Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:07

General

  • Target

    f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe

  • Size

    537KB

  • MD5

    79ef02aab5c9c30a3716774ed628c603

  • SHA1

    b10575b6ea00411d8f6e9e488cff6840dff22346

  • SHA256

    f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f

  • SHA512

    7e10228fbb622bb4bb308ca94c75559614962223f521650956d0d982de2b3e0ca185fa7a96c238e3696b0bf8a005c3f60e0dece00b4acff6d900690851214dca

  • SSDEEP

    12288:LMr0y90Hc5jQe/aJR2BwU8LHawTbK4NC92vGOlNW:vyl5riXQwR6wTu4gkv5W

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe
    "C:\Users\Admin\AppData\Local\Temp\f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud4425.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud4425.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712792.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712792.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud4425.exe

    Filesize

    395KB

    MD5

    95644879eb29dfe7543477e865861537

    SHA1

    36c744b9fecdca3aae779bf0e467e639e6e74f9d

    SHA256

    b746c3793a385791ffae2d323282eb494f91ba11eb3110e541cc059c0dfea5fc

    SHA512

    42c543b29d7c881f060ebb93d857d8b4ec26916abf829f13622abf32e79729284bb18d035619523f03c5102c060cd15116d13e4a98a1b71ec2fb4648369ba74a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exe

    Filesize

    13KB

    MD5

    79aeb0412df4ec71f10e29ea134cd199

    SHA1

    4393082b68d9f0ac448e376626d05ee7eccb3dba

    SHA256

    dfee1aa1c97a87922484aae14706c806270044a0c305322b47981360e185ffc5

    SHA512

    d95aa50831115cc1a85d94da26979a78a552c704a6f41b90125b37f8eee6d4b4b2e8430419e5a0400195e90f31809173e736be30b241989be82a7d97d3c80b8f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712792.exe

    Filesize

    352KB

    MD5

    87cad7441447b4c5ee519e74648c0490

    SHA1

    607223d38ad066ca8ff8f4a3778619df89eaa600

    SHA256

    e7fbcb08db62ca6067f9a493df7ba39a835e0e4a0e7dbf791b979200be2e7ea5

    SHA512

    829425f97cad74278f5c78139f1d2aa7ff03729bb384d31db6f320c21949ebbb35eb555e908aa6f4101155bbd534be5af428aa0a608f9022f5e2890ebc284c48

  • memory/1964-59-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-22-0x0000000004FC0000-0x0000000005564000-memory.dmp

    Filesize

    5.6MB

  • memory/1964-21-0x00000000027B0000-0x00000000027F6000-memory.dmp

    Filesize

    280KB

  • memory/1964-55-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-23-0x00000000029E0000-0x0000000002A24000-memory.dmp

    Filesize

    272KB

  • memory/1964-24-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-37-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-87-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-85-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-81-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-79-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-77-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-75-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-73-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-71-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-53-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-65-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-63-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-61-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-934-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

    Filesize

    304KB

  • memory/1964-933-0x0000000002C10000-0x0000000002C4C000-memory.dmp

    Filesize

    240KB

  • memory/1964-57-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-67-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-51-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-49-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-47-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-45-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-43-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-41-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-39-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-35-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-83-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-33-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-69-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-31-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-29-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-27-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-25-0x00000000029E0000-0x0000000002A1F000-memory.dmp

    Filesize

    252KB

  • memory/1964-930-0x0000000005570000-0x0000000005B88000-memory.dmp

    Filesize

    6.1MB

  • memory/1964-931-0x0000000005B90000-0x0000000005C9A000-memory.dmp

    Filesize

    1.0MB

  • memory/1964-932-0x0000000002BF0000-0x0000000002C02000-memory.dmp

    Filesize

    72KB

  • memory/4676-14-0x00007FFD678C3000-0x00007FFD678C5000-memory.dmp

    Filesize

    8KB

  • memory/4676-15-0x00000000008B0000-0x00000000008BA000-memory.dmp

    Filesize

    40KB