Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:04

General

  • Target

    e83af209ffe9f26d09f69fc27256f2e4dbbfc56d4a872ccb66dfd0dc8fa8ba4c.exe

  • Size

    537KB

  • MD5

    c6ce798133059ffa574a745970a2b83e

  • SHA1

    3ba25de3317c1b624cf09cd976a79f1ed4f782c6

  • SHA256

    e83af209ffe9f26d09f69fc27256f2e4dbbfc56d4a872ccb66dfd0dc8fa8ba4c

  • SHA512

    7a24eb5eee8e5c03267186bab5154db49bc10239a0deff87702eaf1ab574c4a788ccafd62dfe835f99ac435a1268a83d1c38c6e78424b5a97d87d027aa181ae4

  • SSDEEP

    12288:ZMrQy9056rlfMOR74wJO7tkyCSsYHkLIXTZj0zVEEwfX:JyRJRJOxkyCnGksXTp0uEeX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e83af209ffe9f26d09f69fc27256f2e4dbbfc56d4a872ccb66dfd0dc8fa8ba4c.exe
    "C:\Users\Admin\AppData\Local\Temp\e83af209ffe9f26d09f69fc27256f2e4dbbfc56d4a872ccb66dfd0dc8fa8ba4c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziej0062.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziej0062.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr857575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr857575.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885613.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziej0062.exe

    Filesize

    395KB

    MD5

    ac4651b04d8fec9b0e6e5b649bc072c3

    SHA1

    6a76f3e7309c1ff5c140fed3916b9e3716203231

    SHA256

    5f36a5724eee54678d5aacd4fc9b968696a7cdae0dc201d844119fb133b68d65

    SHA512

    4b734bc2834673d71ee7f2a65fc25af49955cf0a423ef49ad7e31795bcdf37193381afc034d01bf10915edb65c6e5970eca64adf0f15912a4035ffe4ad0bffe1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr857575.exe

    Filesize

    13KB

    MD5

    ccfe3545b5691f662fb3731cc239a45f

    SHA1

    13f13d5dbf965151d104eb7a16e22e446fbfef64

    SHA256

    f4ffbbaff090cecf998c26a9ff3f72a4b743f667f1765c18f115ef12276ff681

    SHA512

    5bf1ef71d80cd3e70b5f16923dd2413e76774bb468a3bd8c7b58a25474b74c0103a915f216b6433b2f5301eda822180b884278d4bca1c901d1ef05a9dcbeeb2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885613.exe

    Filesize

    353KB

    MD5

    1f97a2c10f72bd92eada46a47312a91c

    SHA1

    e7644b6cef2ae883e4c52f459a4d9e76718e4872

    SHA256

    43a658af77891fd82df53e26f0d5b93080c7cf5d732198f001cc53f0d9ffdbee

    SHA512

    e976f19b6b367b0a22ee30f81d287a7b365fb62f80828d8c6f3cc66d2e9435339f6671c67bc7fc53c5c25127fe6bfc824c3593efc6cda1a90ba53549d9127919

  • memory/1192-931-0x0000000005610000-0x0000000005C28000-memory.dmp

    Filesize

    6.1MB

  • memory/1192-22-0x0000000002690000-0x00000000026D6000-memory.dmp

    Filesize

    280KB

  • memory/1192-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB

  • memory/1192-66-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-23-0x0000000005060000-0x0000000005604000-memory.dmp

    Filesize

    5.6MB

  • memory/1192-24-0x00000000029C0000-0x0000000002A04000-memory.dmp

    Filesize

    272KB

  • memory/1192-46-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-54-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-88-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-86-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-68-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-82-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-64-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-78-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-76-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-72-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-70-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-932-0x0000000004F00000-0x000000000500A000-memory.dmp

    Filesize

    1.0MB

  • memory/1192-933-0x0000000005C30000-0x0000000005C42000-memory.dmp

    Filesize

    72KB

  • memory/1192-25-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-84-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-26-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-80-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-60-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-934-0x0000000005C50000-0x0000000005C8C000-memory.dmp

    Filesize

    240KB

  • memory/1192-58-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-56-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-52-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-50-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-48-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-44-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-42-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-41-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-38-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-36-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-34-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-32-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-74-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-62-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-30-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1192-28-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/4756-16-0x00007FFA204A3000-0x00007FFA204A5000-memory.dmp

    Filesize

    8KB

  • memory/4756-14-0x00007FFA204A3000-0x00007FFA204A5000-memory.dmp

    Filesize

    8KB

  • memory/4756-15-0x00000000004B0000-0x00000000004BA000-memory.dmp

    Filesize

    40KB