Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 11:25

General

  • Target

    105246afc54797e0a12f73664ea5b471b71d5145f118a99df62e48659fb6de2d.exe

  • Size

    549KB

  • MD5

    5dd648b6e3fff0578a776c5c1b4dbac7

  • SHA1

    8cc0525f4f704c011e95e881bec182866af57d67

  • SHA256

    105246afc54797e0a12f73664ea5b471b71d5145f118a99df62e48659fb6de2d

  • SHA512

    9497cc1e10e74a4959588a3cd5ba83ee3ca6995ccfeb8473016914e0ff60702d55b0109cdc9464e05fff43e63eee10c7502bfccc26ed2f2586494afb9e5c6435

  • SSDEEP

    12288:FMr4y90QQDMuISMa07mkjBQQbUj8I7LFWCIyBuPuf+Nd7fd1V:Jyz6w77mktbUjGk3e5N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105246afc54797e0a12f73664ea5b471b71d5145f118a99df62e48659fb6de2d.exe
    "C:\Users\Admin\AppData\Local\Temp\105246afc54797e0a12f73664ea5b471b71d5145f118a99df62e48659fb6de2d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixA4767.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixA4767.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr405630.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr405630.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku891629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku891629.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixA4767.exe

    Filesize

    395KB

    MD5

    693c9091f136da03172f3b9ec536196e

    SHA1

    9d7e1a0257586862c484dc39e672414f0593d908

    SHA256

    04d94860c6c31b51f6dc250336246223a92a4f8f02c1ed412ca4e2033d2de8da

    SHA512

    8d0b43f5b734d92f3baf19284264e27eec358a2b46970d64bb1a3ee42e055a33a514ef923ae9cdef3eb5249d343095b081b86cd06ba3bc8a2fd754528494b790

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr405630.exe

    Filesize

    11KB

    MD5

    734f4d4ed035e6cf681d3302b0d99bcf

    SHA1

    8536da427d18d6bebbcd7627e368e8f103803fe3

    SHA256

    dc5be0bfb9205d7ae7c13cc4ea9d5fc42fc3c914b7f6b9966c05e8927f6ed3af

    SHA512

    c53bec7ba1563e9cd4a77b2cc7948dca59013f1f862890f27f0ec85e9a5a644db17cf802341b83423347905a97a686549752560d2ff3a30ab43f540e2d4bf149

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku891629.exe

    Filesize

    348KB

    MD5

    3e48e52ea0bad8ebfea5bf4745dbdacc

    SHA1

    0597efd44bac080167c7e1782c29812cce285980

    SHA256

    17eddd0f902178a9ebc8c99103434a515a346a1a8f5e914390a15b1c32735b7a

    SHA512

    67eb911f0fd84b961d4c5e3b9102769b92b56209b6a771450ff61fe6974b5e74681871b8cd0078381d25e52c2aff3ef3670d6e4dcb4ec234470b8bd6ea841b7b

  • memory/2272-14-0x00007FF855CC3000-0x00007FF855CC5000-memory.dmp

    Filesize

    8KB

  • memory/2272-15-0x0000000000430000-0x000000000043A000-memory.dmp

    Filesize

    40KB

  • memory/2272-16-0x00007FF855CC3000-0x00007FF855CC5000-memory.dmp

    Filesize

    8KB

  • memory/3124-934-0x0000000005D80000-0x0000000005DBC000-memory.dmp

    Filesize

    240KB

  • memory/3124-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp

    Filesize

    272KB

  • memory/3124-25-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-56-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-26-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3124-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/3124-22-0x0000000004D30000-0x0000000004D76000-memory.dmp

    Filesize

    280KB

  • memory/3124-931-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/3124-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-23-0x0000000004EB0000-0x0000000005454000-memory.dmp

    Filesize

    5.6MB

  • memory/3124-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-62-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-60-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-58-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-54-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-53-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-50-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-48-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-47-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-44-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-42-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-40-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-38-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-36-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-34-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-32-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-30-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-28-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

    Filesize

    252KB

  • memory/3124-935-0x0000000005DC0000-0x0000000005E0C000-memory.dmp

    Filesize

    304KB