Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:35

General

  • Target

    59ae66893d3fdb926ba619c776bfa3293e034faacd38df23c6ab0c6232676ca8.exe

  • Size

    537KB

  • MD5

    4919e4aacea0f9daaf33e57165628299

  • SHA1

    4c51e1eed27cf90613b3ccc02321327c145b0892

  • SHA256

    59ae66893d3fdb926ba619c776bfa3293e034faacd38df23c6ab0c6232676ca8

  • SHA512

    dc98bc61839567d6501dd6979f9e9f316f5396ac7c22a2ff6c21fa4acbe8bb85658eb8dba06ca5cc5f1b7b4f9cc804280248059eb657f9f65491b0a160f6223c

  • SSDEEP

    12288:3Mrwy90YUhe4OJL5Y4oTk3rlNH25X8rUA7HuwIPOOwc9FqUSGn4:zyOhe4OJ1YDTErl52yrVOwSQGn4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59ae66893d3fdb926ba619c776bfa3293e034faacd38df23c6ab0c6232676ca8.exe
    "C:\Users\Admin\AppData\Local\Temp\59ae66893d3fdb926ba619c776bfa3293e034faacd38df23c6ab0c6232676ca8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidU1158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidU1158.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr661956.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr661956.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku477135.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku477135.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidU1158.exe

    Filesize

    395KB

    MD5

    a82dd93cd3348c1caa676eb1877338e7

    SHA1

    4e0a336fd8aeddcbd1ba1e25e216103c5f66ea27

    SHA256

    c3b4c5fb6d66f04420f762cb38a581524bcab84d196da67e12476daa8a23e104

    SHA512

    5f768551ef9a04552b39cb8329faaa45ff1d5cff49a5f27c5e3e683f3a87cdf9b580e5d45cb351ed77ad05d80c1cfad6d3196d6bbaab9e0a09bcd790f4eb60ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr661956.exe

    Filesize

    14KB

    MD5

    68eeb41a44c59b58462f6a90b9beabf3

    SHA1

    f15fc197460427b1793c41d13fafe29aec1e5c23

    SHA256

    1fe4edcfb66eab16fbfd57d2ac7f2a7ccded3ce28361e1a286ba86556dcce763

    SHA512

    fadc3c8cfda6ee5fae857c4e981623869afabb6985454de31f9f15da7560db0bcc4a415d368202eff4180fbab7f5a0643af5c29d761b5dd93e98960fb57e5c5c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku477135.exe

    Filesize

    352KB

    MD5

    635888275cffb0f69bd40f7ee79bfb2d

    SHA1

    89c3523735df870cbb8cd3bc96183ca2d23c2997

    SHA256

    82cd806da8ca4f99f16429c9d1cebaeb7c33397f3eb9ebf81c8429bb4cc3d2c8

    SHA512

    58da4734b978e8268edea508d505632a6bc50b19c0e2c6eb7ac0cf0f2317387e702b952d5f9ff0c2619f59bc23240bc63503653308c46151278ff35c9eb32f8c

  • memory/3168-14-0x00007FFA07903000-0x00007FFA07905000-memory.dmp

    Filesize

    8KB

  • memory/3168-15-0x0000000000330000-0x000000000033A000-memory.dmp

    Filesize

    40KB

  • memory/3168-16-0x00007FFA07903000-0x00007FFA07905000-memory.dmp

    Filesize

    8KB

  • memory/4308-62-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-50-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-24-0x0000000004E30000-0x0000000004E74000-memory.dmp

    Filesize

    272KB

  • memory/4308-42-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-86-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-84-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-82-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-80-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-78-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-76-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-72-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-70-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-68-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-66-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-64-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-22-0x00000000028D0000-0x0000000002916000-memory.dmp

    Filesize

    280KB

  • memory/4308-60-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-56-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-54-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-52-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-23-0x0000000004F70000-0x0000000005514000-memory.dmp

    Filesize

    5.6MB

  • memory/4308-48-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-46-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-44-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-40-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-38-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-36-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-34-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-32-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-88-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-30-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-58-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-28-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-26-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-25-0x0000000004E30000-0x0000000004E6F000-memory.dmp

    Filesize

    252KB

  • memory/4308-931-0x0000000005520000-0x0000000005B38000-memory.dmp

    Filesize

    6.1MB

  • memory/4308-932-0x0000000005B40000-0x0000000005C4A000-memory.dmp

    Filesize

    1.0MB

  • memory/4308-933-0x0000000004F30000-0x0000000004F42000-memory.dmp

    Filesize

    72KB

  • memory/4308-934-0x0000000005C50000-0x0000000005C8C000-memory.dmp

    Filesize

    240KB

  • memory/4308-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB