Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:39

General

  • Target

    636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d.exe

  • Size

    789KB

  • MD5

    f6d95f21151f32263ba36408e3da324f

  • SHA1

    4f2b7f696309be88b39118d913052332842ab4f2

  • SHA256

    636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d

  • SHA512

    4c76e9355c735aca7020f34345525b9c20dd67f662ba0fa35eb43979ea1121082aec73e0e6352597736abaee920f9cbb9214202473f133707a75f521e6f9e11b

  • SSDEEP

    12288:BMrey90KeMK/MS8zoZqBvMHrhRztEq3Ot9ud59cMSr41WM9XGXkNTqxI9l:fyHK/5MvahR885+Mm4YiJJXv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d.exe
    "C:\Users\Admin\AppData\Local\Temp\636314450468aba304dd7d201fa7cf32f698b9bd331667e507d8b151eec0342d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicX7009.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicX7009.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioI3550.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioI3550.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it647294.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it647294.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4252
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr902685.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr902685.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicX7009.exe

    Filesize

    524KB

    MD5

    0dd25776171f76022ab280bebcd06eee

    SHA1

    45822fbd5a3724fda72c96dec6e66950d245426e

    SHA256

    aa09fb2e301b27ab215448439f89f03e0c38c078a0763c3b905333049eca87b1

    SHA512

    329adf2a13c2d4d61d6633ce31a74afd155e17c38d97738c003842bdfa022c76464bbf3b353896ff640b74bc583fbda90edd5969d08ffefe65c6fe8fb3cfaa53

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioI3550.exe

    Filesize

    382KB

    MD5

    d94f9853f93124f012d641c49703c709

    SHA1

    3a187d3f62c27cbd01e5a03dea4eb840753ac1e0

    SHA256

    e079b072f63d759e08245332d5ec176397c1cf0b726fae197a1503c429eb2103

    SHA512

    ba59fcb7fa5151fe2d5dee271d901c356b7888201b5c023bcafaac58140eb26ac88ab033d883e8c768e44ab84e8f56042d6cc41a3495fe0a6e0be405d73fd964

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it647294.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr902685.exe

    Filesize

    298KB

    MD5

    0dbdffb5265043c84407f00ec8b6ab45

    SHA1

    a314ef9835464343ba6e4c60eb430d619027432b

    SHA256

    9fee8ca4c380bd59bd58e62ea539ba1ed293ce77be8ad3c365222b9172def560

    SHA512

    123925e77e79ca0ef38d8b73a0701a8ae00600fe1346a93e6c749ed660f168554280f7075eed2ee1a095187661a60785a88046d475bae9ab6cef7d08f50be496

  • memory/4252-21-0x00007FF887873000-0x00007FF887875000-memory.dmp

    Filesize

    8KB

  • memory/4252-22-0x0000000000B00000-0x0000000000B0A000-memory.dmp

    Filesize

    40KB

  • memory/4252-23-0x00007FF887873000-0x00007FF887875000-memory.dmp

    Filesize

    8KB

  • memory/4740-69-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-61-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-31-0x00000000051D0000-0x0000000005214000-memory.dmp

    Filesize

    272KB

  • memory/4740-35-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-45-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-95-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-93-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-91-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-89-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-87-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-85-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-83-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-81-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-79-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-77-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-73-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-71-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-29-0x0000000004B60000-0x0000000004BA6000-memory.dmp

    Filesize

    280KB

  • memory/4740-67-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-65-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-63-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-30-0x0000000004C20000-0x00000000051C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4740-59-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-57-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-55-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-53-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-49-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-47-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-43-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-41-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-39-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-37-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-75-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-51-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-33-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-32-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4740-938-0x0000000005230000-0x0000000005848000-memory.dmp

    Filesize

    6.1MB

  • memory/4740-939-0x00000000058D0000-0x00000000059DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4740-940-0x0000000005A10000-0x0000000005A22000-memory.dmp

    Filesize

    72KB

  • memory/4740-941-0x0000000005A30000-0x0000000005A6C000-memory.dmp

    Filesize

    240KB

  • memory/4740-942-0x0000000005B80000-0x0000000005BCC000-memory.dmp

    Filesize

    304KB