Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 08:31

General

  • Target

    5d2e6fcbb6481b79720108d16d43da8b5d237feb8de113c37312baa5ea2c153a.exe

  • Size

    753KB

  • MD5

    550330f994403581ff6000dd67eb68f7

  • SHA1

    28bf044497faa21a3995d4e0efc57d056cf7a685

  • SHA256

    5d2e6fcbb6481b79720108d16d43da8b5d237feb8de113c37312baa5ea2c153a

  • SHA512

    819ffcfe09be322cc45178cdc3bbb6d8c9a462ac3b91127d6bab9e6f99cd13d740df9ce2c84ead478bd7fe456fb55592a5cec292706feb3549638d0da0e138e9

  • SSDEEP

    12288:1gxXWBFllTjgKJ24OH2bg4AioewR/5EgGANjq9OhKWkew2QryH+:8GBFIKTOWbg4rwDLLsBew2sE+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d2e6fcbb6481b79720108d16d43da8b5d237feb8de113c37312baa5ea2c153a.exe
    "C:\Users\Admin\AppData\Local\Temp\5d2e6fcbb6481b79720108d16d43da8b5d237feb8de113c37312baa5ea2c153a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp0521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp0521.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr260072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr260072.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku710207.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku710207.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp0521.exe

    Filesize

    419KB

    MD5

    0c38be2c586e020ba4e533dd756c24bd

    SHA1

    130e900f7cd44d6643bdb4d892743052e5ceb44e

    SHA256

    ce0521be42829609642e4cfd841a6be8a3723b10e50e6ca84d39dc1b6adedcdb

    SHA512

    ab63e59a9b14e16468521e62880626d1c9365d2ef85f5414aa66026bde822fde385e489e11e1baeaca095419952fbf53c133a0b6953bb98c427d705d8c91932f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr260072.exe

    Filesize

    11KB

    MD5

    dfa33e52c8fb0b869e73632601d85960

    SHA1

    c410103bc4831833c3f0fbce00d372716f770ff2

    SHA256

    67ebb846ad907b39d427410a9cecf07f8139e3d7f1097e8f2c72b17554b3b60f

    SHA512

    ca3458bab1086f64bb83a8cdf1ea6fd009ee1849445ebbc3ec6bd77ebf8f794f901a862e1ea0811cc8ec7df377deae13a0ec7d42a6e07a1c1b9564d03d3254e2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku710207.exe

    Filesize

    405KB

    MD5

    09a6fa96b3eb08fdebd05079d59cccda

    SHA1

    8377ed94cd64e4a6c24653d5febfab44653eabbd

    SHA256

    b4c4071485e9aec6993acc6f3fbefe320a62482ebb58da62a819130489af60c9

    SHA512

    3038030c536fee2e7960a9d86ca669328b7c870fd111de165b47bbc274f1e39418e8c7c564a5666fe5fa8c5560424f4d93f3e77b368b9a837474d215881ff9b5

  • memory/2500-22-0x00000000011D0000-0x00000000011DA000-memory.dmp

    Filesize

    40KB

  • memory/2744-85-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-56-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-76-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-42-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-52-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-58-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-39-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-79-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-37-0x0000000003140000-0x0000000003186000-memory.dmp

    Filesize

    280KB

  • memory/2744-38-0x0000000003180000-0x00000000031C4000-memory.dmp

    Filesize

    272KB

  • memory/2744-40-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-94-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-80-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-96-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-92-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-91-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-88-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-86-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-98-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-82-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-100-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-44-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-46-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-74-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-72-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-70-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-69-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-66-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-64-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-62-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-60-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-48-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-54-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/2744-50-0x0000000003180000-0x00000000031BF000-memory.dmp

    Filesize

    252KB

  • memory/3044-7-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3044-2-0x0000000002BF0000-0x0000000002C7E000-memory.dmp

    Filesize

    568KB

  • memory/3044-1-0x0000000000360000-0x00000000003E4000-memory.dmp

    Filesize

    528KB

  • memory/3044-0-0x0000000000360000-0x00000000003E4000-memory.dmp

    Filesize

    528KB

  • memory/3044-26-0x0000000000400000-0x0000000000491000-memory.dmp

    Filesize

    580KB

  • memory/3044-24-0x0000000000400000-0x0000000002BEA000-memory.dmp

    Filesize

    39.9MB

  • memory/3044-25-0x0000000002BF0000-0x0000000002C7E000-memory.dmp

    Filesize

    568KB

  • memory/3044-23-0x0000000000360000-0x00000000003E4000-memory.dmp

    Filesize

    528KB