Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 18:49

General

  • Target

    75e56d253a1ddb9bd8f878dfbe1d3602eea8557bad6b3699135819b1c6e456f2.exe

  • Size

    534KB

  • MD5

    daa0f79126b5deb3d6c3ebb065e2ae3c

  • SHA1

    f9aaa3495e93bc49949f2a4d60527ab8e18ca7c2

  • SHA256

    75e56d253a1ddb9bd8f878dfbe1d3602eea8557bad6b3699135819b1c6e456f2

  • SHA512

    39686f368f6c38dfb6dacd70cb3d9bd02ec7dc72cfeb41bfe40016aa440e2a6e2117626cce8b8378f230a93e7a9ad7fc7cab5e63184904b4d96a99f03432ae40

  • SSDEEP

    12288:lMrcy90Ca8ciSL/PzI2IzMbHWDmLqdL9dtyb8yUd:FyRahDFIzEHwmidYb8fd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75e56d253a1ddb9bd8f878dfbe1d3602eea8557bad6b3699135819b1c6e456f2.exe
    "C:\Users\Admin\AppData\Local\Temp\75e56d253a1ddb9bd8f878dfbe1d3602eea8557bad6b3699135819b1c6e456f2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicg0961.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicg0961.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr309578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr309578.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792722.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792722.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicg0961.exe

    Filesize

    392KB

    MD5

    f93e288346a637a490dd19d2b141d0ff

    SHA1

    b0d355538edc06762bf3c282012c8633a37757ec

    SHA256

    7ae8bc38cf029d0c4645e91d536b75852245648950d56fd30cecc1bc3e839212

    SHA512

    9dd917542dbb52220a7e73c02e238aed8bb17dc7041c42b2b762033a0a5b58b991994d401790599135b9a63fe8e007402bc648b9eeaaaec92aede07e1e1a0103

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr309578.exe

    Filesize

    12KB

    MD5

    921caedeb73cfa0eaa88f3f8775dcb76

    SHA1

    a453fba07bd888d005bd3875b1152596b8aabe05

    SHA256

    67337fa042f5b40a26643466cd059c2e30ffbd99b18b35707ae3b409fa483e91

    SHA512

    16e028bafb3a844bb11458baf69a6082d61b5a6681b88c057d90b5cc774f5141e522f677e2f027663e4196bb35fd75a461db8c1bc848e61f1319d682f25355fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792722.exe

    Filesize

    319KB

    MD5

    fb9bcce182c8a71fa1da591fb967bec4

    SHA1

    b285577aaec99b18fcb152e66d717a05bcab3ad9

    SHA256

    4a78c55210cc3835debfb50ffcd281e6438b0a0eb246cdb144026c3ccb29878d

    SHA512

    89085accad38516375a1b978aa3f37446187438e70e4222e006b73112063da991f4d23b042d9354a36fc15d11a61005889a88f319d0c8a647fbb0dda37e26ff6

  • memory/4464-14-0x00007FF942C13000-0x00007FF942C15000-memory.dmp

    Filesize

    8KB

  • memory/4464-15-0x0000000000950000-0x000000000095A000-memory.dmp

    Filesize

    40KB

  • memory/4464-16-0x00007FF942C13000-0x00007FF942C15000-memory.dmp

    Filesize

    8KB

  • memory/4916-68-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-58-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-24-0x0000000002410000-0x0000000002454000-memory.dmp

    Filesize

    272KB

  • memory/4916-86-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-70-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-54-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-46-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-30-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-88-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-84-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-82-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-80-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-78-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-76-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-74-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-72-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-22-0x0000000002370000-0x00000000023B6000-memory.dmp

    Filesize

    280KB

  • memory/4916-66-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-64-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-62-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-60-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-23-0x0000000004D70000-0x0000000005314000-memory.dmp

    Filesize

    5.6MB

  • memory/4916-56-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-52-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-50-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-49-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-44-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-42-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-40-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-38-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-36-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-34-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-32-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-28-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-26-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-25-0x0000000002410000-0x000000000244F000-memory.dmp

    Filesize

    252KB

  • memory/4916-931-0x0000000005320000-0x0000000005938000-memory.dmp

    Filesize

    6.1MB

  • memory/4916-932-0x0000000004C10000-0x0000000004D1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4916-933-0x0000000002790000-0x00000000027A2000-memory.dmp

    Filesize

    72KB

  • memory/4916-934-0x0000000004D20000-0x0000000004D5C000-memory.dmp

    Filesize

    240KB

  • memory/4916-935-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB