Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:01

General

  • Target

    492d84e0e621f8b6062cbe2dd528e1c14071383dce7abc4ff3a3c1e4defee5bf.exe

  • Size

    529KB

  • MD5

    adc79196052a85c5cbac83fb36233b77

  • SHA1

    85b3e4bf37a88d714320f900c698f508a1cae43d

  • SHA256

    492d84e0e621f8b6062cbe2dd528e1c14071383dce7abc4ff3a3c1e4defee5bf

  • SHA512

    deb176430554df68835e0ad039c8ff4cd55a3063611f824b06e05c4c5ddd6a53b7fbdabdaeea3f37c16447472db139196cda22cd26c7fefd22a76110c986cab2

  • SSDEEP

    12288:hMrgy90IBtezjPNZfypZBerkIKPcTZHfnAGGA0k8+VSlgicahVk:lydezj1ZfypZBersPCJfnABhka+lGG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\492d84e0e621f8b6062cbe2dd528e1c14071383dce7abc4ff3a3c1e4defee5bf.exe
    "C:\Users\Admin\AppData\Local\Temp\492d84e0e621f8b6062cbe2dd528e1c14071383dce7abc4ff3a3c1e4defee5bf.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLJ3282.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLJ3282.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr670525.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr670525.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku116003.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku116003.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLJ3282.exe

    Filesize

    388KB

    MD5

    a46616428fc72f3c22f9d10639ea430e

    SHA1

    eaf494da16e27968438200dab9a502a06dfb182b

    SHA256

    ea02d01de274ba8facd8867bf3678138b8d1b76f9b4c043e6162ec352a826601

    SHA512

    e0424f47f8e502e02aabde44e38e3718b755ad3a9894f109375b76dc96fb59d3a7846aa7d03cd36f1cf216ef1c57f694d99a7f6b20bc95ede66cf5ac54be7b98

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr670525.exe

    Filesize

    12KB

    MD5

    7d3e9519d040ef486f916d2fd0e1e575

    SHA1

    c4fbdb2d2dd539d89c884c527fb9b563576eb255

    SHA256

    a9009400a38edb155dceb082d00494c18d7743c8f4f7520e96ce164121b96c6e

    SHA512

    b8630e07c85e73e8024d2d2703ab88f83f685a3d4afcc837792aa69515b780570dff886f77f7e305d324e96be9ae009f3cb8a26678042d5494093281f4e7790c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku116003.exe

    Filesize

    434KB

    MD5

    ce9f9bf66ee66e61758db127143bbb99

    SHA1

    b5c69d7799a91e662a6fb706156dfa082925abfc

    SHA256

    13079a6d94d18fd9d323829d3a64976687933d9586c362bdc15588e0ed6b2d03

    SHA512

    3ab1fc0e06defbf9abf874db6e410fdf511c8a698e1af9828f95a56acfcb83a7800d5c95cc21eabee93e4fd997f9d233ceb543019035936b4222859f8744c7d4

  • memory/2264-14-0x00007FFD51E60000-0x00007FFD51EFD000-memory.dmp

    Filesize

    628KB

  • memory/2264-15-0x00000000003C0000-0x00000000003CA000-memory.dmp

    Filesize

    40KB

  • memory/2264-17-0x00007FFD51E60000-0x00007FFD51EFD000-memory.dmp

    Filesize

    628KB

  • memory/4072-62-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-52-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-24-0x0000000005400000-0x0000000005444000-memory.dmp

    Filesize

    272KB

  • memory/4072-40-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-88-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-86-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-84-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-82-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-80-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-78-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-76-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-72-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-70-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-68-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-66-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-64-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-22-0x0000000002770000-0x00000000027B6000-memory.dmp

    Filesize

    280KB

  • memory/4072-60-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-58-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-56-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-54-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-23-0x0000000004E50000-0x00000000053F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4072-50-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-48-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-46-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-44-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-42-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-38-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-36-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-34-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-32-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-30-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-28-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-74-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-26-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-25-0x0000000005400000-0x000000000543F000-memory.dmp

    Filesize

    252KB

  • memory/4072-931-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4072-932-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4072-933-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4072-934-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4072-935-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

    Filesize

    304KB