Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 17:31

General

  • Target

    9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe

  • Size

    538KB

  • MD5

    ee86eacadeea921935873111a585631f

  • SHA1

    aacee38d1c36789085a5767f180a1034c68c49ea

  • SHA256

    9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60

  • SHA512

    489e3f6fe2b9f6a608ca0004fb18c13a5870b1f3b8fd959139090d8fc282e6b4c8b57cf1b498777183114f0f601fbd247af55d7b0884ffec16b4f3dd5bf118cd

  • SSDEEP

    12288:5Mray907CJzpw73SOwEm7+6HBfI3NFhTl8:DyGWK73SOHmHBADh2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe
    "C:\Users\Admin\AppData\Local\Temp\9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOu7035.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOu7035.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136056.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136056.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4524
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOu7035.exe

    Filesize

    396KB

    MD5

    7f99f016e98b760d785305fb5aa713f1

    SHA1

    0168f3a252d603ca3c0bf4315c763ff4584fbae4

    SHA256

    1714d0935fe5bc7e83434669d196286bb851433c5c0b60db482b4498b1089d1d

    SHA512

    fe09acd152d7254d94dc5b35c5db1ff87c8875cc1129188b1d4383168113d8ded35e0e39f61416c9a9ea59fe1e2218413c43bb12f358734f94d3eaf995612eaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exe

    Filesize

    13KB

    MD5

    7bed716a2755d79709c78ba8170fa440

    SHA1

    6f1a2bc923177833fceb3f4081182d86fa7b52b4

    SHA256

    5df8b200d436b725f8d3846b1d8f16aa87e82b3a6ccd5df06fd48526bb27210e

    SHA512

    2f4b216973a0a1b90a16ea15a15eb1e9c724f421a9e445241fed5ab1d529bd1e37dfb08cdba15924461e867fc57378d2f699ca8d071ac008edd834e73db4ebc9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136056.exe

    Filesize

    353KB

    MD5

    d59b78e8b010fc2df2d8d4305ee5782e

    SHA1

    0c3f1dadefb6822710add3ad783ba285093a4b29

    SHA256

    4e4798c6b67e6db1c93e7da8adbe44b7dd67e11ea00c1681add2fe75fd81dcdf

    SHA512

    fc852084b32aaacb7db3ac389e6028af90d4f52c06a5ec46ec313395c125c840aa4d03ddfb922607f83adcbe304c031ced0da158c6ab5883d1784cd66f36116e

  • memory/4524-64-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-22-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/4524-935-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

    Filesize

    304KB

  • memory/4524-60-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-23-0x0000000004FC0000-0x0000000005564000-memory.dmp

    Filesize

    5.6MB

  • memory/4524-24-0x0000000002890000-0x00000000028D4000-memory.dmp

    Filesize

    272KB

  • memory/4524-30-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-38-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-89-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-86-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-62-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-82-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-58-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-78-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-76-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-74-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-70-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-68-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-66-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-934-0x0000000004F50000-0x0000000004F8C000-memory.dmp

    Filesize

    240KB

  • memory/4524-84-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-933-0x0000000004F30000-0x0000000004F42000-memory.dmp

    Filesize

    72KB

  • memory/4524-80-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-56-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-54-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-52-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-48-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-46-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-44-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-42-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-40-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-36-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-34-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-32-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-72-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-50-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-28-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-26-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-25-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/4524-931-0x0000000005570000-0x0000000005B88000-memory.dmp

    Filesize

    6.1MB

  • memory/4524-932-0x0000000005B90000-0x0000000005C9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4936-16-0x00007FFD35EB3000-0x00007FFD35EB5000-memory.dmp

    Filesize

    8KB

  • memory/4936-14-0x00007FFD35EB3000-0x00007FFD35EB5000-memory.dmp

    Filesize

    8KB

  • memory/4936-15-0x00000000009E0000-0x00000000009EA000-memory.dmp

    Filesize

    40KB