Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:41

General

  • Target

    c0c90b8c2ce6549665215b6483376129ce28fb7c7d9dae55bc1aeaefc6c2f41a.exe

  • Size

    675KB

  • MD5

    6c0c3edf8ead15030e38404c73cef6db

  • SHA1

    be32c6734a637f1b6386224eb8aabf099638f3c8

  • SHA256

    c0c90b8c2ce6549665215b6483376129ce28fb7c7d9dae55bc1aeaefc6c2f41a

  • SHA512

    a167b86949faac13198fc5828baaf9db3f0346b303f1875d31272e4af01bf00940c44663263f309800a16e1d2620182b24765b002aaf6ce216f8d0858a4f3220

  • SSDEEP

    12288:5Mr4y90KPYsl8enuByobDiuS7bZ17exqZuCuXe42mq4M/Zu/w7k:xylpqWbXpX42mqTk

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0c90b8c2ce6549665215b6483376129ce28fb7c7d9dae55bc1aeaefc6c2f41a.exe
    "C:\Users\Admin\AppData\Local\Temp\c0c90b8c2ce6549665215b6483376129ce28fb7c7d9dae55bc1aeaefc6c2f41a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373283.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373283.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8573.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8573.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1084
          4⤵
          • Program crash
          PID:3608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6146.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6146.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3004 -ip 3004
    1⤵
      PID:3180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373283.exe

      Filesize

      533KB

      MD5

      815f1e6eef8fe65ae3760a52e6f7ca07

      SHA1

      4cf130e1bd6cc265baa38a6ca783a78e8158dd7f

      SHA256

      ba77f5bfef3afd280d881f9df29b36d3f8af75000a5d6a1a99baaa2309f71031

      SHA512

      47ca279cdf94cdb4019b39fa2d90040c131db0e0ecaa61ef3bd83e301120a92bfbc3050e17793625b846d04eb51d8a1e9f68df92bd658f38250adb23e45781ae

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8573.exe

      Filesize

      376KB

      MD5

      27f41c174241c7e0579a4deeeda1e03e

      SHA1

      de9b2d0cda2d95ccddce541ba79cb23695dad6ba

      SHA256

      2aef48cb86597e2f6b523d2ca13c32eab77eeaf1995351e63d6d9124d81b4396

      SHA512

      9fcac8521c82e624d391c619555069b33b78eacc1b66b983c3c00e9ef096674bcce3dee65574680e41a456f567395737317a2daf0b12322fdf23ae2841c26c3a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6146.exe

      Filesize

      435KB

      MD5

      1cdb9dcf410d2ffcf9926a09cd6c4511

      SHA1

      c143c778ec1bad7c0af17beda6f6927dcefb287d

      SHA256

      8302b197b3e50452a3d859123870139e6db7ab73cb0bab55282e63323a2a0ca5

      SHA512

      5d05f92bbc8c92d6c7adc719df0bd33efad6867768ebde169124a032cb80c3d28d4b197d2105554ca450c17a5430045c08f63edca864e5535e83fc2fdc7198b8

    • memory/3004-15-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/3004-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3004-17-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-18-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-19-0x0000000002330000-0x000000000234A000-memory.dmp

      Filesize

      104KB

    • memory/3004-20-0x0000000004D50000-0x00000000052F4000-memory.dmp

      Filesize

      5.6MB

    • memory/3004-21-0x00000000024C0000-0x00000000024D8000-memory.dmp

      Filesize

      96KB

    • memory/3004-25-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-49-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-47-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-45-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-44-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-41-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-39-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-37-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-35-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-33-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-31-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-29-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-27-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-23-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-22-0x00000000024C0000-0x00000000024D2000-memory.dmp

      Filesize

      72KB

    • memory/3004-50-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/3004-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3004-54-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3852-60-0x0000000004300000-0x0000000004346000-memory.dmp

      Filesize

      280KB

    • memory/3852-61-0x00000000068C0000-0x0000000006904000-memory.dmp

      Filesize

      272KB

    • memory/3852-63-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-81-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-93-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-91-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-89-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-87-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-85-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-79-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-77-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-75-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-73-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-71-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-69-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-67-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-65-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-96-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-83-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-62-0x00000000068C0000-0x00000000068FF000-memory.dmp

      Filesize

      252KB

    • memory/3852-968-0x0000000007000000-0x0000000007618000-memory.dmp

      Filesize

      6.1MB

    • memory/3852-969-0x0000000007620000-0x000000000772A000-memory.dmp

      Filesize

      1.0MB

    • memory/3852-970-0x0000000006A00000-0x0000000006A12000-memory.dmp

      Filesize

      72KB

    • memory/3852-971-0x0000000007730000-0x000000000776C000-memory.dmp

      Filesize

      240KB

    • memory/3852-972-0x0000000007870000-0x00000000078BC000-memory.dmp

      Filesize

      304KB