Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:20

General

  • Target

    a4c9834a0460d358fe6959e3e671d347483bc434273c5306962d63dd604dcb50.exe

  • Size

    658KB

  • MD5

    b2ba3a6a58b97c10b907b7d5bad254f6

  • SHA1

    5c3f65806a601d753079f86ba6c503ced3c8d857

  • SHA256

    a4c9834a0460d358fe6959e3e671d347483bc434273c5306962d63dd604dcb50

  • SHA512

    9943e740c69d53311432bc7a90b3e0ddc3962508934bc9d0498fb8acdd24120138a46c31808a99cab69905f437b2f62ff2807d7b458594976fb2e008e6c2025a

  • SSDEEP

    12288:PMrcy90+SViQBwkBCUoaNNJUajC4hlHigm2YbklnwfoiowfEwAFXHfdwtggSdg:XyRSEewkRoanSCIAYbInMvnemt0q

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4c9834a0460d358fe6959e3e671d347483bc434273c5306962d63dd604dcb50.exe
    "C:\Users\Admin\AppData\Local\Temp\a4c9834a0460d358fe6959e3e671d347483bc434273c5306962d63dd604dcb50.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycgi66qZ84.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycgi66qZ84.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urgV64kh76.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urgV64kh76.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 1088
          4⤵
          • Program crash
          PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrar58na75.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrar58na75.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3344 -ip 3344
    1⤵
      PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycgi66qZ84.exe

      Filesize

      513KB

      MD5

      6f0c878ff59a70f1d9569bb72a86a62a

      SHA1

      415be77f75251946479c00db7b1e97f7a9ffbbd0

      SHA256

      f84d8e64c701f0e1137d02191b8788621768e436e73e7751a4a6dc64d00dae58

      SHA512

      eefeeb232dae9a9bc39ad6a4febe335d689504c0684d6dedde87c3598f69b536db5eb80ec6ef74a110f848d5164978f01e26e44eb884d50533e66df79ffd58c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urgV64kh76.exe

      Filesize

      231KB

      MD5

      5fe359d97529c2e4ad1b8de89d19860e

      SHA1

      d93e28ad930cdfaac6452143e04d68c707a9319a

      SHA256

      6d9bb6b2fcbb222d16c5c19a9e62a84b0505e48009e257d076e5adde6f7107cc

      SHA512

      6727cf4ff8d4fef4915f15bcb9787fcd968cfdd08ca749c7eb9a989ab63f8d55c1f6599e6e784679eb29d466094cd7c39f05badc53f80b952864d1c56eef5190

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrar58na75.exe

      Filesize

      290KB

      MD5

      8fee42f989bab807a7e66858ba5fe89d

      SHA1

      2f0c74aba0b54d351ac033248a718fa08edbfd91

      SHA256

      0b8c7c56907917d4b837cb95e0f7f47223d4457ddddd5986922cd7e3d61d70e5

      SHA512

      d4e1289b7bd0255a74eb8b85b552326ef288d45a9c69188a70215ecba62c984ecdb2ebb8ded103a699d109bf6d82ade212ed7c3dda8e04e780a79593cc3f6926

    • memory/448-78-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-84-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-970-0x0000000004C80000-0x0000000004D8A000-memory.dmp

      Filesize

      1.0MB

    • memory/448-969-0x0000000005380000-0x0000000005998000-memory.dmp

      Filesize

      6.1MB

    • memory/448-88-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-68-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-70-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-72-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-74-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-76-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-972-0x00000000059C0000-0x00000000059FC000-memory.dmp

      Filesize

      240KB

    • memory/448-973-0x0000000005B10000-0x0000000005B5C000-memory.dmp

      Filesize

      304KB

    • memory/448-82-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-971-0x00000000059A0000-0x00000000059B2000-memory.dmp

      Filesize

      72KB

    • memory/448-86-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-90-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-92-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-94-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-96-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-80-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-63-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-64-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-66-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

      Filesize

      248KB

    • memory/448-62-0x0000000004BD0000-0x0000000004C14000-memory.dmp

      Filesize

      272KB

    • memory/448-61-0x0000000002160000-0x00000000021A6000-memory.dmp

      Filesize

      280KB

    • memory/3344-41-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-55-0x0000000000400000-0x000000000057E000-memory.dmp

      Filesize

      1.5MB

    • memory/3344-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3344-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3344-51-0x00000000006A0000-0x00000000006CD000-memory.dmp

      Filesize

      180KB

    • memory/3344-50-0x00000000005A0000-0x00000000006A0000-memory.dmp

      Filesize

      1024KB

    • memory/3344-31-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-37-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-22-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-23-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-25-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-27-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-29-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-49-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-33-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-35-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-43-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-45-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-47-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-39-0x0000000004C30000-0x0000000004C42000-memory.dmp

      Filesize

      72KB

    • memory/3344-21-0x0000000004C30000-0x0000000004C48000-memory.dmp

      Filesize

      96KB

    • memory/3344-20-0x0000000004C70000-0x0000000005214000-memory.dmp

      Filesize

      5.6MB

    • memory/3344-19-0x0000000002270000-0x000000000228A000-memory.dmp

      Filesize

      104KB

    • memory/3344-18-0x0000000000400000-0x000000000057E000-memory.dmp

      Filesize

      1.5MB

    • memory/3344-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3344-16-0x00000000006A0000-0x00000000006CD000-memory.dmp

      Filesize

      180KB

    • memory/3344-15-0x00000000005A0000-0x00000000006A0000-memory.dmp

      Filesize

      1024KB