Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:27

General

  • Target

    a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d.exe

  • Size

    522KB

  • MD5

    813d1cc5ae4a59f3d19b41480910647e

  • SHA1

    c26bcb4c7b4da6c4c1b84d45701112618d2cb0d9

  • SHA256

    a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d

  • SHA512

    c3c1d87319d7212239a5052ff7fae6dce767af4336018db7335912200cedf9fb57e4864e470f6ab4b94e26ab0dfcbec791dc44b4ff9ff09932081bd4ba0b2a6d

  • SSDEEP

    12288:qMrYy90TwZBmfV+NDx6PkCD3gsD8lcoYxv7:ayE2Y+NDFe3DD0u

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d.exe
    "C:\Users\Admin\AppData\Local\Temp\a837a366e6f70e0de8ecde566db3fd9762579bee64a02e1af37c0c701269b11d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp8041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp8041.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr275761.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr275761.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960515.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisp8041.exe

    Filesize

    380KB

    MD5

    5a4c6fec322516a9707707cf4483ea52

    SHA1

    1f08f6161a1bc52a329562d8967630f830b8845e

    SHA256

    389f7b9ee60bd46b62d87189a18c583031e67941ff386a26df1a06d5ac6902a9

    SHA512

    305e1566383138e9dc10b61e54c81e7018d8edece7cbd7b95dae44c525371c370b76d0e7b04e7f3fb61e1ac3bd00186f06484578e8dd5785c8b13ab45269fcab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr275761.exe

    Filesize

    15KB

    MD5

    e2e85d0e71fb758294e9bcf5b7bd53d6

    SHA1

    2eec3cdabb56c7232f9737caac1510f67f869597

    SHA256

    bc839fe87546457eafcac5803e456db230a06cca6e62de42e37933664d9acc16

    SHA512

    f7bf3ad525b286639bcae14d6fd03e6d6e23ad99747595a027c0b73ce940350d0e1f42ddeaa1bb18f51c3290cdfb30aa30657e048a4618ea7a167e66ee63e19c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960515.exe

    Filesize

    294KB

    MD5

    72259bfde05fcc87bc1e43eea3604b5c

    SHA1

    e1df437bcf0d87d20c9b517b594ffc6d01c59986

    SHA256

    7b5c2d2f578f673b79e30296397dce4c30327eb9217bf107d4aa8d0620698629

    SHA512

    eac8e73ac5c1ba378aaca038c53ecf8580398b6b7931075b114b3235f2d980b76ea390e8ca4b96b9fd664da4199a3e3f80024848049b8db34758e1c5b78bc609

  • memory/2056-14-0x00007FF896CA3000-0x00007FF896CA5000-memory.dmp

    Filesize

    8KB

  • memory/2056-15-0x0000000000450000-0x000000000045A000-memory.dmp

    Filesize

    40KB

  • memory/2056-16-0x00007FF896CA3000-0x00007FF896CA5000-memory.dmp

    Filesize

    8KB

  • memory/2404-68-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-62-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-24-0x0000000002530000-0x0000000002574000-memory.dmp

    Filesize

    272KB

  • memory/2404-244-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-26-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-25-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-78-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-58-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-38-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-88-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-87-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-84-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-82-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-80-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-76-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-74-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-72-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-70-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-22-0x00000000022C0000-0x0000000002306000-memory.dmp

    Filesize

    280KB

  • memory/2404-66-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-64-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-23-0x0000000004C90000-0x0000000005234000-memory.dmp

    Filesize

    5.6MB

  • memory/2404-60-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-56-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-54-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-52-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-50-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-48-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-46-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-44-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-42-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-40-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-36-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-34-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-32-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-30-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-28-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/2404-931-0x0000000005240000-0x0000000005858000-memory.dmp

    Filesize

    6.1MB

  • memory/2404-932-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/2404-933-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

    Filesize

    72KB

  • memory/2404-934-0x0000000004C00000-0x0000000004C3C000-memory.dmp

    Filesize

    240KB

  • memory/2404-935-0x0000000005A70000-0x0000000005ABC000-memory.dmp

    Filesize

    304KB