Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 17:02

General

  • Target

    87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe

  • Size

    530KB

  • MD5

    d055d902b295445945764f210298d115

  • SHA1

    f7d542275036bff431ed93c97ed114b5df5508c1

  • SHA256

    87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3

  • SHA512

    378311eacafe4ca5f7560d3994281f5024e0086a7410f5c8f9bc316ae011202afec9deb5f16dc37b676f8b32aa686682ff0d6f5edc353c202fee7be8b7442085

  • SSDEEP

    12288:pMrGy90U0TzBL6XDqbLCaC9M7hgC00v+7Wwon:7yR0TzIzqbLCVM7ub09won

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe
    "C:\Users\Admin\AppData\Local\Temp\87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf9146.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf9146.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku528441.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku528441.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4020
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf9146.exe

    Filesize

    388KB

    MD5

    5d093d1e53312881fb970224e8d95f73

    SHA1

    7f86d9971def19b42abf3ed4f0db8a51e17d37cf

    SHA256

    b1db910d39af0fc4fa1a3b054185e52a1140a5f9d69aefb8073e8f7e6a2b4e5c

    SHA512

    34b4474d705927abaa59e8e364c5137e54af575193c5f21296da04ea6b9fda12912f7388f4c61733deb6eaee68614fa99fea6689f765e93eed5864ee335798d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exe

    Filesize

    12KB

    MD5

    4f7376e03334470e8c673bea75943b86

    SHA1

    ea9b365b712950f7ab3f2630e58ad94c33501a42

    SHA256

    fa27aa2befa7665dacc716764769d0c67a767f751887e798b37ff5c4638bb9d8

    SHA512

    3b526daa169343f9b1fd21b16ac118c7733b0f4e95fea5a41349d0820bcde949e1ee4ccf58ba82b5b269f476b9c646af54f62fbf7e15ae5ddd72fdb3f5324fd3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku528441.exe

    Filesize

    434KB

    MD5

    936e9b314a04809684f82b33e8a7d716

    SHA1

    452c72ada0bb1b2d683e27f0c40d35a9fe810b18

    SHA256

    d3e3bbcb093eea3ef0c42eecc7d3b8461acbc41c188eb9f81e735f6bb012f483

    SHA512

    8c4c8a2e9efd92629edd6fd0df5fc8182593df68526351eba834cc704d0a1130640bebab616b9dba8ca5a5a8e13f822f684b2fd91be09d58edf8db497ff76cc6

  • memory/3644-14-0x00007FF995293000-0x00007FF995295000-memory.dmp

    Filesize

    8KB

  • memory/3644-15-0x0000000000490000-0x000000000049A000-memory.dmp

    Filesize

    40KB

  • memory/3644-16-0x00007FF995293000-0x00007FF995295000-memory.dmp

    Filesize

    8KB

  • memory/4020-62-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-52-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-24-0x0000000002920000-0x0000000002964000-memory.dmp

    Filesize

    272KB

  • memory/4020-50-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-88-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-86-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-84-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-82-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-78-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-76-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-75-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-72-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-70-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-68-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-66-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-64-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-22-0x0000000002730000-0x0000000002776000-memory.dmp

    Filesize

    280KB

  • memory/4020-60-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-58-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-56-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-54-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-23-0x0000000004FE0000-0x0000000005584000-memory.dmp

    Filesize

    5.6MB

  • memory/4020-48-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-46-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-44-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-42-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-40-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-38-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-36-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-34-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-32-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-30-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-28-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-80-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-26-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-25-0x0000000002920000-0x000000000295F000-memory.dmp

    Filesize

    252KB

  • memory/4020-931-0x0000000005590000-0x0000000005BA8000-memory.dmp

    Filesize

    6.1MB

  • memory/4020-932-0x0000000005BB0000-0x0000000005CBA000-memory.dmp

    Filesize

    1.0MB

  • memory/4020-933-0x0000000002B10000-0x0000000002B22000-memory.dmp

    Filesize

    72KB

  • memory/4020-934-0x0000000002B30000-0x0000000002B6C000-memory.dmp

    Filesize

    240KB

  • memory/4020-935-0x0000000005DC0000-0x0000000005E0C000-memory.dmp

    Filesize

    304KB