Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:54

General

  • Target

    90fc8d78dc68cc41889e509793a6cb272d306320e2e4a28d71bfdab809f3bbb6.exe

  • Size

    659KB

  • MD5

    4878112d60bf5be54b22d8224969b68c

  • SHA1

    577a54a077966a95bf3331e66c35cb5aca0549dd

  • SHA256

    90fc8d78dc68cc41889e509793a6cb272d306320e2e4a28d71bfdab809f3bbb6

  • SHA512

    e5cc9c937c5b36ed2ad00feb692b9fcdc958625913940bf0e79209b6885b2188bf7a0e17342fefaeef7660efa1f9da4c5dca6ccfe72480798bd07ca7baf527c3

  • SSDEEP

    12288:/Mrmy904xrXYpJ+xvQ7AdZr1Wof5K/a/4mc0YDz8dEkJ6kP:5yVDFQ0dZr1/ADmEcdfJ6w

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90fc8d78dc68cc41889e509793a6cb272d306320e2e4a28d71bfdab809f3bbb6.exe
    "C:\Users\Admin\AppData\Local\Temp\90fc8d78dc68cc41889e509793a6cb272d306320e2e4a28d71bfdab809f3bbb6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un421423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un421423.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1792.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1792.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1080
          4⤵
          • Program crash
          PID:2284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6699.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2936
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 4948
    1⤵
      PID:4212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un421423.exe

      Filesize

      518KB

      MD5

      2defa5f90926b90a3bef5b19636108a0

      SHA1

      824f5f5093236c5fb4fc498a5dfc0d68f7d2ff3e

      SHA256

      7ad609ff34da297cb4ac9869c17acaa70462d6df925de5729207b2ae748b5add

      SHA512

      f887eca1dc116209e7f40ec15edc585c46253bea3fcb31e4ec19a3fe20302464894117d46eda945fdf407e459b7120f009499ccd920092218cdeea8b22fc6e4b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1792.exe

      Filesize

      376KB

      MD5

      b1062c3e088824867ee4d5a12047be4b

      SHA1

      9ab0ee12d099947909c9df98494a570480bf936a

      SHA256

      e1354ba5afae6cca21bb144d34ca369a5c5b4adb887fbf264065e7c90c5f5ac4

      SHA512

      dd7bdd17eaa46f81c04d5b5bc66231ef721571c2f2d54dd71208025ccd2c160bb152d0597c1e70b3645c4975e8eabdbf4d97c636211b3c09458117ce889e826d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6699.exe

      Filesize

      434KB

      MD5

      501eccf7714c1ce2daf961551e349759

      SHA1

      e43978c23e8eca2a3274a94e3470fbbc87ea8670

      SHA256

      cd329dec3f5cca99af408dcaa80abe8443e6498c0c1cfeb139d2a05b535a8bd2

      SHA512

      5a80f145375b1c5996b1faa6a2578ea59c1dc57f863ff79d9dd5d46493322925cd4d7ca0eff72809955291543e7f71560442a919b5f4f104f2af52c30640d7d3

    • memory/2936-76-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-80-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-970-0x00000000059D0000-0x0000000005ADA000-memory.dmp

      Filesize

      1.0MB

    • memory/2936-969-0x0000000005330000-0x0000000005948000-memory.dmp

      Filesize

      6.1MB

    • memory/2936-63-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-64-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-66-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-68-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-70-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-72-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-972-0x0000000005B30000-0x0000000005B6C000-memory.dmp

      Filesize

      240KB

    • memory/2936-973-0x0000000005C80000-0x0000000005CCC000-memory.dmp

      Filesize

      304KB

    • memory/2936-78-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-971-0x0000000005B10000-0x0000000005B22000-memory.dmp

      Filesize

      72KB

    • memory/2936-82-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-84-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-86-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-88-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-90-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-92-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-94-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-96-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-74-0x0000000004BC0000-0x0000000004BFF000-memory.dmp

      Filesize

      252KB

    • memory/2936-62-0x0000000004BC0000-0x0000000004C04000-memory.dmp

      Filesize

      272KB

    • memory/2936-61-0x0000000002450000-0x0000000002496000-memory.dmp

      Filesize

      280KB

    • memory/4948-41-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4948-55-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4948-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4948-51-0x0000000000700000-0x000000000072D000-memory.dmp

      Filesize

      180KB

    • memory/4948-50-0x00000000009A0000-0x0000000000AA0000-memory.dmp

      Filesize

      1024KB

    • memory/4948-22-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-25-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-23-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-27-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-29-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-31-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-33-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-35-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-37-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-39-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-43-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-45-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-47-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-49-0x00000000024A0000-0x00000000024B2000-memory.dmp

      Filesize

      72KB

    • memory/4948-21-0x00000000024A0000-0x00000000024B8000-memory.dmp

      Filesize

      96KB

    • memory/4948-20-0x0000000004D00000-0x00000000052A4000-memory.dmp

      Filesize

      5.6MB

    • memory/4948-19-0x0000000002440000-0x000000000245A000-memory.dmp

      Filesize

      104KB

    • memory/4948-18-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4948-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4948-16-0x0000000000700000-0x000000000072D000-memory.dmp

      Filesize

      180KB

    • memory/4948-15-0x00000000009A0000-0x0000000000AA0000-memory.dmp

      Filesize

      1024KB