Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 14:54

General

  • Target

    9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe

  • Size

    695KB

  • MD5

    829ce779374ee129f720621e78854ace

  • SHA1

    062a9b469520623878e1d110ba8863fa887789b7

  • SHA256

    9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef

  • SHA512

    31a0af39909be6dd66607f0c22a2468704eaf8cf02711f0e3523cf3685e95582b508367202958849cca50e8456cc22728e07ac2f77ce756c2ff780ea904749f5

  • SSDEEP

    12288:2Mrvy90Vj+FKd5lkR8Z3hFvZacpZtrdosnQsCIzAurJqJ9LeCRREFUIrjeK:5ywyyX9jZZt+vwA+KUwREqO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe
    "C:\Users\Admin\AppData\Local\Temp\9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe

    Filesize

    553KB

    MD5

    6c64bf5242815d908ed8eeb0936a93a3

    SHA1

    efaeaea17a03f859553825136a6d7ac7da07f12e

    SHA256

    463eff26e83e9badb34d9b2fe18bc96d130007ecef12871996542750ad56a8b9

    SHA512

    47339ea6be8cde28930ea0e59a0fa4a0c3e5283784237e91d6d1976a6d33affe06681754de640c6f255f9fb9fd44c4e514bb85a5b67e882c9ea8b809c9bdcffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe

    Filesize

    308KB

    MD5

    c1786672e5da184b83363e6c92c1234e

    SHA1

    fc9dc4c9f56efb9c36f7518094c014156259f7e2

    SHA256

    3ca62ac33d734e41df19eff669710b2eecc35df27c45756d58dd9d4b8f3df88a

    SHA512

    2b25b1a30e504e846a3e2b0e0f90a9d0a1fc831ade09d669c8433e619f9d29cb71d1760a55b139b203fff7e664d301a4ec720c9237c1a5108650e2a77634e8aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe

    Filesize

    366KB

    MD5

    2d3aa1a2aa65f16d395bc0eb407e8555

    SHA1

    43bcf695291d76f62f88f9183bfa32e60ed402ce

    SHA256

    402e685e95c2c09f7f434852a3cd4a2296fb11791dd7c8e9be86f000a8de7bd2

    SHA512

    662de5cbca7d20bdef318c8affdfeabd72dbea51724ead82de05fcae4277a3b2e0d2620049c9672428e1b89f5800509e493c28d3853dc3a995edd579abe333b3

  • memory/3748-72-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-78-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-970-0x00000000059E0000-0x0000000005AEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3748-969-0x0000000005370000-0x0000000005988000-memory.dmp

    Filesize

    6.1MB

  • memory/3748-63-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-64-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-66-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-96-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-69-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-70-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-972-0x0000000005B40000-0x0000000005B7C000-memory.dmp

    Filesize

    240KB

  • memory/3748-973-0x0000000005C90000-0x0000000005CDC000-memory.dmp

    Filesize

    304KB

  • memory/3748-76-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-971-0x0000000005B20000-0x0000000005B32000-memory.dmp

    Filesize

    72KB

  • memory/3748-82-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-84-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-86-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-88-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-90-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-92-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-94-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-80-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-74-0x0000000005330000-0x000000000536F000-memory.dmp

    Filesize

    252KB

  • memory/3748-62-0x0000000005330000-0x0000000005374000-memory.dmp

    Filesize

    272KB

  • memory/3748-61-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/4616-45-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-55-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4616-56-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4616-52-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4616-51-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4616-50-0x00000000008D0000-0x00000000009D0000-memory.dmp

    Filesize

    1024KB

  • memory/4616-22-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-23-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-25-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-29-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-31-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-33-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-35-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-37-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-41-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-43-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-47-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-49-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-40-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-27-0x0000000002840000-0x0000000002852000-memory.dmp

    Filesize

    72KB

  • memory/4616-21-0x0000000002840000-0x0000000002858000-memory.dmp

    Filesize

    96KB

  • memory/4616-20-0x0000000004EA0000-0x0000000005444000-memory.dmp

    Filesize

    5.6MB

  • memory/4616-19-0x0000000002700000-0x000000000271A000-memory.dmp

    Filesize

    104KB

  • memory/4616-18-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4616-17-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4616-16-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4616-15-0x00000000008D0000-0x00000000009D0000-memory.dmp

    Filesize

    1024KB