Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 01:25 UTC

General

  • Target

    b32311fc807236503d975253740d1267e4214f13f174a458b5007d249214fa3a.exe

  • Size

    536KB

  • MD5

    16dcc638e74d1f4baebf61b2166d562d

  • SHA1

    073565b612683e3ee67325ffb03c24b27eeb8ce7

  • SHA256

    b32311fc807236503d975253740d1267e4214f13f174a458b5007d249214fa3a

  • SHA512

    03466c966fa273cf9c92a54025e7b29f5936d7c27f4d7238bdeb85cb9f428f21ba1a1242af30b1b9e6d24eb76f2de44c9c6d976dbc9e2909f29ae94c3f45d595

  • SSDEEP

    12288:mMrgy900i5f4HibHN0QXCguFONSzs+t2LC7ebk/w:qyy5bN0+C0NSn2O75/w

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b32311fc807236503d975253740d1267e4214f13f174a458b5007d249214fa3a.exe
    "C:\Users\Admin\AppData\Local\Temp\b32311fc807236503d975253740d1267e4214f13f174a458b5007d249214fa3a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYR2294.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYR2294.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039571.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku138258.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku138258.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2464

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    140.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    140.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    23.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 176.113.115.145:4125
    ku138258.exe
    260 B
    5
  • 176.113.115.145:4125
    ku138258.exe
    260 B
    5
  • 176.113.115.145:4125
    ku138258.exe
    260 B
    5
  • 176.113.115.145:4125
    ku138258.exe
    260 B
    5
  • 176.113.115.145:4125
    ku138258.exe
    260 B
    5
  • 176.113.115.145:4125
    ku138258.exe
    156 B
    3
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    140.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    140.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    23.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYR2294.exe

    Filesize

    394KB

    MD5

    0ecb404d22c9a553ec9d46ba77d82065

    SHA1

    4206b25482b941ef1c135b2fbcb51fcff6cccb70

    SHA256

    7b0ae6a4aa5211d01404a26a3519aef2a60ad5a45f7b5995d5c8f2eb269e71ea

    SHA512

    b12295a9783cd883189e2899370d0152e7de724c147446aefc6c86068958f54400b1a18c2b2105ff543f84b88f04f1dca18612517d5d7ad684d875cc1403dd1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039571.exe

    Filesize

    13KB

    MD5

    1cae544cc6fd9799359bbd263ce70521

    SHA1

    b122272a668de00f35cd1f2bffdc00cac0d433b2

    SHA256

    e980eea6c4c53877af2553d66a4d376fdc78c3e22a8109e6ab3fa79bd5157368

    SHA512

    144bddd3b51b90ee46908d9f9815be9034351ecb8e01fe9745fc3fe0c743f155d8c682d5cdd429d1e3373dd23f086515858713333b3356fccb637c5553141c10

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku138258.exe

    Filesize

    353KB

    MD5

    528699ea7d92880803561479145f50ea

    SHA1

    0416d8c823d7bea34b6d35541018c063d7785fe1

    SHA256

    e0ad8709acff1be623434b9ea43c05ab7a542d8866782d08b9dfd5cb3fdbf3f0

    SHA512

    5b94c6b8e217d0eee1172276e147f4480ebbaa0a6a7825785e7077fe870399bda7a37c4e3e57599b772e9db13346b43f4af71531435eeb427fff27ac7618b4e4

  • memory/2464-62-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-32-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB

  • memory/2464-22-0x00000000026B0000-0x00000000026F6000-memory.dmp

    Filesize

    280KB

  • memory/2464-23-0x0000000004EA0000-0x0000000005444000-memory.dmp

    Filesize

    5.6MB

  • memory/2464-24-0x0000000002AF0000-0x0000000002B34000-memory.dmp

    Filesize

    272KB

  • memory/2464-34-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-38-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-88-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-86-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-84-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-82-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-78-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-76-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-74-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-72-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-70-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-68-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-66-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/2464-56-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/2464-59-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-54-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-52-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-50-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-48-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-46-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-44-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-40-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-37-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-60-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-30-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-80-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-64-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-42-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-28-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-26-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-25-0x0000000002AF0000-0x0000000002B2F000-memory.dmp

    Filesize

    252KB

  • memory/2464-931-0x0000000005450000-0x0000000005A68000-memory.dmp

    Filesize

    6.1MB

  • memory/2464-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4612-16-0x00007FFAAFA93000-0x00007FFAAFA95000-memory.dmp

    Filesize

    8KB

  • memory/4612-14-0x00007FFAAFA93000-0x00007FFAAFA95000-memory.dmp

    Filesize

    8KB

  • memory/4612-15-0x0000000000D00000-0x0000000000D0A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.