Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 23:19

General

  • Target

    4f1946169b20d0778a0d7e12ee803f985be063557423285c0b99a4293e71592d.exe

  • Size

    675KB

  • MD5

    74498dcaeb8b95b577bd43b78732e72d

  • SHA1

    95a753ef04dea4daefbb4337cec082faa6b56d36

  • SHA256

    4f1946169b20d0778a0d7e12ee803f985be063557423285c0b99a4293e71592d

  • SHA512

    2bcc3b9c6425ba0efb97be2a2909e6ab6f58e6e825f26821fb15a834eea5776cf960af2c1aa375ec829e6649c2377bdef3dc4694eee020e1b7a5fb0cd6cc9199

  • SSDEEP

    12288:kMrKy90G/A7L+ZIF/n0Q4kljuJ7excZuOuXe42Oq4MxdsPB:WyZAp0CuH/X42OqIB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f1946169b20d0778a0d7e12ee803f985be063557423285c0b99a4293e71592d.exe
    "C:\Users\Admin\AppData\Local\Temp\4f1946169b20d0778a0d7e12ee803f985be063557423285c0b99a4293e71592d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3674.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3674.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 1084
          4⤵
          • Program crash
          PID:2164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0658.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0658.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1680 -ip 1680
    1⤵
      PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386227.exe

      Filesize

      533KB

      MD5

      f718534e12e5f31dbd614c12250f29ed

      SHA1

      5989ebc3bdd991c7309ea8498a71752f0ac167f8

      SHA256

      79222e9f6be17ef258c87f4ab5d428cfc3c04b7214d63454547e8ef69f5ce74b

      SHA512

      142d13fc945e590abbbaea36ac5f8af5ab2510a793572676ccc503a0e2901c826e4283180f5f1cc57ca5da8a42758eb8477fbe8f936c14062b157f021f540c00

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3674.exe

      Filesize

      376KB

      MD5

      8893736bff361f489f59dde0c4cbe2db

      SHA1

      9db35f9c2acd8fd20ec1d1205ac09b719987e234

      SHA256

      a502b66792a76934e1eacda7b626fe6e689977646189171b983828da6aa6809e

      SHA512

      e413fe104e6cfa82ffab7461e22d2783bc14cab1ea55903dcf3aae7edd31772bbbd3b228341f17b498f6ad8249e79dad518e570bbf86a0e3fafb84e36da73331

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0658.exe

      Filesize

      435KB

      MD5

      05ec6fa5802b9ea9a624f393a6e3ef5e

      SHA1

      83df0432ff36470511ce3116d7d974f8154a2b6a

      SHA256

      8793cc2427ff701ecba68bc33aabad48ce891ae43fbc9170244ed19a5f74da84

      SHA512

      a7c51c3d9c4645a27940c6f69eb681697042b2252983305faa95d3bdc232c0ad69f21253bc533fe1355f150cff20e71daab19fe031d91f3b5e11a8968d2dac7c

    • memory/1680-15-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/1680-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-16-0x0000000000720000-0x000000000074D000-memory.dmp

      Filesize

      180KB

    • memory/1680-18-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/1680-19-0x0000000002400000-0x000000000241A000-memory.dmp

      Filesize

      104KB

    • memory/1680-20-0x0000000004E70000-0x0000000005414000-memory.dmp

      Filesize

      5.6MB

    • memory/1680-21-0x0000000002650000-0x0000000002668000-memory.dmp

      Filesize

      96KB

    • memory/1680-38-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-47-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-45-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-43-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-49-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-41-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-40-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-35-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-33-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-31-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-29-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-27-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-25-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-23-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-22-0x0000000002650000-0x0000000002662000-memory.dmp

      Filesize

      72KB

    • memory/1680-50-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/1680-51-0x0000000000720000-0x000000000074D000-memory.dmp

      Filesize

      180KB

    • memory/1680-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-55-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/2976-61-0x00000000043B0000-0x00000000043F6000-memory.dmp

      Filesize

      280KB

    • memory/2976-62-0x0000000006EC0000-0x0000000006F04000-memory.dmp

      Filesize

      272KB

    • memory/2976-68-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-78-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-96-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-94-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-92-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-90-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-88-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-86-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-82-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-80-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-76-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-74-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-72-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-70-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-84-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-66-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-64-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-63-0x0000000006EC0000-0x0000000006EFF000-memory.dmp

      Filesize

      252KB

    • memory/2976-969-0x0000000006F10000-0x0000000007528000-memory.dmp

      Filesize

      6.1MB

    • memory/2976-970-0x00000000075B0000-0x00000000076BA000-memory.dmp

      Filesize

      1.0MB

    • memory/2976-971-0x00000000076F0000-0x0000000007702000-memory.dmp

      Filesize

      72KB

    • memory/2976-972-0x0000000007710000-0x000000000774C000-memory.dmp

      Filesize

      240KB

    • memory/2976-973-0x0000000007860000-0x00000000078AC000-memory.dmp

      Filesize

      304KB