Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 23:44

General

  • Target

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe

  • Size

    658KB

  • MD5

    a219bc4df317db3efba5ecb2f7506b1e

  • SHA1

    95912cba1d89b0e587f5fc4e5b16d7c3000a7050

  • SHA256

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae

  • SHA512

    726226a572240ffc81beab7c433f0579ccc35172dee3ac9ca719b9c94dd43e02bddca8575ece0fb806a0e33a4241f0f0393c23293e55756b3f9413ecd04db1f1

  • SSDEEP

    12288:SMr0y905H0h3k026S3rkxtLbEmtwL+a8TypDbczhpLt8FyHdM344QzWKOr8vD0Z3:yy8UU02PsEmtwyaLuhphr9Mo4ZKO3h

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1084
          4⤵
          • Program crash
          PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3272
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5016 -ip 5016
    1⤵
      PID:2792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe

      Filesize

      516KB

      MD5

      94c577a369c0d428e5da328827bb08be

      SHA1

      1c3a732c9ad3989271518f1b8e0d99a2f3384bf4

      SHA256

      7350ab20455eb2aa0d7843d5e895d129891f820eff981302cfe6d8de88edb8ff

      SHA512

      24fc83828450bb71e0a85f1856195f5b5f86a4cdd2b341b01783ad0627974b71490fc4d39ef3ea0783d9957a46e47ab1a25e3cf5968a9aa663e2a7aee12171df

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe

      Filesize

      235KB

      MD5

      03ad908afdb8344b2a61303bdf34d980

      SHA1

      2de81e920d61118d9fb1845891fa102683c4f808

      SHA256

      c20c58c59cff3d8c3a88fc5382d5ea6ee14022360c2ec41e543094d9775371d2

      SHA512

      361521e2ac5d880160849dd50affb8e93df6cf37814a247729f7c7558a5e61481968cf1484cb10da56a99859a6dbac45dbd99401d172b636df8b6e79dc579ade

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe

      Filesize

      294KB

      MD5

      ec486b53e4f67e7ea0bd2d5ef190401e

      SHA1

      1c5db35b5535388ca2d6fa86a2b57beea4f7858c

      SHA256

      5cf1087d6cb3a895f0068a4ca1bdbb2380213b4b370901ea04375d6cf2c98587

      SHA512

      5ea3923f4daca2eea513647654a48d09382abc8c4a01abd6fbc606fb49697f59b366e06c799444a534a5b9bf90f6f901e02ae485881bf807284c81a2a85b3fed

    • memory/3272-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-970-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/3272-969-0x00000000050F0000-0x0000000005708000-memory.dmp

      Filesize

      6.1MB

    • memory/3272-63-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-76-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-972-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/3272-973-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/3272-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-971-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/3272-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-90-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-93-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-94-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-96-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp

      Filesize

      252KB

    • memory/3272-62-0x0000000004A90000-0x0000000004AD4000-memory.dmp

      Filesize

      272KB

    • memory/3272-61-0x0000000004A00000-0x0000000004A46000-memory.dmp

      Filesize

      280KB

    • memory/5016-41-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5016-55-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/5016-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5016-51-0x0000000000530000-0x000000000055D000-memory.dmp

      Filesize

      180KB

    • memory/5016-50-0x0000000000680000-0x0000000000780000-memory.dmp

      Filesize

      1024KB

    • memory/5016-22-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-23-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-25-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-27-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-29-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-31-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-34-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-35-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-37-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-39-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-43-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-45-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-48-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-49-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/5016-21-0x0000000005150000-0x0000000005168000-memory.dmp

      Filesize

      96KB

    • memory/5016-20-0x0000000004BA0000-0x0000000005144000-memory.dmp

      Filesize

      5.6MB

    • memory/5016-19-0x0000000004B10000-0x0000000004B2A000-memory.dmp

      Filesize

      104KB

    • memory/5016-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/5016-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5016-16-0x0000000000530000-0x000000000055D000-memory.dmp

      Filesize

      180KB

    • memory/5016-15-0x0000000000680000-0x0000000000780000-memory.dmp

      Filesize

      1024KB