Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 12:10

General

  • Target

    d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe

  • Size

    530KB

  • MD5

    36eeb28cc41c90ebb7b37566a64b41e8

  • SHA1

    f6c49647b25bc49393bef03150f0102436e0732f

  • SHA256

    d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49

  • SHA512

    69802b9c9ce31233830294c81fbf55f3f192c2218ee12130f73ce41fb7308d02bdefc54266ad7ee068459184e1799ba568521842a488a7556cb908b8a6067da4

  • SSDEEP

    12288:IMr6y909t3lb96i16KnPR5f5KXa/6mCgoh4tigRcL:yy+t3lJ6I6KPHA1mCgohF0cL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe
    "C:\Users\Admin\AppData\Local\Temp\d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu2233.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu2233.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649437.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu2233.exe

    Filesize

    388KB

    MD5

    8990ac877a1000ed1b4f257e5d5df627

    SHA1

    48602887f55bf2698e74e25174f32b792f8aa75d

    SHA256

    07e76c3008eec30eb2449520b744079f9de35e46ce403d3476e0e74230814742

    SHA512

    5f4310f023b54ec15a526eb2d2441b3727b7f70301dcc0e478e62da0227204913c200beeffb5e2a29c2873a2c3538601b37115857e306ade7948587ecd3c5d74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exe

    Filesize

    12KB

    MD5

    0b58bbcc4e55a907e17a6cf6d4c4aa36

    SHA1

    60eda9297adae40821bdc6401a0977b10762b3a3

    SHA256

    e21f096ce2ac8675b08d60d7b72de941c381ac3f023ccea0736fd459f479e732

    SHA512

    1e47bcc9842316ad2c953afc500af6e94993a5fed3267bdbde3eba62313651b4fd5f99ba7bd27e6a8c0c2e2caa10634b8d80618a6d6b2fc9c6878be61b84e939

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649437.exe

    Filesize

    434KB

    MD5

    1654ad66aff37da97d28ee4cb2760484

    SHA1

    7d5582f5506e80093a9d5f67de71c4b14b25fc2a

    SHA256

    4fc639f3899a369325f4ce13b0474fdb247a9259cc4c4e9093d7d805bc2e7c8d

    SHA512

    4e204342a2e1da1e8876b069d3f4cbada36a89fc7f6fd15ae3241e8e0c69ea481dfc4c7dfae67b4745f084321a97216418a1ddb9976f9695165ba7da23296f06

  • memory/2128-64-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-22-0x00000000023A0000-0x00000000023E6000-memory.dmp

    Filesize

    280KB

  • memory/2128-935-0x0000000005C80000-0x0000000005CCC000-memory.dmp

    Filesize

    304KB

  • memory/2128-58-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-23-0x0000000004BA0000-0x0000000005144000-memory.dmp

    Filesize

    5.6MB

  • memory/2128-24-0x0000000005190000-0x00000000051D4000-memory.dmp

    Filesize

    272KB

  • memory/2128-26-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-42-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-88-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-86-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-60-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-80-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-56-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-76-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-74-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-72-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-70-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-68-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-66-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-934-0x0000000005B30000-0x0000000005B6C000-memory.dmp

    Filesize

    240KB

  • memory/2128-82-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-933-0x0000000005B10000-0x0000000005B22000-memory.dmp

    Filesize

    72KB

  • memory/2128-79-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-54-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-52-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-50-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-48-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-46-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-40-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-38-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-36-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-34-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-32-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-30-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-28-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-84-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-62-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-44-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-25-0x0000000005190000-0x00000000051CF000-memory.dmp

    Filesize

    252KB

  • memory/2128-931-0x0000000005330000-0x0000000005948000-memory.dmp

    Filesize

    6.1MB

  • memory/2128-932-0x00000000059D0000-0x0000000005ADA000-memory.dmp

    Filesize

    1.0MB

  • memory/3240-16-0x00007FFFF2FD3000-0x00007FFFF2FD5000-memory.dmp

    Filesize

    8KB

  • memory/3240-14-0x00007FFFF2FD3000-0x00007FFFF2FD5000-memory.dmp

    Filesize

    8KB

  • memory/3240-15-0x0000000000410000-0x000000000041A000-memory.dmp

    Filesize

    40KB