Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 17:47

General

  • Target

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe

  • Size

    530KB

  • MD5

    3fd6d5f18bf08b4b813b6cc8c533ba26

  • SHA1

    219181babf1539a1700aefaab3d76dec6e8800a0

  • SHA256

    92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491

  • SHA512

    8a3e517cf5301339651baa9698d6c2c2debeb0347a5ca5f948308b474e3201944e730de6b16fe1b10dfa828bcaf737842f32ef526cf76a23e509f3a378cfdb59

  • SSDEEP

    12288:SMrYy90oG/dW02HD+BRTIO245aU+hwk5o0/vCV1E:eyQX2j+BVwhwAAV1E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe
    "C:\Users\Admin\AppData\Local\Temp\92a3cacf353b52ae72515e0dac58e73c948558631c61cf2853bb62d47325e491.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieO5240.exe

    Filesize

    388KB

    MD5

    add044658a447aefe61f8ed8060b63da

    SHA1

    5b636d5d16940fee0c1b4b062510c0cbdd02f2ec

    SHA256

    a1f5cc3f80ed509e0cb144a092d011b5a119d98ab083624241269d98efa4c051

    SHA512

    9f1c9f440c821b46791526668a75853a073077cc81a612ddc971373a4097553b09d31a8449f03b47d47c330ef8f5fede176ba5a0939e2094eca8726526398134

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr426448.exe

    Filesize

    12KB

    MD5

    4bc2c6f93dc57bc281e509c28695d10c

    SHA1

    bf31cd0c8b54fe127125eb8a46710ea2f94dd935

    SHA256

    250a3899c3714d74f299ed48fbae6a6e711fbf661ad307da9e60c37dc6db9212

    SHA512

    0793902dd1499cb24a7b995e45c98ba702a7294b4104241e05119dbe3b63efd28ed099d9a1f2332e8ccc02019a98276f6d08abf2bac09f52c1792659a2906c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku137820.exe

    Filesize

    355KB

    MD5

    bc1a2339b3c6fe4fe6de713a378175bf

    SHA1

    b1c47c0db380ec5ee5a403d6b784e859d9d9b713

    SHA256

    7f4445cb1eaeef02700827529ef3a022f634d5cdfcbadb0123ec0b34e853f5a2

    SHA512

    88498fcd66733cb018998f559c88bce9619925a0dc24354c577a225f044067775f4227237c1f0cc076e868263327160797303bd46496cd77b8437012cbb52d95

  • memory/3044-14-0x00007FFCFB503000-0x00007FFCFB505000-memory.dmp

    Filesize

    8KB

  • memory/3044-15-0x0000000000650000-0x000000000065A000-memory.dmp

    Filesize

    40KB

  • memory/3044-16-0x00007FFCFB503000-0x00007FFCFB505000-memory.dmp

    Filesize

    8KB

  • memory/4548-58-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-48-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-24-0x0000000004D50000-0x0000000004D94000-memory.dmp

    Filesize

    272KB

  • memory/4548-42-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-86-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-82-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-80-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-78-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-76-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-74-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-72-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-70-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-68-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-66-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-62-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-60-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-22-0x0000000004930000-0x0000000004976000-memory.dmp

    Filesize

    280KB

  • memory/4548-56-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-54-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-52-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-50-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-23-0x0000000007250000-0x00000000077F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4548-46-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-44-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-40-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-38-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-36-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-34-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-32-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-30-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-88-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-84-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-28-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-64-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-26-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-25-0x0000000004D50000-0x0000000004D8F000-memory.dmp

    Filesize

    252KB

  • memory/4548-931-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/4548-932-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-933-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/4548-934-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/4548-935-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB