Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:19

General

  • Target

    f709a59f25d8fbf01fd47ec4d331568506a7165560fd20836b4959618c553a94.exe

  • Size

    522KB

  • MD5

    a692c2b5138bd1a0ce762109eacee56a

  • SHA1

    51517814d605e714ed8c6880cf3f1150b431998d

  • SHA256

    f709a59f25d8fbf01fd47ec4d331568506a7165560fd20836b4959618c553a94

  • SHA512

    04bd3ade2af5cd1e5818072284983237516c4c3216449b33c1ef5f9d2836ef2bf388b6a08685222521394028a1059470a01a2b34e9e98d29661a23f2ab7766eb

  • SSDEEP

    12288:DMrZy903MlaS7TISYYvxzKdRSs7WNbgvHQd0FBa90x:qyD4S70+cTt7sbEjDf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f709a59f25d8fbf01fd47ec4d331568506a7165560fd20836b4959618c553a94.exe
    "C:\Users\Admin\AppData\Local\Temp\f709a59f25d8fbf01fd47ec4d331568506a7165560fd20836b4959618c553a94.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh7886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh7886.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104660.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104660.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku598110.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku598110.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh7886.exe

    Filesize

    379KB

    MD5

    9e77f2ab36901b3b6127aed2a04b2b95

    SHA1

    998185709401cd99f9310fdba413338d97d6e41e

    SHA256

    01c2b80cfdd24ab6df95c9447b0a805b69e72335cdb76036b20da900cc90a5b2

    SHA512

    babc749784d4c8099ab68f2ca8e032d44e32ac1b449dedf03232278b415985a31ab9141fa189f32c41e20da31453a0519e6813efffad5a3dcb3309a6aec0c416

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104660.exe

    Filesize

    15KB

    MD5

    af66923b97a413a83a3d6143f0397b79

    SHA1

    5a0cb5eb919f36e84e22f827f6d2b42e15b964f7

    SHA256

    1677c4a2b8ce2811ca62e505831a23a6151c15e7383f702a2ebd034f8e463b2b

    SHA512

    e512b6773dc1fac79b2cc1619f081cce3923fc54642ac238c766d34fd820d5992ccb78a8b999c67a2332984ea9649a0f2ff1eee6afb74221adb02fa54a7dda87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku598110.exe

    Filesize

    294KB

    MD5

    d0a133736474e3d6452f732eb5a3595a

    SHA1

    2b93bbd94189cb8d9cc0f7a349edf76a1d426840

    SHA256

    5f69d915568724bfd7def33fad6877528b784cebd64d782efbfee83187c4b82d

    SHA512

    460cd17fab62edb6e1df89e5a34f908b04803f2b62b845b3f78904f78aba34effe1eb77a0d6a1e17f183ce75c913767cb56b39a281c7dec374f9223b68e584fc

  • memory/2052-68-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-22-0x0000000002470000-0x00000000024B6000-memory.dmp

    Filesize

    280KB

  • memory/2052-935-0x0000000005A70000-0x0000000005ABC000-memory.dmp

    Filesize

    304KB

  • memory/2052-64-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-23-0x0000000004C90000-0x0000000005234000-memory.dmp

    Filesize

    5.6MB

  • memory/2052-24-0x0000000002620000-0x0000000002664000-memory.dmp

    Filesize

    272KB

  • memory/2052-26-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-25-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-42-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-88-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-66-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-85-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-62-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-80-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-78-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-77-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-74-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-72-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-70-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-934-0x0000000004C00000-0x0000000004C3C000-memory.dmp

    Filesize

    240KB

  • memory/2052-86-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-933-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

    Filesize

    72KB

  • memory/2052-82-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-60-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-58-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-56-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-54-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-52-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-50-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-46-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-44-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-40-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-38-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-36-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-34-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-32-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-30-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-28-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-48-0x0000000002620000-0x000000000265F000-memory.dmp

    Filesize

    252KB

  • memory/2052-931-0x0000000005240000-0x0000000005858000-memory.dmp

    Filesize

    6.1MB

  • memory/2052-932-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/2736-16-0x00007FFFA37F3000-0x00007FFFA37F5000-memory.dmp

    Filesize

    8KB

  • memory/2736-14-0x00007FFFA37F3000-0x00007FFFA37F5000-memory.dmp

    Filesize

    8KB

  • memory/2736-15-0x0000000000D90000-0x0000000000D9A000-memory.dmp

    Filesize

    40KB