Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 19:15

General

  • Target

    808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe

  • Size

    534KB

  • MD5

    c08a47390134cb61562000af6e434d24

  • SHA1

    eafefbe4dfbaa29c8c1507e110853cd453c6b73a

  • SHA256

    808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4

  • SHA512

    f7a72134228811e35655ad30ee36fe3f5f6dd7b59f49507319e394a4a477f02fda003214a419b4fe241633bc1863d7290d9ccb91adc25bd60ec4a2e58c423bab

  • SSDEEP

    12288:IMrqy90e67T6cLx5olAzEyqBpOCGrL/O61poVrePDT1:Syy5ypBpOhbEry1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe
    "C:\Users\Admin\AppData\Local\Temp\808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieo2541.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieo2541.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672592.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672592.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieo2541.exe

    Filesize

    392KB

    MD5

    3f604f1b7d7ac5989c4aa16de5c5e3ce

    SHA1

    803123a6d72b543fbee60b08d1a91c92b7f9ccec

    SHA256

    bfb0652eb4a224d003b56e8c9dd1d0637b86de5d437c58a726c5970284c6f8a1

    SHA512

    0593f0d46cc6aaa1fe083e262a5d1858b50856b81d1767ff8a8a4159e5a5848dbba11cfab3ee9ab7a198d39fc728af074a591aaa366d49b436fab1e40b827203

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exe

    Filesize

    11KB

    MD5

    e8ed1f81397f5f52efbbeb3d4e4c11a2

    SHA1

    db8f98b1d64afa55ca3702a0aa99aee275121080

    SHA256

    37f44c0ef6d51e0d14c1e542015bd61890e740e0867f6212b90a56452627355f

    SHA512

    72af2dd2ca0169c85f430a0b0e3f0adc34e3bca50853a99564caa56a377005821b10bb6519c397dd5d08f6a835442fb9370d6d566508f8d256de4c470311b2d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672592.exe

    Filesize

    318KB

    MD5

    12b6727bf2ca6825c1dea3f2129fc3f8

    SHA1

    ef6a1770368574872e32e2d1bfd01b5277152143

    SHA256

    fbd74b0411f355bd72805cf07cd6675c7839ad9871342e629bd6e4f671430d07

    SHA512

    a35a6b27a4ead65937cb7616465d2931aff7c042fcb7c5d40fadbe932bdd87935c8eeaa129f0efaa8d6281dc2b6f40fe2cef4c47325b1c87515213bf66ba040d

  • memory/3616-62-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-22-0x00000000022E0000-0x0000000002326000-memory.dmp

    Filesize

    280KB

  • memory/3616-935-0x0000000005A40000-0x0000000005A8C000-memory.dmp

    Filesize

    304KB

  • memory/3616-58-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-23-0x0000000004AE0000-0x0000000005084000-memory.dmp

    Filesize

    5.6MB

  • memory/3616-24-0x0000000002550000-0x0000000002594000-memory.dmp

    Filesize

    272KB

  • memory/3616-30-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-36-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-89-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-84-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-60-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-80-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-56-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-76-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-74-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-72-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-70-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-68-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-64-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-934-0x00000000058F0000-0x000000000592C000-memory.dmp

    Filesize

    240KB

  • memory/3616-82-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-933-0x00000000058D0000-0x00000000058E2000-memory.dmp

    Filesize

    72KB

  • memory/3616-79-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-54-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-52-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-48-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-46-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-44-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-42-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-40-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-38-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-34-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-32-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-86-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-66-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-50-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-28-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-26-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-25-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/3616-931-0x00000000050F0000-0x0000000005708000-memory.dmp

    Filesize

    6.1MB

  • memory/3616-932-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/3672-16-0x00007FFFFD753000-0x00007FFFFD755000-memory.dmp

    Filesize

    8KB

  • memory/3672-14-0x00007FFFFD753000-0x00007FFFFD755000-memory.dmp

    Filesize

    8KB

  • memory/3672-15-0x0000000000120000-0x000000000012A000-memory.dmp

    Filesize

    40KB