Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 19:49

General

  • Target

    3f9842ce4deb52f3428037a151f9624e2c30aa7c0449258bd45fee7b353bbcd3.exe

  • Size

    561KB

  • MD5

    85a72b8c025b6bef1830e1a959a80005

  • SHA1

    ad60e2288a499d698f57707381f90edbde31928e

  • SHA256

    3f9842ce4deb52f3428037a151f9624e2c30aa7c0449258bd45fee7b353bbcd3

  • SHA512

    9c817e7446d059c5a75a9f643397220b2f8331f4d5966ff711179084508ad176ba2ffa8d5ee217d2e8ff922c56997c5889a48f57868ced6045f8e3f5a522150e

  • SSDEEP

    12288:EMrky90SjFJHbBYlA6hTDefhCEBL8R8pZeeUZlJlwxoPCT:wyRjwTqfhCTR8eeFOCT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f9842ce4deb52f3428037a151f9624e2c30aa7c0449258bd45fee7b353bbcd3.exe
    "C:\Users\Admin\AppData\Local\Temp\3f9842ce4deb52f3428037a151f9624e2c30aa7c0449258bd45fee7b353bbcd3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHZ3405.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHZ3405.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229026.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229026.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku809900.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku809900.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHZ3405.exe

    Filesize

    406KB

    MD5

    958a5c10a113a4deb0ee3976b0196384

    SHA1

    0bc6c060efd5de22d090b851cd5b4cb074cf071f

    SHA256

    475544821278d348a97b2e8bca13c6b0a3ab1e32e101894e224bf731bb7b44df

    SHA512

    94a57bd1a7293ea76917dfc271c6cd9439c90521f11b07cd1dffebaaf8c8b192794c1d21d03284b6ec1d96627f019fe83f28372647bc15c925f695c22acfa0ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229026.exe

    Filesize

    11KB

    MD5

    63ad89a9a8af000b4e51d0f893aad085

    SHA1

    21f1e059d707e49f48331b13ab8332395d2821a5

    SHA256

    b00ec97cdf7d31f31c4b35bd2ef8cf500373d642e7e3d13a326f26443e0c4808

    SHA512

    0794e9fdc53c0f56af4e2fb4597facf387d302b25fd04d5b11aa687846327cb723007c020bb744102f7211142e8d9a3bd2fe28604d248bd7d15eeb93cde9418c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku809900.exe

    Filesize

    372KB

    MD5

    faba61f14d374ae7ff9fe2ad2cc65782

    SHA1

    5160e7091fa66c7714bd3c78b9efa9cda9e93793

    SHA256

    8e9aecab9881e0fec7b1b68f0c5cfbea4f1b29ba6b8c2cea1406a5af26597329

    SHA512

    b99f891138a916305482ed3767dd0fe4590c905e66fdb039be111cf7344fdce9efc09ea58c57e0ba9a38d778da214cf6c2e024097eb5a56a6d5034150342aaea

  • memory/2632-14-0x00007FFBFA2B3000-0x00007FFBFA2B5000-memory.dmp

    Filesize

    8KB

  • memory/2632-15-0x0000000000760000-0x000000000076A000-memory.dmp

    Filesize

    40KB

  • memory/2632-16-0x00007FFBFA2B3000-0x00007FFBFA2B5000-memory.dmp

    Filesize

    8KB

  • memory/3940-64-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-52-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-24-0x0000000004E30000-0x0000000004E74000-memory.dmp

    Filesize

    272KB

  • memory/3940-36-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-38-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-88-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-86-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-84-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-82-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-80-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-78-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-76-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-72-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-70-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-66-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-22-0x00000000024F0000-0x0000000002536000-memory.dmp

    Filesize

    280KB

  • memory/3940-63-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-58-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-56-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-54-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-23-0x0000000004EE0000-0x0000000005484000-memory.dmp

    Filesize

    5.6MB

  • memory/3940-50-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-48-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-46-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-44-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-42-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-40-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-34-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-33-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-30-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-28-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-68-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-60-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-26-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-25-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/3940-931-0x0000000005490000-0x0000000005AA8000-memory.dmp

    Filesize

    6.1MB

  • memory/3940-932-0x0000000005AF0000-0x0000000005BFA000-memory.dmp

    Filesize

    1.0MB

  • memory/3940-933-0x0000000005C30000-0x0000000005C42000-memory.dmp

    Filesize

    72KB

  • memory/3940-934-0x0000000005C50000-0x0000000005C8C000-memory.dmp

    Filesize

    240KB

  • memory/3940-935-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

    Filesize

    304KB