b03f46c80

    SHA512

    392779dc08830a125703647abcb9ca3fd4231e8290dd9c9bd749d4a924ee47e1a7e27f9a59d384f41a327cc00461e8499c9ef74692e503ad1a371e5990efe573

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706516.exe

    Filesize

    311KB

    MD5

    e612e4211e08de49456c4da59a49e281

    SHA1

    b466ef7ca9efb81e96da0654d8e776c96b4c8151

    SHA256

    ced2a1564b4430227f5ecabe4721b36f5e77d14e82a575f2ef3e4f3d04b85001

    SHA512

    93925ebaac233641a099cc22c45fe5b28b4f18770d5f2c6a0bad393ce0def0b43272851c18cf3836abf2794fc903004000a795bebb736e2a0dc6f1227251162c

  • memory/880-62-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-22-0x00000000023C0000-0x0000000002406000-memory.dmp

    Filesize

    280KB

  • memory/880-935-0x0000000004C50000-0x0000000004C9C000-memory.dmp

    Filesize

    304KB

  • memory/880-58-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-23-0x0000000004CC0000-0x0000000005264000-memory.dmp

    Filesize

    5.6MB

  • memory/880-24-0x0000000002580000-0x00000000025C4000-memory.dmp

    Filesize

    272KB

  • memory/880-32-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-40-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-88-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-84-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-60-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-80-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-56-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-76-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-74-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-72-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-68-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-66-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-64-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-934-0x0000000004C00000-0x0000000004C3C000-memory.dmp

    Filesize

    240KB

  • memory/880-82-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-933-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

    Filesize

    72KB

  • memory/880-78-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-52-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-50-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-49-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-46-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-44-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-42-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-38-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-36-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-34-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-30-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-86-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-70-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-54-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-28-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-26-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-25-0x0000000002580000-0x00000000025BF000-memory.dmp

    Filesize

    252KB

  • memory/880-931-0x0000000005270000-0x0000000005888000-memory.dmp

    Filesize

    6.1MB

  • memory/880-932-0x0000000005890000-0x000000000599A000-memory.dmp

    Filesize

    1.0MB

  • memory/2740-16-0x00007FFE718C3000-0x00007FFE718C5000-memory.dmp

    Filesize

    8KB

  • memory/2740-14-0x00007FFE718C3000-0x00007FFE718C5000-memory.dmp

    Filesize

    8KB

  • memory/2740-15-0x0000000000B80000-0x0000000000B8A000-memory.dmp

    Filesize

    40KB