Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 19:53

General

  • Target

    ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5.exe

  • Size

    530KB

  • MD5

    6e19cbb9314bb8ca324e7be15eb2f820

  • SHA1

    6c59b38fb917f99d51cb7c9d174215bfa252aa47

  • SHA256

    ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5

  • SHA512

    8c20cccb15b770d256f7e7cf1c9a69984f4d6b51aab14305e4f672c2479a308dd62666735b867bf3939df77db2173ffb5eecf8523897eb1ca82e76e7474af16c

  • SSDEEP

    12288:rMriy90XVHhwf/ADtTLZ8cf5KXa/+yN3nhHLYzK1+eoWFuh:pyIwnADlLrAxyN39LYmNfEh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5.exe
    "C:\Users\Admin\AppData\Local\Temp\ff3c83b007ca4e33757035ce95da0650987a9d885a770d1bb2d8c7fde1cd35b5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitl6038.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitl6038.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr874351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr874351.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku071828.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku071828.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1136
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitl6038.exe

    Filesize

    388KB

    MD5

    8f58c759ef15d0225b1d26a55760c15b

    SHA1

    cdd908ad9f4270e70b48e0ce8aadba68401ecb92

    SHA256

    73d9a475d0c5d302451bf7f1b5da66019655d6e68c6a860298597df79a8cdcd9

    SHA512

    16e12e48f5c40a9e496b75e20ff775a0fe0b6dae3927308ccbcec70f9c4187b417e608c310df3413ebc4a8d322d71f2c806f32496ea45c091adcab806c9dc1b2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr874351.exe

    Filesize

    12KB

    MD5

    07224d749d9d2ff8c1acbf87f2853d02

    SHA1

    c7f2f36fb0d43a30c31174e087fc631a449ae330

    SHA256

    99c85a2a520172cca0b4dc3d9c0f2fc7e7e24cdcd3beaf3f0d8ddae207f1fe36

    SHA512

    a9a47fdf1cc2f22baa299e02af2b13154c88f016b2c878d3206cf3a0e8eaa1fdb3692d33ad15d6210cdca8f845801578f600c778eab5025f1bd8c7371d1df4ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku071828.exe

    Filesize

    434KB

    MD5

    b7de94d0b0f5de96de020a88b46d0bec

    SHA1

    bee2be2bd2f8ca0ea664da40a9dce65d2cab256e

    SHA256

    fbf028e1d3acc32fb8efd4210b8ed6fba39bdd1b3e5440f6ad08e42cbcc8e393

    SHA512

    fd1d21cb87ac91a02fdd099771e81536abead3d0c06e72dc5a061593df1ac812075169e883c99bcec3ae20c73cae8c5a826a3b8ca49a151d5be06002837bdee2

  • memory/1136-66-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-22-0x00000000024C0000-0x0000000002506000-memory.dmp

    Filesize

    280KB

  • memory/1136-935-0x0000000005B40000-0x0000000005B8C000-memory.dmp

    Filesize

    304KB

  • memory/1136-61-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-23-0x0000000004CB0000-0x0000000005254000-memory.dmp

    Filesize

    5.6MB

  • memory/1136-24-0x0000000004B90000-0x0000000004BD4000-memory.dmp

    Filesize

    272KB

  • memory/1136-36-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-44-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-88-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-86-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-64-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-82-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-58-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-78-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-76-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-74-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-72-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-70-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-68-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-934-0x00000000059F0000-0x0000000005A2C000-memory.dmp

    Filesize

    240KB

  • memory/1136-84-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-933-0x00000000059D0000-0x00000000059E2000-memory.dmp

    Filesize

    72KB

  • memory/1136-81-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-56-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-54-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-52-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-51-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-48-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-46-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-42-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-40-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-38-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-34-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-62-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-32-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-30-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-28-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-26-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-25-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1136-931-0x0000000005260000-0x0000000005878000-memory.dmp

    Filesize

    6.1MB

  • memory/1136-932-0x0000000005890000-0x000000000599A000-memory.dmp

    Filesize

    1.0MB

  • memory/4692-16-0x00007FFCD4C03000-0x00007FFCD4C05000-memory.dmp

    Filesize

    8KB

  • memory/4692-14-0x00007FFCD4C03000-0x00007FFCD4C05000-memory.dmp

    Filesize

    8KB

  • memory/4692-15-0x0000000000750000-0x000000000075A000-memory.dmp

    Filesize

    40KB