Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:01

General

  • Target

    26eba4f8b78335ec524bf72299bbb462cc688e7276ff8aea133bff80e22bc340.exe

  • Size

    533KB

  • MD5

    52c8b4599d5035e4ad577f8276d2e835

  • SHA1

    34360100387be5b8900576c5024b9948d9166068

  • SHA256

    26eba4f8b78335ec524bf72299bbb462cc688e7276ff8aea133bff80e22bc340

  • SHA512

    085035774dc6428f8bf5e564df127e28d153b27d4fa250b9db3744811e32fda0cd86a0fd420d9e8c0e15de1d4bd4199e01506873c25bb07d79d793d571d88ccc

  • SSDEEP

    12288:sMrAy90K07oFjcrpdvRIadVrEqO3LqCh+1pJu:UyK8RAXEqO3GRU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26eba4f8b78335ec524bf72299bbb462cc688e7276ff8aea133bff80e22bc340.exe
    "C:\Users\Admin\AppData\Local\Temp\26eba4f8b78335ec524bf72299bbb462cc688e7276ff8aea133bff80e22bc340.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNj0450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNj0450.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr515865.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr515865.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku323686.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku323686.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNj0450.exe

    Filesize

    392KB

    MD5

    e609d0f2651b75efe32480ecbbace6bf

    SHA1

    eab443bec1cc0a92c6891f98c5f8c9bc0d5732c6

    SHA256

    d8b597649ff3d432c6c154b64fdcf1903705e82b91ec70ef245f5d4118c4565c

    SHA512

    32403d1eb6c7fddce55b4cbe994f395d29ed8e6f336ed76ae03aed6afcee6e53483b3bbac619bfe5c035e02c4aae91557035fe9a0b3b52150f5f485482987f7e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr515865.exe

    Filesize

    11KB

    MD5

    ec79ce9f927cf61d4610ae4cc520e578

    SHA1

    b5e068fa33f5a92038c1208f507ff7bba2bdd75c

    SHA256

    062961affa282282b0178a277342fb669c099e22e89f585c221e8cebfdc08df6

    SHA512

    54351113b29a706d7f6f80ffba43c93ea2bd2abfd2ef295f4d267101cce374b3090567780da856c5b46c66accf5dbadb937bece0866d335f1e3ec84e69b1d4b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku323686.exe

    Filesize

    359KB

    MD5

    f5797cdb469963196bfbfe67f5e33bc6

    SHA1

    054c0c6eba6794da00ecfae1cd0c60de8167945f

    SHA256

    ce745a13ea5e77b76c57551e482543028c7c27abb83ed4f2a4591f86dd3a99a3

    SHA512

    638440ebb73c082cb7ff025cd21f2bb2b5479202f9d97ed29b0fd6f439a3dd6cfcdd94bc304a86e607ee74117d02412565d73663b2dca436fce38176a4393aee

  • memory/1084-62-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-22-0x0000000006050000-0x0000000006096000-memory.dmp

    Filesize

    280KB

  • memory/1084-935-0x0000000007080000-0x00000000070CC000-memory.dmp

    Filesize

    304KB

  • memory/1084-58-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-23-0x0000000006220000-0x00000000067C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1084-24-0x00000000060D0000-0x0000000006114000-memory.dmp

    Filesize

    272KB

  • memory/1084-30-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-36-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-88-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-84-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-60-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-80-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-56-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-76-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-74-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-72-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-70-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-68-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-64-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-934-0x0000000006F30000-0x0000000006F6C000-memory.dmp

    Filesize

    240KB

  • memory/1084-82-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-933-0x0000000006F10000-0x0000000006F22000-memory.dmp

    Filesize

    72KB

  • memory/1084-78-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-54-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-52-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-50-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-48-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-44-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-42-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-40-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-38-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-34-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-32-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-86-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-66-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-46-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-28-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-26-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-25-0x00000000060D0000-0x000000000610F000-memory.dmp

    Filesize

    252KB

  • memory/1084-931-0x00000000067D0000-0x0000000006DE8000-memory.dmp

    Filesize

    6.1MB

  • memory/1084-932-0x0000000006DF0000-0x0000000006EFA000-memory.dmp

    Filesize

    1.0MB

  • memory/2500-16-0x00007FFF76553000-0x00007FFF76555000-memory.dmp

    Filesize

    8KB

  • memory/2500-14-0x00007FFF76553000-0x00007FFF76555000-memory.dmp

    Filesize

    8KB

  • memory/2500-15-0x0000000000060000-0x000000000006A000-memory.dmp

    Filesize

    40KB