Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 13:12

General

  • Target

    57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe

  • Size

    537KB

  • MD5

    80536f48f444c150e44d8c9522bb5f67

  • SHA1

    d2914d2015c60725e753f4c0f8c44ab2867fee35

  • SHA256

    57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b

  • SHA512

    d4351f030555b8ec3a407cb723e2deb8ee606c504b0de828a44dc583dea18bab25f00b26b590949de1a37bfdffb7d188863fc9e0b611279e26837a1c6e64611e

  • SSDEEP

    12288:7Mryy90ZXoVGrpTMVw3rUYeHew0RVN3oxF6R:9yuk+wVw3rC+w0R7o6R

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe
    "C:\Users\Admin\AppData\Local\Temp\57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifw1127.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifw1127.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885898.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885898.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifw1127.exe

    Filesize

    395KB

    MD5

    7b9de847628648c3e6f16cab640fc324

    SHA1

    0121dba2dd8ce363551c6ab740d41677ad760d3f

    SHA256

    9eb9366f3e6736e1285f81f16e66f9a58de2c1228df15858224e161a17b8760b

    SHA512

    ece1290efdc7b13e88a62999c71f27a53f7b409f27c3c066329b541a09553bec345acc540a45c217a52c20e41e0d6cb67259eb3faea1cd19cd085ce29c34026b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exe

    Filesize

    13KB

    MD5

    2c35c9a60829e4f20fb404062bf2196a

    SHA1

    4aa7722f1425e12dc58dbdb61b901dc3af21fb63

    SHA256

    56287aea6b3aa68167b13bba7ea083a5ef2e8c8c9f31c491e3bcf2943584203b

    SHA512

    1038d280f6abd984ee16def1b968b883977b86e15cc1a0dd1b70d4c27da4439288ac067d6e41934917d349285341c3d7e0266d5de5b7db92db5f6f031c005c7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885898.exe

    Filesize

    352KB

    MD5

    c142ba3050940de925a364c6b61a148f

    SHA1

    fad3b4bd59854cb1c052a1f05007410a61064a9b

    SHA256

    6bb6604fb75c47673b4716674ebb3fca17de3e41f9e35068b0017f60a85e67c5

    SHA512

    cd71a68d652cbb5040307d9272df8a8ef2738040bd218d069199a0fe5602723b2edd7c00cf072d14516d1f67b4f608da3a753761376c02e475b211218a95a735

  • memory/2428-14-0x00007FF896EF3000-0x00007FF896EF5000-memory.dmp

    Filesize

    8KB

  • memory/2428-15-0x0000000000C60000-0x0000000000C6A000-memory.dmp

    Filesize

    40KB

  • memory/2428-16-0x00007FF896EF3000-0x00007FF896EF5000-memory.dmp

    Filesize

    8KB

  • memory/3764-64-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-52-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-24-0x0000000002980000-0x00000000029C4000-memory.dmp

    Filesize

    272KB

  • memory/3764-38-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-36-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-88-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-86-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-84-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-82-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-80-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-78-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-74-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-72-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-70-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-68-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-66-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-22-0x00000000026D0000-0x0000000002716000-memory.dmp

    Filesize

    280KB

  • memory/3764-62-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-60-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-58-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-54-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-23-0x0000000004EF0000-0x0000000005494000-memory.dmp

    Filesize

    5.6MB

  • memory/3764-50-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-48-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-46-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-44-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-42-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-40-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-34-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-32-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-30-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-76-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-56-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-28-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-26-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-25-0x0000000002980000-0x00000000029BF000-memory.dmp

    Filesize

    252KB

  • memory/3764-931-0x00000000055E0000-0x0000000005BF8000-memory.dmp

    Filesize

    6.1MB

  • memory/3764-932-0x0000000005C40000-0x0000000005D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/3764-933-0x0000000005D60000-0x0000000005D72000-memory.dmp

    Filesize

    72KB

  • memory/3764-934-0x0000000005D80000-0x0000000005DBC000-memory.dmp

    Filesize

    240KB

  • memory/3764-935-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

    Filesize

    304KB