Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 23:39

General

  • Target

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe

  • Size

    658KB

  • MD5

    a219bc4df317db3efba5ecb2f7506b1e

  • SHA1

    95912cba1d89b0e587f5fc4e5b16d7c3000a7050

  • SHA256

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae

  • SHA512

    726226a572240ffc81beab7c433f0579ccc35172dee3ac9ca719b9c94dd43e02bddca8575ece0fb806a0e33a4241f0f0393c23293e55756b3f9413ecd04db1f1

  • SSDEEP

    12288:SMr0y905H0h3k026S3rkxtLbEmtwL+a8TypDbczhpLt8FyHdM344QzWKOr8vD0Z3:yy8UU02PsEmtwyaLuhphr9Mo4ZKO3h

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 1088
          4⤵
          • Program crash
          PID:3268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2448 -ip 2448
    1⤵
      PID:1536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe

      Filesize

      516KB

      MD5

      94c577a369c0d428e5da328827bb08be

      SHA1

      1c3a732c9ad3989271518f1b8e0d99a2f3384bf4

      SHA256

      7350ab20455eb2aa0d7843d5e895d129891f820eff981302cfe6d8de88edb8ff

      SHA512

      24fc83828450bb71e0a85f1856195f5b5f86a4cdd2b341b01783ad0627974b71490fc4d39ef3ea0783d9957a46e47ab1a25e3cf5968a9aa663e2a7aee12171df

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe

      Filesize

      235KB

      MD5

      03ad908afdb8344b2a61303bdf34d980

      SHA1

      2de81e920d61118d9fb1845891fa102683c4f808

      SHA256

      c20c58c59cff3d8c3a88fc5382d5ea6ee14022360c2ec41e543094d9775371d2

      SHA512

      361521e2ac5d880160849dd50affb8e93df6cf37814a247729f7c7558a5e61481968cf1484cb10da56a99859a6dbac45dbd99401d172b636df8b6e79dc579ade

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe

      Filesize

      294KB

      MD5

      ec486b53e4f67e7ea0bd2d5ef190401e

      SHA1

      1c5db35b5535388ca2d6fa86a2b57beea4f7858c

      SHA256

      5cf1087d6cb3a895f0068a4ca1bdbb2380213b4b370901ea04375d6cf2c98587

      SHA512

      5ea3923f4daca2eea513647654a48d09382abc8c4a01abd6fbc606fb49697f59b366e06c799444a534a5b9bf90f6f901e02ae485881bf807284c81a2a85b3fed

    • memory/852-84-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-78-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-970-0x0000000005890000-0x000000000599A000-memory.dmp

      Filesize

      1.0MB

    • memory/852-969-0x0000000005270000-0x0000000005888000-memory.dmp

      Filesize

      6.1MB

    • memory/852-63-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-64-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-66-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-68-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-70-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-72-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-972-0x00000000028D0000-0x000000000290C000-memory.dmp

      Filesize

      240KB

    • memory/852-973-0x0000000002910000-0x000000000295C000-memory.dmp

      Filesize

      304KB

    • memory/852-96-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-971-0x00000000028B0000-0x00000000028C2000-memory.dmp

      Filesize

      72KB

    • memory/852-80-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-82-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-86-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-88-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-90-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-92-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-94-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-76-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-74-0x0000000002420000-0x000000000245F000-memory.dmp

      Filesize

      252KB

    • memory/852-62-0x0000000002420000-0x0000000002464000-memory.dmp

      Filesize

      272KB

    • memory/852-61-0x0000000002360000-0x00000000023A6000-memory.dmp

      Filesize

      280KB

    • memory/2448-42-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-55-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2448-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2448-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2448-51-0x00000000005C0000-0x00000000005ED000-memory.dmp

      Filesize

      180KB

    • memory/2448-50-0x00000000006D0000-0x00000000007D0000-memory.dmp

      Filesize

      1024KB

    • memory/2448-23-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-25-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-27-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-29-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-31-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-33-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-35-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-37-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-39-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-22-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-43-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-46-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-47-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-49-0x0000000002620000-0x0000000002632000-memory.dmp

      Filesize

      72KB

    • memory/2448-21-0x0000000002620000-0x0000000002638000-memory.dmp

      Filesize

      96KB

    • memory/2448-20-0x0000000004CB0000-0x0000000005254000-memory.dmp

      Filesize

      5.6MB

    • memory/2448-19-0x0000000002390000-0x00000000023AA000-memory.dmp

      Filesize

      104KB

    • memory/2448-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/2448-16-0x00000000005C0000-0x00000000005ED000-memory.dmp

      Filesize

      180KB

    • memory/2448-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2448-15-0x00000000006D0000-0x00000000007D0000-memory.dmp

      Filesize

      1024KB