Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:06

General

  • Target

    67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe

  • Size

    537KB

  • MD5

    d50b34d1e23ba5898eb25ea760ac068e

  • SHA1

    1feb59ea9916f26e44786d44a210d4a3efe5db02

  • SHA256

    67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559

  • SHA512

    39de364f05e28922751bf5ba794cb4f2cadd32b4295e187f0303fa87c23743d1eb5c5d61851f20f9a24d1b37f24625c352edf2a451dc3488ebeb4863c1a34742

  • SSDEEP

    12288:aMrSy90Kue6DMGI0CCOrU92H2w/0x9Dhk:sy96CCOrLWw/oDe

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe
    "C:\Users\Admin\AppData\Local\Temp\67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWL2754.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWL2754.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr029534.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr029534.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku735396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku735396.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWL2754.exe

    Filesize

    395KB

    MD5

    ec6e3df0e6cb23bd288e65b5342a8dfd

    SHA1

    ca4aea659b0efabbab44731151c7e137a6ceefba

    SHA256

    e629d08fcd30dc61edb1901660c44735776d8e81b166b382709ae9bd130acbbd

    SHA512

    11e83eb03b61478eb3d6ef9cd42ab9f6f8caa1b76eaecb1ea8cdaa0991d69be13369ee1f404cacef7b35b7112086ca5cb0d243b4fdd08838828cd4a6d69b1c6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr029534.exe

    Filesize

    14KB

    MD5

    2e556c8af88a8f888fb74141a9c8da61

    SHA1

    a1d93813e96226766562cc3d3909f9f0265bf7ff

    SHA256

    0dc48b89020f6bce79e98e90488f42f562b91202d2017ad9d58aee93ff3745bb

    SHA512

    3912d3689877b6bd1793a116df8d9b1ab12dcb04e3a4b7e12c78219778a1c5d149f2d1587adb62360f399df69b05e12b03f918cab617b4e89020210b123a7795

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku735396.exe

    Filesize

    352KB

    MD5

    b1cb28f242072bec47cc5f5b50fdf042

    SHA1

    e4a534149b883e48800c48afc5cdef1982938ad6

    SHA256

    b1ed975eb3a33a178fdec093e0a121c1d417ff459050701e677048db4481ecec

    SHA512

    d39631e78724235af0ad5a56797b01d917041fed5a390511ea317c0a4c83ffd47dc1677e30c9fab37937ea3ccefbd9ff6436a7f68089f70218f01a58e5f3ba59

  • memory/2428-14-0x00007FFA20253000-0x00007FFA20255000-memory.dmp

    Filesize

    8KB

  • memory/2428-15-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/2428-16-0x00007FFA20253000-0x00007FFA20255000-memory.dmp

    Filesize

    8KB

  • memory/2776-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-50-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp

    Filesize

    272KB

  • memory/2776-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-69-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-22-0x00000000028A0000-0x00000000028E6000-memory.dmp

    Filesize

    280KB

  • memory/2776-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-56-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-54-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-23-0x0000000004F60000-0x0000000005504000-memory.dmp

    Filesize

    5.6MB

  • memory/2776-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-36-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-32-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

    Filesize

    252KB

  • memory/2776-931-0x0000000005510000-0x0000000005B28000-memory.dmp

    Filesize

    6.1MB

  • memory/2776-932-0x0000000005B30000-0x0000000005C3A000-memory.dmp

    Filesize

    1.0MB

  • memory/2776-933-0x0000000004F30000-0x0000000004F42000-memory.dmp

    Filesize

    72KB

  • memory/2776-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/2776-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB