Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 23:01

General

  • Target

    98edd112c994fdbbd4c7d5436721d5964674872ea12bdbc40e590fb4e29efad1.exe

  • Size

    665KB

  • MD5

    c98dbbb6450cee37e8ef7757cf426a64

  • SHA1

    60cb802ddc36ee30248259ae7a6f71468fed456a

  • SHA256

    98edd112c994fdbbd4c7d5436721d5964674872ea12bdbc40e590fb4e29efad1

  • SHA512

    993137f01b619106b8bdcd277230959d4102d28ad1d6614c30715a2909a50aab1bbf90cb5f1072b7fff385426df2074c2722bba3c6798272e3eb9ff93f8025d8

  • SSDEEP

    12288:hMr6y90238wqbrlNd9P32XMldU7k+OFUtFNGblNv4LJS78Yjq:XyN38nlN/f2XMHU7wU7NGb4sgYu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98edd112c994fdbbd4c7d5436721d5964674872ea12bdbc40e590fb4e29efad1.exe
    "C:\Users\Admin\AppData\Local\Temp\98edd112c994fdbbd4c7d5436721d5964674872ea12bdbc40e590fb4e29efad1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un053446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un053446.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6187.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 1084
          4⤵
          • Program crash
          PID:4264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6262.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6262.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4388 -ip 4388
    1⤵
      PID:740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un053446.exe

      Filesize

      523KB

      MD5

      911313388a5d6d065bddd09fb7b51384

      SHA1

      da327db19bfacc5cbee2dd7ff68ba1b336451418

      SHA256

      cc59a9943a9b3566a4185cc918dcfe238f252d7fcdcfb53c79f13da7e2ac4c20

      SHA512

      620ef728aef5e84aafd1f855d39d40bb91ec8d0690bb22c2a039b3404cf01b46da30a803b1ca2a260681e925f0f15d536e378d9df76447dfd2af799d71e68b7b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6187.exe

      Filesize

      294KB

      MD5

      4af4cf587d0b8af7d918f3fffb28a3dc

      SHA1

      718a96ff5b19964508ac6bc06c748af859c59aac

      SHA256

      d69b97d81cf42a85cea26085f28acdaa75d6e739e8fe6b23e5e78787679e9079

      SHA512

      c696fa5e9e53381482d4425b4b53f9ac927e66bc03fcf71b26714c355d79868ec1e151d096500c02a06bd080c282db6c345f8dbed41af49b5e07bb1ed825443b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6262.exe

      Filesize

      353KB

      MD5

      192fa019d6addff2ffa24b811cd209d7

      SHA1

      d5a559cac2085db95fc7641f7c68fb7aab756b3f

      SHA256

      9c3e32f1325517d0811fbff3bd0d04da7d1896fded1677a5f285f46342364993

      SHA512

      fdc6d319bb48fe59698c4132dddb6fe9cab7d1bf4dc36a317c0574daf8334f0839bdffdd7ee3fe45c432f095ebb76d4e5cb367add6e0fe3015a1368a873ecaed

    • memory/4132-68-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-72-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-970-0x0000000004F00000-0x000000000500A000-memory.dmp

      Filesize

      1.0MB

    • memory/4132-969-0x0000000005620000-0x0000000005C38000-memory.dmp

      Filesize

      6.1MB

    • memory/4132-90-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-92-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-94-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-96-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-64-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-66-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-972-0x0000000005C40000-0x0000000005C7C000-memory.dmp

      Filesize

      240KB

    • memory/4132-973-0x0000000005D90000-0x0000000005DDC000-memory.dmp

      Filesize

      304KB

    • memory/4132-70-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-971-0x0000000005040000-0x0000000005052000-memory.dmp

      Filesize

      72KB

    • memory/4132-76-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-78-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-80-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-82-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-85-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-86-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-89-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-74-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-63-0x0000000002910000-0x000000000294F000-memory.dmp

      Filesize

      252KB

    • memory/4132-62-0x0000000002910000-0x0000000002954000-memory.dmp

      Filesize

      272KB

    • memory/4132-61-0x0000000002710000-0x0000000002756000-memory.dmp

      Filesize

      280KB

    • memory/4388-43-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4388-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4388-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4388-51-0x0000000000AB0000-0x0000000000ADD000-memory.dmp

      Filesize

      180KB

    • memory/4388-50-0x0000000000B50000-0x0000000000C50000-memory.dmp

      Filesize

      1024KB

    • memory/4388-22-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-23-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-25-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-27-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-29-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-31-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-33-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-35-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-37-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-41-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-45-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-47-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-49-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-39-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

      Filesize

      72KB

    • memory/4388-21-0x0000000004DA0000-0x0000000004DB8000-memory.dmp

      Filesize

      96KB

    • memory/4388-20-0x0000000004EE0000-0x0000000005484000-memory.dmp

      Filesize

      5.6MB

    • memory/4388-19-0x0000000002660000-0x000000000267A000-memory.dmp

      Filesize

      104KB

    • memory/4388-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4388-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4388-16-0x0000000000AB0000-0x0000000000ADD000-memory.dmp

      Filesize

      180KB

    • memory/4388-15-0x0000000000B50000-0x0000000000C50000-memory.dmp

      Filesize

      1024KB