Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 16:39

General

  • Target

    df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe

  • Size

    537KB

  • MD5

    52d596bce457264dfd819cb6046591e5

  • SHA1

    6e75172f51a1ec2a6e6c70e3cfab1652abb2a3b5

  • SHA256

    df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45

  • SHA512

    68594860f47c07259dbec3f830241b0ec0b5072484b4c4873ab0ed52362e3ee110d23b4ea8dd19aa57a7aea1b3ba869c5b0db13efe70555f112f83dbf929afcc

  • SSDEEP

    12288:oMr8y90eEXUT4xozzUfQHZD9zgY8Xyds11Q+mE/uLI:UyAUTlUQSY8i+1GLI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe
    "C:\Users\Admin\AppData\Local\Temp\df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk7743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk7743.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku287618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku287618.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3532
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk7743.exe

    Filesize

    395KB

    MD5

    46c742e063fd0b34416ac281950c8c3a

    SHA1

    79dd75ed4b62effb0dd926cd9c6c39dedc29e0ef

    SHA256

    423822bd88892e073edf073006e1342a20715d292944215ee17aea2ba365ccb9

    SHA512

    e8e4df2c4bb6da743b62baf5c88b79488a82207ee9b9be027b54c95f1c28fdc4e823e8168bffed8f970c5c069a93fe4c9df276e9a9b70d755d279e5d106d421d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exe

    Filesize

    13KB

    MD5

    10969b391064b25d59c040f0fffaa28e

    SHA1

    cfe3c4b487678e0bf582c4b5aa3fc6e60f74585b

    SHA256

    211253c90cc4a6e090eb0e3ea543c7be5b2a84df67342e3fb75153729b03c81f

    SHA512

    1fc7a929debbc26f248b40164f050ffcd0d422b46b6bf8dc016c2cc1abdbd493e2eb04c66dd8ca9b275ff6104d5527bb4865f4d15f159e310f7e39b24015d654

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku287618.exe

    Filesize

    353KB

    MD5

    6269d65aa861e78635e3f9c44b0ec5ae

    SHA1

    c6a3fc0f707c5c6d7f01f36eb6888991a40ffce6

    SHA256

    b7e126dc8695142fd20966ac17174ee35558691c5091c64ce274a977c3fdb87c

    SHA512

    2a924256980c92b58fd30e242d0a2b8d6074e56e689815be00da9d69d004443c209af9ff53250cc1d050fce7f7d20f8cc9a2b2f177cc3b7d3e4dbc577210509d

  • memory/3276-14-0x00007FFF75533000-0x00007FFF75535000-memory.dmp

    Filesize

    8KB

  • memory/3276-15-0x0000000000760000-0x000000000076A000-memory.dmp

    Filesize

    40KB

  • memory/3276-16-0x00007FFF75533000-0x00007FFF75535000-memory.dmp

    Filesize

    8KB

  • memory/3532-62-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-52-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-24-0x00000000027F0000-0x0000000002834000-memory.dmp

    Filesize

    272KB

  • memory/3532-38-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-88-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-86-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-84-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-82-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-78-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-76-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-74-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-72-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-70-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-68-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-66-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-64-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-22-0x00000000026D0000-0x0000000002716000-memory.dmp

    Filesize

    280KB

  • memory/3532-60-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-58-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-56-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-54-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-23-0x0000000004E70000-0x0000000005414000-memory.dmp

    Filesize

    5.6MB

  • memory/3532-50-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-48-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-46-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-44-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-42-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-40-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-36-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-34-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-32-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-30-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-80-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-28-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-26-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-25-0x00000000027F0000-0x000000000282F000-memory.dmp

    Filesize

    252KB

  • memory/3532-931-0x0000000005440000-0x0000000005A58000-memory.dmp

    Filesize

    6.1MB

  • memory/3532-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3532-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/3532-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/3532-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB