Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:27

General

  • Target

    7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe

  • Size

    537KB

  • MD5

    c62d2192420264453738e947ca9fa0d2

  • SHA1

    131d731b6111ad4619c8386e01696af3c37a48d3

  • SHA256

    7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69

  • SHA512

    12a0e53dca70e3a15c089ce730a67933cd1f0babdff4bea62649ebe998f9e67a1523aed24fd29263efbd668fe519cd5b9183501c7116ed3fb0d9d2bcfe08ebc0

  • SSDEEP

    12288:yMrgy90Rg7RqJL/UzvN6UnuH0wYkHuhTj32:WydygvN6jUwO1jG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe
    "C:\Users\Admin\AppData\Local\Temp\7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO8296.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO8296.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr585374.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr585374.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku215049.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku215049.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO8296.exe

    Filesize

    395KB

    MD5

    720edf0fbd98996a348fcada80847069

    SHA1

    8525374dd269f163eb6b27d5323a813ae14587ed

    SHA256

    ff3c73f8315bc15f51278cc334067b9d2cb415f21222226e4ab027d4b2c196cb

    SHA512

    ff8ebab7e30a3912627280fcdc4eb3b38365c4cd96397ae5d336d87d25717defbf039ebdb0e1edb452d2534df45a1250ba8d779be5cf32c3903f3afdc3563a4d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr585374.exe

    Filesize

    13KB

    MD5

    7a2ecc7161bb1314d8925050fd091f4a

    SHA1

    c804a34002bcadd3541adc1065cecc86a63607a6

    SHA256

    6b98fc86c6ef842c912cbdc00ade9d73477ae7ab593c03113857eb20bd7651ef

    SHA512

    a29196e2b06e285e67aeeaa2dfedd964924b479ef89b48fc32293d6ac9de1efbe0527ab90883157acf7440d22f1caee1171015a7ebfd657c2d0f5f3008ab092a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku215049.exe

    Filesize

    352KB

    MD5

    c142ba3050940de925a364c6b61a148f

    SHA1

    fad3b4bd59854cb1c052a1f05007410a61064a9b

    SHA256

    6bb6604fb75c47673b4716674ebb3fca17de3e41f9e35068b0017f60a85e67c5

    SHA512

    cd71a68d652cbb5040307d9272df8a8ef2738040bd218d069199a0fe5602723b2edd7c00cf072d14516d1f67b4f608da3a753761376c02e475b211218a95a735

  • memory/1404-14-0x00007FFAC1A53000-0x00007FFAC1A55000-memory.dmp

    Filesize

    8KB

  • memory/1404-15-0x0000000000E90000-0x0000000000E9A000-memory.dmp

    Filesize

    40KB

  • memory/1404-16-0x00007FFAC1A53000-0x00007FFAC1A55000-memory.dmp

    Filesize

    8KB

  • memory/4772-64-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-54-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-24-0x00000000028A0000-0x00000000028E4000-memory.dmp

    Filesize

    272KB

  • memory/4772-26-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-46-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-88-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-86-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-84-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-82-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-80-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-76-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-75-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-72-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-71-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-68-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-66-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-22-0x00000000027D0000-0x0000000002816000-memory.dmp

    Filesize

    280KB

  • memory/4772-62-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-60-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-58-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-56-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-23-0x0000000004FA0000-0x0000000005544000-memory.dmp

    Filesize

    5.6MB

  • memory/4772-53-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-50-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-49-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-45-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-42-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-41-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-38-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-36-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-34-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-32-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-31-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-28-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-78-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-25-0x00000000028A0000-0x00000000028DF000-memory.dmp

    Filesize

    252KB

  • memory/4772-931-0x0000000005550000-0x0000000005B68000-memory.dmp

    Filesize

    6.1MB

  • memory/4772-932-0x0000000005B70000-0x0000000005C7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4772-933-0x0000000004F30000-0x0000000004F42000-memory.dmp

    Filesize

    72KB

  • memory/4772-934-0x0000000004F50000-0x0000000004F8C000-memory.dmp

    Filesize

    240KB

  • memory/4772-935-0x0000000005D90000-0x0000000005DDC000-memory.dmp

    Filesize

    304KB