Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:03

General

  • Target

    c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe

  • Size

    559KB

  • MD5

    ec5bd8c7ab57f2ea648392a8ccb88620

  • SHA1

    c1f85dd1559e3e623a9ecc08c46135c9552bc744

  • SHA256

    c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d

  • SHA512

    f9a1a989f2be8421a08d0bb59a47a0ab859d82929c446d2248c92fc86c6ce328f68ea68925d62a844640b1367636ccf16f8bca07464b276a832b52744a79f11b

  • SSDEEP

    12288:IMrey90il5ydxTS7E3Q/XWmYaggHMn76+jGAOwXPQL:2yh1E3GXWmggHM7pjGAOxL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe
    "C:\Users\Admin\AppData\Local\Temp\c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh6558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh6558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725993.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725993.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku700226.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku700226.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh6558.exe

    Filesize

    406KB

    MD5

    1a6e09aee4d4e9113c2b054f3080fff7

    SHA1

    038e4d43d35ac2c8134a954e0d021e9adccf1e36

    SHA256

    38f83e22e46aadd55420928d13a89fb3841bbe433b4a51756526e49d71eb2dd0

    SHA512

    51346de53fc7eda2d1ac519780efe9b28445d31d3b68974463ffe4e0675eb0b1548b9588e7d32d5d050c38776b0434b8627b701e87153f4135603a4cb166c8d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725993.exe

    Filesize

    12KB

    MD5

    2409ccd03a3e9266e4b66a66be7a841c

    SHA1

    773e5debb739acba20758001c32fe04a78ac8fe9

    SHA256

    2e04747fbfb910be1b4b7208a5142f76314878cc6d0fb3e9707d59c2b79ae777

    SHA512

    dfd3d51714eafe0c20e38ea02884c4380cfb4ad7b29b0bda1357cd18087455df5ed9772813f91e7aa3acb81a8bff9361ad217aa395045be3db646b12dd14e8a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku700226.exe

    Filesize

    370KB

    MD5

    a2c653bca75e882a43217087d6c4a454

    SHA1

    1536b1c267dcfadcb2b563abd02abc5f43eabca8

    SHA256

    84d781b3ed55af89ea73f33f45a0836281effd8524777b1cab3ff33f2679ed8b

    SHA512

    8daaec894884c06321b6f17b0859cd4d0ae067ef0cf141643959f7433b3525e16577a05d79ea03e10b235d5f26b73d98d086cc54f1e7f001fe94eb569d1e9827

  • memory/1440-64-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-22-0x00000000028B0000-0x00000000028F6000-memory.dmp

    Filesize

    280KB

  • memory/1440-935-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

    Filesize

    304KB

  • memory/1440-60-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-23-0x0000000004FD0000-0x0000000005574000-memory.dmp

    Filesize

    5.6MB

  • memory/1440-24-0x0000000004F60000-0x0000000004FA4000-memory.dmp

    Filesize

    272KB

  • memory/1440-28-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-48-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-88-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-87-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-62-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-82-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-56-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-78-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-76-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-74-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-72-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-70-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-66-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-934-0x0000000005D90000-0x0000000005DCC000-memory.dmp

    Filesize

    240KB

  • memory/1440-84-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-933-0x0000000005D70000-0x0000000005D82000-memory.dmp

    Filesize

    72KB

  • memory/1440-81-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-54-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-52-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-50-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-46-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-44-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-42-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-40-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-38-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-36-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-34-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-32-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-30-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-68-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-58-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-26-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-25-0x0000000004F60000-0x0000000004F9F000-memory.dmp

    Filesize

    252KB

  • memory/1440-931-0x0000000005590000-0x0000000005BA8000-memory.dmp

    Filesize

    6.1MB

  • memory/1440-932-0x0000000005C30000-0x0000000005D3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4592-16-0x00007FFDC3923000-0x00007FFDC3925000-memory.dmp

    Filesize

    8KB

  • memory/4592-14-0x00007FFDC3923000-0x00007FFDC3925000-memory.dmp

    Filesize

    8KB

  • memory/4592-15-0x00000000006D0000-0x00000000006DA000-memory.dmp

    Filesize

    40KB