Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:52

General

  • Target

    6746d78d18fa8555ab6ad08c04fa180a2d01e4edc304cf01b62976dd7db51a15.exe

  • Size

    538KB

  • MD5

    a82a1b3b19c2e5526b01105fd6a05fa3

  • SHA1

    9752eebdf5cdc70a5bf9ba64d2ee83f781696b79

  • SHA256

    6746d78d18fa8555ab6ad08c04fa180a2d01e4edc304cf01b62976dd7db51a15

  • SHA512

    4223a78aed9871389bb3c4293b11e5bc172666eb895b135c02072e28084857c56e4c398908a29e1ab31a2f26df1f0e165e3008c97bf9cbc78e81ea6eb117df66

  • SSDEEP

    12288:OMrmy90jPEBhpDMyh4w+dD/SHP5xWl+ott3whPQentPG26dxHrzG2yPu:Uyggw7lAxxWlZtghPJtPb6rrCZPu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6746d78d18fa8555ab6ad08c04fa180a2d01e4edc304cf01b62976dd7db51a15.exe
    "C:\Users\Admin\AppData\Local\Temp\6746d78d18fa8555ab6ad08c04fa180a2d01e4edc304cf01b62976dd7db51a15.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidn6834.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidn6834.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr866604.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr866604.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku823397.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku823397.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidn6834.exe

    Filesize

    396KB

    MD5

    88f9e68ce22be1cce21015b131798abf

    SHA1

    7b6b30a43c559d1f8094b9d013991affc446197a

    SHA256

    8f8b70f173da63ee7bf284b1b877c6f828a1ceb870a693952a9ffd3ba68cfc23

    SHA512

    b05b8d6289d4ec850900a26fbe6ce0f924b67c1f57385017bd4d308619d00237a4eee84658c6af73ee2d3658c046d9b3068d64388222b519205536b6bb775022

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr866604.exe

    Filesize

    13KB

    MD5

    f01f1ba00ef39e62b0f7b69540e9c540

    SHA1

    699bc1731eadfa16f2ef2822c2f2b758a5eedf48

    SHA256

    d9716ac583dc7bd2b38723f7a846a98708dc3e58b7b21ba1f4aff183c76ad486

    SHA512

    31fd65e8f4da819f4d0664ee9cd6eadda8686de8534789d6766df6f6b5b8d4a09dba33e85106e3b639b072fa9a1d41da43cbe6afc5e509b8f793895996807e8c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku823397.exe

    Filesize

    353KB

    MD5

    6e5d178fde4eb257e4b811e00319c47f

    SHA1

    bbcb49ee5499b2daa84058ff9da26176b8a99495

    SHA256

    1e954c34d0f31d52f495a5fd350ea5d09e94f9fa8b910700197addf0981df57f

    SHA512

    401d02cdb252bd5e554997533cb7bc571dedeedc420383fc11bdf6c8a2d0d2990b8de86edc3ccbc01d1ebcf1128535a9537d489763bf732ebba8f5b74b55a71e

  • memory/1676-14-0x00007FFC4F523000-0x00007FFC4F525000-memory.dmp

    Filesize

    8KB

  • memory/1676-15-0x00000000004D0000-0x00000000004DA000-memory.dmp

    Filesize

    40KB

  • memory/1676-16-0x00007FFC4F523000-0x00007FFC4F525000-memory.dmp

    Filesize

    8KB

  • memory/3988-64-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-54-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-24-0x00000000053E0000-0x0000000005424000-memory.dmp

    Filesize

    272KB

  • memory/3988-36-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-48-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-88-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-86-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-84-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-82-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-80-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-78-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-74-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-73-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-70-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-68-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-67-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-22-0x00000000028F0000-0x0000000002936000-memory.dmp

    Filesize

    280KB

  • memory/3988-62-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-60-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-58-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-57-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-23-0x0000000004DF0000-0x0000000005394000-memory.dmp

    Filesize

    5.6MB

  • memory/3988-52-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-50-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-46-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-44-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-42-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-40-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-38-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-34-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-33-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-30-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-28-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-76-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-26-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-25-0x00000000053E0000-0x000000000541F000-memory.dmp

    Filesize

    252KB

  • memory/3988-931-0x0000000005440000-0x0000000005A58000-memory.dmp

    Filesize

    6.1MB

  • memory/3988-932-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3988-933-0x0000000005C20000-0x0000000005C32000-memory.dmp

    Filesize

    72KB

  • memory/3988-934-0x0000000005C40000-0x0000000005C7C000-memory.dmp

    Filesize

    240KB

  • memory/3988-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB