Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 21:38

General

  • Target

    7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe

  • Size

    560KB

  • MD5

    7d88039eedd366ba4b80df50ec9589e9

  • SHA1

    13deeb47ceb6468d1e247178e6746f8f38f28f97

  • SHA256

    7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd

  • SHA512

    f3311c2f3bd31d88445cbb6cfa33a6f0b3e67edfecdb6b3b3aa8f1ec6e867ca4dcbb71dfe9241eb454d04a65b38e8fc5f4cb8e0aed0c4e6c0e0a3fc2add2f432

  • SSDEEP

    12288:zMryy90p0HLljIE6YP3uBEbxJYWa4yL3WqIj:dybljz6BBEbcL4yLGbj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe
    "C:\Users\Admin\AppData\Local\Temp\7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqN4579.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqN4579.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr519767.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr519767.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku000701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku000701.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqN4579.exe

    Filesize

    406KB

    MD5

    732d0641be3a12cc0c393481516adb14

    SHA1

    bc033c2af1aecfe60442b04954999a167d5074f8

    SHA256

    19df85b09fa9547f4c16d3ca9c11165c4c6a685b69361c5b5cc42be9c9c9eb83

    SHA512

    411501e6855cc4ec0e68b4ea57691ffe828cfacc1ab41d183f5b6205f1b8b45b5230bc4d674b67426b59e02d0e46c241d19dac21d1cd606faaaeea920ea712ce

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr519767.exe

    Filesize

    12KB

    MD5

    b49e65ab3808f4c2057b6efa92a5446f

    SHA1

    7450a229775f0e94ac900ab05b4eb51d35d8d73d

    SHA256

    3a147fa9724e3100050461fc839111184a23e4e213faeb0375be9d1ba50cdb22

    SHA512

    079ba6c49caf1def03f6e256efac44c81eb45459726aceda6dcb8a76c7343d14a094e0f17fe7680b9d39bba37f7cced927364876a64a2433b8eb45932c073c83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku000701.exe

    Filesize

    372KB

    MD5

    5495afa50e3008bd5e3ba12d68fe783c

    SHA1

    3c239dbeb302a8f17ad206a10633915181441a8a

    SHA256

    9d424d24250ed7d106b0a228be3646f708848df2f27c4d6c0672f894cc4138fa

    SHA512

    aa924c506ea24e5216a6f04582ff31a068bbbf93524b0accd2c8b1ceae03d5400b3c92d3dfe14d17343b77dbe1112b10adba7d46b8e18d6a42f00d56848dff8a

  • memory/1144-14-0x00007FFD354D3000-0x00007FFD354D5000-memory.dmp

    Filesize

    8KB

  • memory/1144-15-0x0000000000680000-0x000000000068A000-memory.dmp

    Filesize

    40KB

  • memory/1144-16-0x00007FFD354D3000-0x00007FFD354D5000-memory.dmp

    Filesize

    8KB

  • memory/4112-64-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-53-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-24-0x0000000005520000-0x0000000005564000-memory.dmp

    Filesize

    272KB

  • memory/4112-34-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-40-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-88-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-86-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-84-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-82-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-78-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-76-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-74-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-72-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-70-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-68-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-66-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-22-0x0000000002880000-0x00000000028C6000-memory.dmp

    Filesize

    280KB

  • memory/4112-60-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-58-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-56-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-54-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-23-0x0000000004F70000-0x0000000005514000-memory.dmp

    Filesize

    5.6MB

  • memory/4112-931-0x0000000005590000-0x0000000005BA8000-memory.dmp

    Filesize

    6.1MB

  • memory/4112-50-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-48-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-46-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-44-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-42-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-38-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-36-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-32-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-30-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-80-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-62-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-932-0x0000000005C30000-0x0000000005D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4112-28-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-26-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-25-0x0000000005520000-0x000000000555F000-memory.dmp

    Filesize

    252KB

  • memory/4112-933-0x0000000005D70000-0x0000000005D82000-memory.dmp

    Filesize

    72KB

  • memory/4112-934-0x0000000005D90000-0x0000000005DCC000-memory.dmp

    Filesize

    240KB

  • memory/4112-935-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

    Filesize

    304KB