Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:51

General

  • Target

    5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396.exe

  • Size

    659KB

  • MD5

    adc8984cb67384e670732b784519ae1d

  • SHA1

    abd1af2e7f92706d685e16528ce19a294602451b

  • SHA256

    5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396

  • SHA512

    e4f43c989426180ef132588269362ad6a1d21291fc9e9ae8f4c75a7eb1d888518a949dcd635384963261b77f24210280afcfd67d3858c2cd9d1ae97c0f483d26

  • SSDEEP

    12288:0MrGy90MaQtstFrQ8MuF5w88Z2k/xAi0pkitg1Ng2t59nrwbk1CVaOft/juDKZcF:yyU8p8IqeNg2t5h4k8VHBoKZcF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396.exe
    "C:\Users\Admin\AppData\Local\Temp\5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379912.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379912.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3953.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 1080
          4⤵
          • Program crash
          PID:2708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9033.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4580
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4368 -ip 4368
    1⤵
      PID:1532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379912.exe

      Filesize

      517KB

      MD5

      12ebdb49a1d54b28b32056a61c37aa52

      SHA1

      180a4c2ccd53f21f69bbcf4fd35784cd42756343

      SHA256

      53632a3165b284646350075d2c1c19c2fc69a80f3af16087992f4f137317bf6a

      SHA512

      14075d23418807b37b945174c0b2ec46d052b894274aaf820cccf63c4a7a845e979f7f0a98712b13e68821ace1884d003dbec896707b8fa75e4daa8f2206b754

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3953.exe

      Filesize

      237KB

      MD5

      f967fbee29e80d63c6fd24dad5e8cbe6

      SHA1

      024abb526d974f54f62878198c986b21821daa88

      SHA256

      cadcdceef46e611bc29705702ad0f7e5c3c93242cf283f5a9edb7ab927a7a573

      SHA512

      ea6b5567cf1709f74e94f3c51bd3d4b73ba83f56a438b47622431859a386f21fa0c621421b51c9ba0744d3ea2b4088aebbbdf8ca5cc9a3b65b01803f4bfe2033

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9033.exe

      Filesize

      295KB

      MD5

      06b77b9803ef429461f01f20065b4032

      SHA1

      f6227197cbe931bd0e9c783250b9310ab12c0519

      SHA256

      aa26d4a991612160cd6bb893c2582bd73725a561002fae17d62e294782105a32

      SHA512

      3fb1036e55160c0d930bc1eea69b7b0f1841ad92157540be14554d09386b1ee3479bd390267e26decdb49d75e7759b70e90f6fffe028cdbe1fb0624566dca5af

    • memory/4368-15-0x00000000005B0000-0x00000000006B0000-memory.dmp

      Filesize

      1024KB

    • memory/4368-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4368-17-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4368-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4368-19-0x00000000023B0000-0x00000000023CA000-memory.dmp

      Filesize

      104KB

    • memory/4368-20-0x0000000004BC0000-0x0000000005164000-memory.dmp

      Filesize

      5.6MB

    • memory/4368-21-0x0000000004A50000-0x0000000004A68000-memory.dmp

      Filesize

      96KB

    • memory/4368-49-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-47-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-45-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-43-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-41-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-39-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-37-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-35-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-33-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-31-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-29-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-27-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-25-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-23-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-22-0x0000000004A50000-0x0000000004A62000-memory.dmp

      Filesize

      72KB

    • memory/4368-50-0x00000000005B0000-0x00000000006B0000-memory.dmp

      Filesize

      1024KB

    • memory/4368-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4368-54-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4368-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4580-60-0x00000000023F0000-0x0000000002436000-memory.dmp

      Filesize

      280KB

    • memory/4580-61-0x0000000002670000-0x00000000026B4000-memory.dmp

      Filesize

      272KB

    • memory/4580-71-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-73-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-95-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-93-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-91-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-87-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-85-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-83-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-81-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-79-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-77-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-75-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-69-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-67-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-89-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-65-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-63-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-62-0x0000000002670000-0x00000000026AF000-memory.dmp

      Filesize

      252KB

    • memory/4580-968-0x0000000005150000-0x0000000005768000-memory.dmp

      Filesize

      6.1MB

    • memory/4580-969-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/4580-970-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/4580-971-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/4580-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB