Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 00:12

General

  • Target

    0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe

  • Size

    530KB

  • MD5

    56582ebf18a40433c4bc3c2d8ba1d2cd

  • SHA1

    834c5609ed4b092481c430bc100940d21321608f

  • SHA256

    0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023

  • SHA512

    f94bd29ace9db214afa84ae922d654a81c0353dc926795e611ee292ffcf5e6510e8444dae62030ac431cf3885637d45ce331b85f2468d5eafc8a0569af7451de

  • SSDEEP

    12288:3MrIy90LSnWO52M8S5JyaX+Gg097+n49d5jXGyO:7yhWOGS5JyaXFB9BPDfO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe
    "C:\Users\Admin\AppData\Local\Temp\0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziob5806.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziob5806.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku585353.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku585353.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziob5806.exe

    Filesize

    388KB

    MD5

    d61715b7ec75f5e727c2d8eccc5e5e99

    SHA1

    3204e0b37b3197db8c45e00b9ce271e646ce6fe7

    SHA256

    56f538048616d654a5c147057a1f5718d6064deba3755fcfb2bce37f61c57b54

    SHA512

    604b79d53f3db1ab80f3d898719935f08b97d48cc14262e4abce0a544dc72459745362889f9e2b33a0842477f917b96be279a346437495a5f1ef7591723675bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exe

    Filesize

    12KB

    MD5

    6b0744ef99079d1ee8fc422a9771c92e

    SHA1

    399b7b7ae971da00810e07313e173df45e2504fa

    SHA256

    40d2ab50ed7c28561d64aab4e256cea9d192b6653a28e18d4b08843892f3feb6

    SHA512

    708ab4175a2e7ad07b5a042aae940cac29d0e6a082f1e0923a7cf1f467c583b74cdf19d80c103962f97aaaaa221baddcc39b27c9bd6d177ef2333a2348e70188

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku585353.exe

    Filesize

    434KB

    MD5

    f93629208571875f4a70a092ceed10d2

    SHA1

    74969ce27ec6b4a08434d6ae3b0935736784a3b1

    SHA256

    6da2bc086a206726300231048ffef45021ea1c0d31624da89df78cdd5a6c301c

    SHA512

    c49337671b27078e3d6d99ac71e81c3de4f4c5d4c546ce8dd61421b25ca373c2530ce0bb4a7e039f8fad52306d370191de5822bb13eb210f39fd83876216cbe2

  • memory/528-14-0x00007FFFA23C3000-0x00007FFFA23C5000-memory.dmp

    Filesize

    8KB

  • memory/528-15-0x00000000008C0000-0x00000000008CA000-memory.dmp

    Filesize

    40KB

  • memory/528-16-0x00007FFFA23C3000-0x00007FFFA23C5000-memory.dmp

    Filesize

    8KB

  • memory/2084-25-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-76-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-24-0x0000000004E40000-0x0000000004E84000-memory.dmp

    Filesize

    272KB

  • memory/2084-42-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-40-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-38-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-36-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-34-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-86-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-32-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-82-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-78-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-72-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-30-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-28-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-26-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-22-0x00000000027D0000-0x0000000002816000-memory.dmp

    Filesize

    280KB

  • memory/2084-44-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-88-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-84-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-80-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-23-0x0000000004FB0000-0x0000000005554000-memory.dmp

    Filesize

    5.6MB

  • memory/2084-74-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-70-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-68-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-66-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-64-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-62-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-60-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-58-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-56-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-54-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-52-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-50-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-48-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-46-0x0000000004E40000-0x0000000004E7F000-memory.dmp

    Filesize

    252KB

  • memory/2084-931-0x0000000005560000-0x0000000005B78000-memory.dmp

    Filesize

    6.1MB

  • memory/2084-932-0x0000000005B80000-0x0000000005C8A000-memory.dmp

    Filesize

    1.0MB

  • memory/2084-933-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/2084-934-0x0000000005C90000-0x0000000005CCC000-memory.dmp

    Filesize

    240KB

  • memory/2084-935-0x0000000005DD0000-0x0000000005E1C000-memory.dmp

    Filesize

    304KB