Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:11

General

  • Target

    ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8.exe

  • Size

    530KB

  • MD5

    9f6bd5d10588e682b323660ecda48d33

  • SHA1

    391bd20e76781d6e5b93d861d89abfdb60798e8f

  • SHA256

    ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8

  • SHA512

    335b266b6e75006d4923517cb7889e28c067375335aa7fcdac4dfde692abe7796842ad275fa647c4cce89b2e6c71d77edae4e31c8c89c5d0a86f2d7643b399eb

  • SSDEEP

    12288:KMrvy902Jdu7E/5UxxYrF61o7de3OS1ywDL3Xl1Gt1:Jy5JYwhIarF6uZeOS1XDzV1U

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6cbb30bd40a52e78626ae42f9939c520258479ecfcad5fad95c9a9e41a58b8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicV7911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicV7911.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr643027.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr643027.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133023.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133023.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicV7911.exe

    Filesize

    387KB

    MD5

    cebc325b748730823f96406fb5cd2d69

    SHA1

    9b0aa2f5cb003f61ed867eba52d437a64aea0e3b

    SHA256

    e3ab89b089b127b479dc537989aef64fcf58a17cb8d3d339cb1e4c475e89a45f

    SHA512

    54c27fc92b71f4d3c7487831bf792d931b6956147db5d2c3dc5584155ef93d57cabeb90b41d192b6bbea232f278ef378603a79dbc800ee7b1c47aa34f135f871

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr643027.exe

    Filesize

    12KB

    MD5

    79593f4e18eb20db0571afbfb5cb6a35

    SHA1

    abe567aba9c25178af49d45d0f49e01a97546760

    SHA256

    5e0487738cb17437db43a05b25f1e5cf73740f51141903d8c8382dac1d322da0

    SHA512

    aadb80450f7ad8eed925330d0fda2f53822ff054fbbff72fd10747df0af34839399d7f221ceedf8524ddd843e10eaf5fb51bd2c6025194a903ddc9dae0fea532

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133023.exe

    Filesize

    353KB

    MD5

    7d177d4ad77dcea6db851d3ba7526c65

    SHA1

    e9e83c04cf61cdafacd87e20867c46884b6b5c47

    SHA256

    42e5dbe87dd644f15820ac6d6e82014db7192d2b651b5351a57571a0a630da93

    SHA512

    b6d08799004428e5902855fa08fb59e3ef06eae948156ab0c6e2cc290f4e9d899e437f927b8f26120895af11bedd8caf8d86a27b30da1c17dd8500df89be0a2d

  • memory/1732-14-0x00007FFD9D423000-0x00007FFD9D425000-memory.dmp

    Filesize

    8KB

  • memory/1732-15-0x00000000004D0000-0x00000000004DA000-memory.dmp

    Filesize

    40KB

  • memory/1732-16-0x00007FFD9D423000-0x00007FFD9D425000-memory.dmp

    Filesize

    8KB

  • memory/3596-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp

    Filesize

    272KB

  • memory/3596-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-36-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-32-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-22-0x00000000026F0000-0x0000000002736000-memory.dmp

    Filesize

    280KB

  • memory/3596-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-23-0x0000000004ED0000-0x0000000005474000-memory.dmp

    Filesize

    5.6MB

  • memory/3596-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-68-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-56-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-54-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-50-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/3596-931-0x0000000005480000-0x0000000005A98000-memory.dmp

    Filesize

    6.1MB

  • memory/3596-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3596-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/3596-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/3596-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB