Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:33

General

  • Target

    fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe

  • Size

    533KB

  • MD5

    21b86b48942b2706d79e21157d740f57

  • SHA1

    513065e7301ce8c455fc74bd1803e39eb0678392

  • SHA256

    fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc

  • SHA512

    0b3743ffb6072d0055d1a5ccb8f74e6296f786fba371a8d78bca65923766b9254daf657c21ec67063289dd56451c1907935b19fc3edb140d3dc879aba89fb7a5

  • SSDEEP

    12288:tMrcy90hHl1Rwzt8zhU0E6wImt/xZ16At73LqTBMq6Q/FcXX:lyKPe8tAtL16g73GTBM9c6XX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe
    "C:\Users\Admin\AppData\Local\Temp\fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTt5365.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTt5365.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku908187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku908187.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTt5365.exe

    Filesize

    391KB

    MD5

    206d66513bf1ed1c53ca9d43a98f9d21

    SHA1

    f358ed5715ac31128c4edf05f468aad59212b936

    SHA256

    a1081c9d8109675f909cdbeb711f354166a8a2fda564bc39522cba3327a7f1ba

    SHA512

    9187d1c528100fd48c6dad3e80fe0094c73b42db26b65ae00246b6118e1fda6353846453dedfa89d72b14372a47cf4e37bdc2b77c63d22fecdbb7396a0a6b295

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exe

    Filesize

    11KB

    MD5

    4a475d99016d2f9ce287cf2bc9f877c5

    SHA1

    f99f9780c425d7376a6c866423887d49b0c31a1a

    SHA256

    c0ad90c91edfcc7a6f71cebc3791413b468d8e287565b80f4711efc81805de8a

    SHA512

    b2e8d17ca4772fb9a924a55baf4e085df781f9992804116794c701ede593d89ca4c06ad700847cbc7cf31ea0675a53b06c546f9c1aea8a369545429413681e59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku908187.exe

    Filesize

    359KB

    MD5

    eee7ec6d80c29e91e5f72314b9865736

    SHA1

    c5907b7c01994abb90b901a4759ef6946e41d2b5

    SHA256

    6e8b681f1e6650ac90038ec6eb0738ed34aa7a900eb52fa485f4f54d9e4af9f7

    SHA512

    eb249a27050a853240fa44065851aaddbd827cbac8b790265e9dfc1c6df7c29dcc4ffe1f694a73629f201ec81845474a95bd1aee34efaa299b92bf7363dd62d5

  • memory/2136-72-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-22-0x0000000003A30000-0x0000000003A76000-memory.dmp

    Filesize

    280KB

  • memory/2136-935-0x00000000071C0000-0x000000000720C000-memory.dmp

    Filesize

    304KB

  • memory/2136-68-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-23-0x0000000006350000-0x00000000068F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2136-24-0x0000000003D90000-0x0000000003DD4000-memory.dmp

    Filesize

    272KB

  • memory/2136-62-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-36-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-28-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-26-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-70-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-78-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-66-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-86-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-85-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-82-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-80-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-76-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-74-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-934-0x0000000007070000-0x00000000070AC000-memory.dmp

    Filesize

    240KB

  • memory/2136-25-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-933-0x0000000007050000-0x0000000007062000-memory.dmp

    Filesize

    72KB

  • memory/2136-88-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-64-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-60-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-59-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-56-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-54-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-52-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-50-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-48-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-46-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-44-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-42-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-40-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-38-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-34-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-33-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-30-0x0000000003D90000-0x0000000003DCF000-memory.dmp

    Filesize

    252KB

  • memory/2136-931-0x0000000006900000-0x0000000006F18000-memory.dmp

    Filesize

    6.1MB

  • memory/2136-932-0x0000000006F20000-0x000000000702A000-memory.dmp

    Filesize

    1.0MB

  • memory/2168-16-0x00007FFB0A1B3000-0x00007FFB0A1B5000-memory.dmp

    Filesize

    8KB

  • memory/2168-14-0x00007FFB0A1B3000-0x00007FFB0A1B5000-memory.dmp

    Filesize

    8KB

  • memory/2168-15-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

    Filesize

    40KB