Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 00:04

General

  • Target

    c93c5303d8289a2f028220364e20a15e674990bfabc11a42c8abbbfe7608420a.exe

  • Size

    529KB

  • MD5

    0651a148d733d130e269d78de0c535c8

  • SHA1

    19e8efaf69991954b3df40635697bc0491698c38

  • SHA256

    c93c5303d8289a2f028220364e20a15e674990bfabc11a42c8abbbfe7608420a

  • SHA512

    02d8585d12b4d74496f813a132c7a542103c4d4885eaf8769897e1fb248fe8b22ffa1d8baf60dc8cf02b55fe6367fb4eb40be59672f1b7889924626a48e309d6

  • SSDEEP

    12288:oMr9y901IDpEfCS/H5sRLxrGNlq4IUZ4iHWnrwfOpFyp:FygIDpkh8LxrIF+iercOip

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c93c5303d8289a2f028220364e20a15e674990bfabc11a42c8abbbfe7608420a.exe
    "C:\Users\Admin\AppData\Local\Temp\c93c5303d8289a2f028220364e20a15e674990bfabc11a42c8abbbfe7608420a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZH2061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZH2061.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr224238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr224238.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku919905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku919905.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZH2061.exe

    Filesize

    387KB

    MD5

    ea40f707227105dea7311cd6806ccbdc

    SHA1

    4c03d4740d950d4bf28f30221181d3be46bc0f73

    SHA256

    fa5ad75e4c6e6d6d14828e4698f7dac81573eb1efda6092ac7f78f7042e0f29d

    SHA512

    ecb10de55eb87d9df60b38761e259457e431e12840400b3022541071c12f89acdf1f3070c1a52c82398d4526edf88618548229b141d65ab6e2c7fc62778228de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr224238.exe

    Filesize

    12KB

    MD5

    92bf852cd796b1beefdb22f726bbeda8

    SHA1

    1bb7a40b5abddf783d5770ec00e5c6a205ab6b1d

    SHA256

    ab551e8e351e8193e6c15b7ceac03b170286efa3b820a13213a1d8d41cc879ed

    SHA512

    5546e30761c29f681383f560c9b26c203dd451e07036a404ef9f47392b859275a51facf9373dad262330dfeede0f91876335a669e3511caaf65641764632b492

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku919905.exe

    Filesize

    342KB

    MD5

    20689325fcfc79e31d376d23afbf70c2

    SHA1

    85ebce84e7d36f900db0aef568f071dc7dfca1fa

    SHA256

    9f004a1ab48180dc9f432770205e4c3310747c816a5d43ce46e3e7f9a9451982

    SHA512

    c3c287df283e988843d8fafdffeada3792d5ec1daf129f9d1570244ec2de827742507ec2bbcae7dfbc28ffb9f533d5cf022528099cc74d9768612ea68da31bbe

  • memory/1580-64-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-36-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-935-0x0000000008290000-0x00000000082DC000-memory.dmp

    Filesize

    304KB

  • memory/1580-22-0x0000000004B30000-0x0000000004B76000-memory.dmp

    Filesize

    280KB

  • memory/1580-23-0x0000000007380000-0x0000000007924000-memory.dmp

    Filesize

    5.6MB

  • memory/1580-24-0x0000000004D10000-0x0000000004D54000-memory.dmp

    Filesize

    272KB

  • memory/1580-30-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-44-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-88-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-86-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-84-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-82-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-80-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-78-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-76-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-74-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-72-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-68-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-66-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-934-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/1580-58-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-933-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/1580-60-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-56-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-54-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-52-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-50-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-46-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-43-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-40-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-38-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-62-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-34-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-32-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-70-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-48-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-28-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-26-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-25-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1580-931-0x0000000007930000-0x0000000007F48000-memory.dmp

    Filesize

    6.1MB

  • memory/1580-932-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4900-16-0x00007FFFA5713000-0x00007FFFA5715000-memory.dmp

    Filesize

    8KB

  • memory/4900-14-0x00007FFFA5713000-0x00007FFFA5715000-memory.dmp

    Filesize

    8KB

  • memory/4900-15-0x0000000000AA0000-0x0000000000AAA000-memory.dmp

    Filesize

    40KB