Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 13:45

General

  • Target

    46756ac011f876764306516c9bca1d988b92f3dfa4e11d9e676c6b355855a215.exe

  • Size

    530KB

  • MD5

    354ee07ec464b9a0fd76d05d47bdde7f

  • SHA1

    3b11355dd656e7813feb16526ee2095bb9fc4dc2

  • SHA256

    46756ac011f876764306516c9bca1d988b92f3dfa4e11d9e676c6b355855a215

  • SHA512

    ccd609ef03188d80c8e1e9b98a9bd3a568732caa2833de41e34d4b8480801fb236e80cf636965b2a9a019921c083af5a553ad326d39ebdb40320482282644e1e

  • SSDEEP

    12288:lMrcy90Oq+yZiK0VEB69k4h4qpQNI6F+yc/mEE8FxqwQxwkzle5b3:VyxDoif7fh4wQHcuEE8vqqOeV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46756ac011f876764306516c9bca1d988b92f3dfa4e11d9e676c6b355855a215.exe
    "C:\Users\Admin\AppData\Local\Temp\46756ac011f876764306516c9bca1d988b92f3dfa4e11d9e676c6b355855a215.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieu3200.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieu3200.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr357855.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr357855.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku193521.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku193521.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieu3200.exe

    Filesize

    388KB

    MD5

    4f2a69f4150a8da9ab921feea58b7403

    SHA1

    b975c9191af16808f9109484a01163a5632f68ea

    SHA256

    236a492840a106bf1feaaa9c1b9a60eead8e1211e5d85449bcd8a8dcc7d2ed6a

    SHA512

    0400b7b919793f82c26f08c270b0dfc769a1f434ca491e56cef6bbf507c4d2ea287b0c20963a2cb3f09e7cb7cf70fca689a7f7ee2f52608f3760da0f1bca2423

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr357855.exe

    Filesize

    11KB

    MD5

    d6d1620eb90f53e805b2d7fba82c6938

    SHA1

    95ec82194f168f9087de0ad4441047df018afe4a

    SHA256

    eb1c5e74588c7ddda69fa815df1a8f1cf98ae14d44297be93a3106e4dcbe6408

    SHA512

    547924a22a4ec57a5daf3d45368eec3f83a505cc2e75acd909bd0887a3633445c782c30fd37c46acf3cb715835768c9fa8cd115313b36660c0b06ecd638c5d5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku193521.exe

    Filesize

    354KB

    MD5

    0f074f85ae8cd72ef8e4dad8b14849c5

    SHA1

    b03fb8cf822778c823f4d123077a8d17dd6b24b2

    SHA256

    d71b8b2d4872bc1e0609cdb0986caef554c101c5565ed3ed52811c1bf2841874

    SHA512

    18f29f4ec2f7edca6776d0d919772a6bcf145940684aafb1dd0501445419cda38262e0029d5482cf508e2d7719eaf6af0e1edbe938080f90a5c0df0153bcddb6

  • memory/4360-64-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-22-0x00000000049A0000-0x00000000049E6000-memory.dmp

    Filesize

    280KB

  • memory/4360-935-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB

  • memory/4360-58-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-23-0x0000000007160000-0x0000000007704000-memory.dmp

    Filesize

    5.6MB

  • memory/4360-24-0x0000000007750000-0x0000000007794000-memory.dmp

    Filesize

    272KB

  • memory/4360-29-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-36-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-88-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-86-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-60-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-82-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-56-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-76-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-74-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-72-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-70-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-68-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-66-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-934-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

    Filesize

    240KB

  • memory/4360-85-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-933-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4360-78-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-55-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-52-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-50-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-48-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-46-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-44-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-42-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-38-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-34-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-32-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-30-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-80-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-62-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-40-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-26-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-25-0x0000000007750000-0x000000000778F000-memory.dmp

    Filesize

    252KB

  • memory/4360-931-0x00000000077C0000-0x0000000007DD8000-memory.dmp

    Filesize

    6.1MB

  • memory/4360-932-0x0000000007E60000-0x0000000007F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4792-16-0x00007FFC5D303000-0x00007FFC5D305000-memory.dmp

    Filesize

    8KB

  • memory/4792-14-0x00007FFC5D303000-0x00007FFC5D305000-memory.dmp

    Filesize

    8KB

  • memory/4792-15-0x0000000000600000-0x000000000060A000-memory.dmp

    Filesize

    40KB