Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 18:32

General

  • Target

    7f21552bb3943597d38083cde4acdfe0196c12e7dad1821cee142d54e7ee8841N.exe

  • Size

    387KB

  • MD5

    5319d2103eea51e3300709a1e8883420

  • SHA1

    73701929245442f4ecaa67a5fc75988032465d34

  • SHA256

    7f21552bb3943597d38083cde4acdfe0196c12e7dad1821cee142d54e7ee8841

  • SHA512

    6bc403808a82268d54349fd26749a399c066ee22fe185166ff92a29dfca3ae9aad0f04ebe8463bf9c30f8358ba5fcfcb9136fdc2a26efdb18046643e61d66b48

  • SSDEEP

    6144:KMy+bnr+zp0yN90QE+WSDRiQZCfvLfroudw/4H2Hi7rF0Jb8+T1VSejFf:QMrfy90lqRiNnLzoudH4IrvK1VSo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f21552bb3943597d38083cde4acdfe0196c12e7dad1821cee142d54e7ee8841N.exe
    "C:\Users\Admin\AppData\Local\Temp\7f21552bb3943597d38083cde4acdfe0196c12e7dad1821cee142d54e7ee8841N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr875857.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr875857.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku831880.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku831880.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr875857.exe

    Filesize

    12KB

    MD5

    f9c873728ccd6fa928264c7a51071c34

    SHA1

    f418a074cd2640ec0d6a1af8ccb93ca1567819dc

    SHA256

    32682eeeb9c2b0e45b145ce6113bd5cf50da49ed5b5b93fb8393f42248b1f47b

    SHA512

    d18c7a395159c22818f5430056322292667a71643571c8bea40a50a99f55b210685fbda3227a065f68cc46746864007810edfa685ba31fb2e55b8ec662b287e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku831880.exe

    Filesize

    342KB

    MD5

    432652c20f14f6f203e32279f9980223

    SHA1

    b530050f402caa31b11e66f434c6284ea07b2384

    SHA256

    9423d4d043fea2f26ced5863ee1a11e5ef1dec3c46d1b23f15eb1f3e8af041d5

    SHA512

    c1c7b995758679ba189f678d8fce4a90a5bc7accbe47bcd4091ca40d5d8fdeb3c2e895abf62f833b91fa8f8fd93b1c9314183ce8ab48108dd6c066a11d917fb8

  • memory/4044-7-0x00007FF878343000-0x00007FF878345000-memory.dmp

    Filesize

    8KB

  • memory/4044-8-0x00000000007C0000-0x00000000007CA000-memory.dmp

    Filesize

    40KB

  • memory/4884-14-0x0000000002E40000-0x0000000002F40000-memory.dmp

    Filesize

    1024KB

  • memory/4884-15-0x0000000004810000-0x000000000485B000-memory.dmp

    Filesize

    300KB

  • memory/4884-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4884-17-0x0000000004960000-0x00000000049A6000-memory.dmp

    Filesize

    280KB

  • memory/4884-18-0x00000000072F0000-0x0000000007894000-memory.dmp

    Filesize

    5.6MB

  • memory/4884-19-0x0000000007160000-0x00000000071A4000-memory.dmp

    Filesize

    272KB

  • memory/4884-23-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-31-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-83-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-81-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-79-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-77-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-75-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-73-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-71-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-69-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-67-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-65-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-63-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-59-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-57-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-55-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-53-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-51-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-49-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-47-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-45-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-41-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-39-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-37-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-35-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-33-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-29-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-27-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-25-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-21-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-62-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-44-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-20-0x0000000007160000-0x000000000719F000-memory.dmp

    Filesize

    252KB

  • memory/4884-926-0x00000000078A0000-0x0000000007EB8000-memory.dmp

    Filesize

    6.1MB

  • memory/4884-927-0x0000000007EC0000-0x0000000007FCA000-memory.dmp

    Filesize

    1.0MB

  • memory/4884-928-0x00000000072B0000-0x00000000072C2000-memory.dmp

    Filesize

    72KB

  • memory/4884-929-0x0000000007FD0000-0x000000000800C000-memory.dmp

    Filesize

    240KB

  • memory/4884-930-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB

  • memory/4884-931-0x0000000002E40000-0x0000000002F40000-memory.dmp

    Filesize

    1024KB

  • memory/4884-933-0x0000000004810000-0x000000000485B000-memory.dmp

    Filesize

    300KB

  • memory/4884-934-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB