Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 22:58

General

  • Target

    6ac8403b2a50486af460bf68075d707f2a0c5be6e4e181d4af7b17411cf1cb69.exe

  • Size

    659KB

  • MD5

    1a481ef2fd43a06ba9b66fedc7caa015

  • SHA1

    23107057f21dfb2e1f808797f18b137aa21b3607

  • SHA256

    6ac8403b2a50486af460bf68075d707f2a0c5be6e4e181d4af7b17411cf1cb69

  • SHA512

    f1800f1e5336ad18aa3de75ae8c018b0d7471f581811a27663c198e608d7414dde5da619253f3f261ccf092d1ffb33d3e84a3b4fc5317837e51cab65bf75b0f2

  • SSDEEP

    12288:rMroy90z0+YKrIKz0gPVnazmIt597rw7VjCleUft/juynzbuCm:zyJUUKgyKmIt5FYVelFBfHC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac8403b2a50486af460bf68075d707f2a0c5be6e4e181d4af7b17411cf1cb69.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac8403b2a50486af460bf68075d707f2a0c5be6e4e181d4af7b17411cf1cb69.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806287.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806287.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0960.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0960.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 1020
          4⤵
          • Program crash
          PID:2836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1380.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1380.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1576
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 548 -ip 548
    1⤵
      PID:4572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806287.exe

      Filesize

      517KB

      MD5

      4421c0ddacf18c8c9502b305bc43cfac

      SHA1

      4d8e171089cc3a581049f4f795814b5704f002a5

      SHA256

      5988e996757a2a38414d43cd3195656aa7d6a3a703fbc57febabd0c2866acc01

      SHA512

      b9d87890df7e3f81be5a7d36245307171dcc4ca1a0bfe05d8d4fd9b074aa7a25524c2f75b57932530b616001f6224943361628c1e61680308d16330dc2e4b4dc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0960.exe

      Filesize

      237KB

      MD5

      4c6259e56777c352c62fe5d314a5dafe

      SHA1

      37e1c20a08ca10d84e51d25886a035ef28a8d6d9

      SHA256

      0a46b7a0041298832a685e6b0d7d95ef23ca23f8627c6b0da00a09120f735e68

      SHA512

      28a785a5cf11dcc0ada7e8df3fc12c71cc7f03fcb4b4f6c9b2f0c6bd9ab3d09dea859bc6e12e0af8615bd944d5e17d48e68db9aedc2c277e4311f8e94548f09b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1380.exe

      Filesize

      295KB

      MD5

      c6e4ecf146e38c932c80eed7ad962626

      SHA1

      d210a35aaaf712283f98b5b1931da5be5ed6668f

      SHA256

      1aa172aae359af42c1417591f1cfc95f53ae342186038d9d04ad46a32f77b292

      SHA512

      3588d2388d683e5f13ca79b7994e72494f84aab94ead21f1378efe4db471018f8c46d61ebd69fbb9ced542487df70ba68abe8fb01073e765e23234ff69e5214a

    • memory/548-17-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/548-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/548-15-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/548-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/548-19-0x00000000007E0000-0x00000000007FA000-memory.dmp

      Filesize

      104KB

    • memory/548-20-0x0000000004B20000-0x00000000050C4000-memory.dmp

      Filesize

      5.6MB

    • memory/548-21-0x00000000023E0000-0x00000000023F8000-memory.dmp

      Filesize

      96KB

    • memory/548-22-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-29-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-49-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-47-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-46-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-43-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-41-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-39-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-38-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-35-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-34-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-31-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-27-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-25-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-23-0x00000000023E0000-0x00000000023F2000-memory.dmp

      Filesize

      72KB

    • memory/548-50-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/548-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/548-54-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/548-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1576-60-0x0000000002500000-0x0000000002546000-memory.dmp

      Filesize

      280KB

    • memory/1576-61-0x00000000025A0000-0x00000000025E4000-memory.dmp

      Filesize

      272KB

    • memory/1576-65-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-71-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-69-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-67-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-75-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-63-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-62-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-95-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-93-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-92-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-89-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-87-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-85-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-83-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-81-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-79-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-77-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-73-0x00000000025A0000-0x00000000025DF000-memory.dmp

      Filesize

      252KB

    • memory/1576-968-0x00000000050F0000-0x0000000005708000-memory.dmp

      Filesize

      6.1MB

    • memory/1576-969-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/1576-970-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/1576-971-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/1576-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB