Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:41

General

  • Target

    c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe

  • Size

    530KB

  • MD5

    e855686c0d686a35634ed481775ac171

  • SHA1

    9a1748ed972e0557e4a12bfb2e681ad81a385963

  • SHA256

    c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f

  • SHA512

    3bcca81370034abdbfa83162d933033c52f38b40b061e339f8e5ebbf21370f9c85f9c4a4c72dd019846b755bc4c1332abd87114fd4aaa39d0cde142c9c67ecba

  • SSDEEP

    12288:9Mrcy901Ci4I5kwbzPqhtzDeqOR1qwAEY7V2y:1ytiQSq9JOR1frY70y

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe
    "C:\Users\Admin\AppData\Local\Temp\c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn4154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn4154.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku024835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku024835.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn4154.exe

    Filesize

    387KB

    MD5

    d3f83fb9d107a9c11810ed52d744831b

    SHA1

    8418ed296d56d8658b867ba6614ef3b1b801925b

    SHA256

    2e29f517a030a26c5ed660757543640574f5dce47e4badb2f9187e2cdf460f47

    SHA512

    6cf43d4f75f347dbe1f963702e5444348230583fed65e5c4b6aa34e863718825b9eb799c4a0dafc7c26e9ffedf75bb47d16e89acab7995b886b429515438484a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exe

    Filesize

    12KB

    MD5

    63c36985ee4b73ccfd2ceef851e42ed7

    SHA1

    177cbabc3ddf183ca9a7dc8da971622b33320c7f

    SHA256

    88772b757d61396fddc9bfdb4fb7c5978c5868134caa46e226e0a2fb7eba494b

    SHA512

    cb7dd2769e239722c7a13d8e47382215c89f8b16f0e6185092b489271d1528ddab3ff4b0c0630dd6e109502249d2dbcc515853d6db6152407f4a2add80482f58

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku024835.exe

    Filesize

    353KB

    MD5

    2c7bdbae0f3efd39570c224004f4670c

    SHA1

    8b96a3e6e116e2040d05a995dc3d3f1d75816747

    SHA256

    1b485808228a5468f8dee744698213eaa97e148abb5cdffd03203d7487840e0a

    SHA512

    0f91a2ff59ef9318042cc9dedaa24cc84711a1d1d0e8dab0863a37e7587fb447c60d0a5bb485f96a790c4c5fb8851938dc4252059acdc95cbf4bfcbc06f07675

  • memory/1772-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/1772-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB

  • memory/1772-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-24-0x0000000004E10000-0x0000000004E54000-memory.dmp

    Filesize

    272KB

  • memory/1772-23-0x0000000004EE0000-0x0000000005484000-memory.dmp

    Filesize

    5.6MB

  • memory/1772-29-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-60-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-63-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-22-0x0000000004D50000-0x0000000004D96000-memory.dmp

    Filesize

    280KB

  • memory/1772-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/1772-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-42-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-71-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp

    Filesize

    252KB

  • memory/1772-931-0x0000000005490000-0x0000000005AA8000-memory.dmp

    Filesize

    6.1MB

  • memory/1772-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4384-16-0x00007FFAB13B3000-0x00007FFAB13B5000-memory.dmp

    Filesize

    8KB

  • memory/4384-14-0x00007FFAB13B3000-0x00007FFAB13B5000-memory.dmp

    Filesize

    8KB

  • memory/4384-15-0x00000000006D0000-0x00000000006DA000-memory.dmp

    Filesize

    40KB