Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 22:16

General

  • Target

    ee0aae26dbc9fe714321c998f37c0d164423b05feafeb5c86efdd523abbb7402.exe

  • Size

    536KB

  • MD5

    5516f7a9511fb7fb65f3cd7d75650216

  • SHA1

    dfeb6b8c70e00ac49f4a2fc9099b7433b30a29d6

  • SHA256

    ee0aae26dbc9fe714321c998f37c0d164423b05feafeb5c86efdd523abbb7402

  • SHA512

    dd77b969fd3263ff156e00ebc90f0c160d12de140352bb5b2a5b30ec0de92cb35b4555676a308bc0a2cf1f3554f07a15f2b6d16b5bfe2d1eab76d33d8f079074

  • SSDEEP

    12288:zMrCy90R7UK2Hgbcm0/UP9H1wkPe9mrtHl:hyA7VGLm0/GVwkPx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee0aae26dbc9fe714321c998f37c0d164423b05feafeb5c86efdd523abbb7402.exe
    "C:\Users\Admin\AppData\Local\Temp\ee0aae26dbc9fe714321c998f37c0d164423b05feafeb5c86efdd523abbb7402.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLT3630.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLT3630.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437675.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku664535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku664535.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:5784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLT3630.exe

    Filesize

    395KB

    MD5

    dd5ccabad94eac3268106e0af41ff739

    SHA1

    ffd26e29b5ae8af2d92158f6f7e8d2613307386c

    SHA256

    c9ee5bd510724cf9c8b2fbf653ffec4b4e44c671e7ac361132eed6f784829db1

    SHA512

    4504753d47e6ff124fd479001c267203781c483229bd24e1c9b7714b7b6a7e82e42ea39ad5c0f4e1dc38bfda9869f92f881d4c0c7ddf60f16f4e44cb66ba96ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437675.exe

    Filesize

    14KB

    MD5

    89003573074cac61dfb7c97649344c3f

    SHA1

    c67402941c62db1b301a07e76d4e7490acd88271

    SHA256

    238af30229a25fab015b4996725f73f8667ed94e936e37e72b1150790acdffd2

    SHA512

    9b9398c206584b6cfbbd666a78d4faae7c700a3e39229115878f0ecb8f922f6bf48cf381d26ef3cde4b5f566a10898a41bfa493766db233ed71294f5c98c920c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku664535.exe

    Filesize

    352KB

    MD5

    e7e71d537b2dce5d402106b6fce0fe0a

    SHA1

    a41a8f68c77ee47f20d45f5c85f2cf896b4a9dde

    SHA256

    a371254735ef5bf25de9901a4b626498c14352b9d8f5a21e74768952a606ab78

    SHA512

    8e768955477dd61f01191cc89270593b51d5741c39ae24436a02e2f789556d30565c289c9d0b4dd30f1d2e74447955a3cf98a84d8df42686e4a04ab4b60a9227

  • memory/1856-14-0x00007FFA35EF3000-0x00007FFA35EF5000-memory.dmp

    Filesize

    8KB

  • memory/1856-15-0x0000000000580000-0x000000000058A000-memory.dmp

    Filesize

    40KB

  • memory/1856-16-0x00007FFA35EF3000-0x00007FFA35EF5000-memory.dmp

    Filesize

    8KB

  • memory/4596-64-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-54-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-24-0x00000000029B0000-0x00000000029F4000-memory.dmp

    Filesize

    272KB

  • memory/4596-25-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-80-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-88-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-86-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-84-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-83-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-78-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-76-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-74-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-72-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-70-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-68-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-66-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-22-0x0000000002680000-0x00000000026C6000-memory.dmp

    Filesize

    280KB

  • memory/4596-63-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-60-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-59-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-56-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-23-0x00000000050A0000-0x0000000005644000-memory.dmp

    Filesize

    5.6MB

  • memory/4596-52-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-50-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-48-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-46-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-42-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-40-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-44-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-38-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-36-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-34-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-32-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-30-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-28-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-26-0x00000000029B0000-0x00000000029EF000-memory.dmp

    Filesize

    252KB

  • memory/4596-931-0x0000000005650000-0x0000000005C68000-memory.dmp

    Filesize

    6.1MB

  • memory/4596-932-0x0000000004F00000-0x000000000500A000-memory.dmp

    Filesize

    1.0MB

  • memory/4596-933-0x0000000005040000-0x0000000005052000-memory.dmp

    Filesize

    72KB

  • memory/4596-934-0x0000000005D70000-0x0000000005DAC000-memory.dmp

    Filesize

    240KB

  • memory/4596-935-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

    Filesize

    304KB