Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 09:17

General

  • Target

    84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe

  • Size

    673KB

  • MD5

    20c84a2d204e9c02bf5b28ff19b6bda1

  • SHA1

    ca955a870caa72f5288496328264bd143deb1ae1

  • SHA256

    84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a

  • SHA512

    716e89e11b7f938780b14939930fcd0403113ccc2d0352569c02ac2f6bcb58cf0e9e0f747ab5b53768183a2ceba165e101acf42336f3bf84780299c8e29d2867

  • SSDEEP

    12288:CMrUy90EMSFA5UyGRzDlcQE2+evLm3DXooNiVbuW7ssGQr2:SyZMS62zDaN2Xa3DxNi5uEMj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe
    "C:\Users\Admin\AppData\Local\Temp\84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282582.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282582.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1446.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1446.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 1108
          4⤵
          • Program crash
          PID:3592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3423.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2144 -ip 2144
    1⤵
      PID:1124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282582.exe

      Filesize

      531KB

      MD5

      772ea787d1957a9feb0e75d5a80b965c

      SHA1

      c43cf1457552d547a60f90339228b89ff2bedff3

      SHA256

      54b2c138872298673e841ca89857f7fc0029fce2c6b30df1b8d48af3ae3777a3

      SHA512

      21c146ad9936698c7468ffc40a54a7779af454328fb8386b829dd91be07d5d8bd30e07c37d0aedd5fd25c422fd9e929bcda374e7f845e78454b3517d6a5f285a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1446.exe

      Filesize

      260KB

      MD5

      140b82d5e43afc7e28b2e9330f1b70e1

      SHA1

      d4527e94667f276216bee385d2ecc711ee6b0713

      SHA256

      739d959edf5bfd72c73f1204d3feb3df36bee3fbedf074932ebc055117b5cdf0

      SHA512

      b9f08138e4e29ae79cf51702b2bc66bbf22fbb2b90592077e3d0ccc4db55f63970bef24f8fede610b3c722efdeab5aeadb8b938d7fa0f857e3e3b2d164cc15aa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3423.exe

      Filesize

      319KB

      MD5

      db1a6f303f33be70a8878700c6d42381

      SHA1

      3c5aa7bb9a61f78e945959781781b663e9ee4f9e

      SHA256

      cb5f33d1e4b20973a3a75133e32525b297a506f315c072323724958e3c36d80b

      SHA512

      786ef287206d8bab1cee7da002881cf9b4abe4a7c53bed808a5896202b90c1f390c72641bb2c40266a9b09f5d1cc18f11c8d3155ac88743b5ec2699e88826756

    • memory/1052-71-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-75-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-969-0x0000000005820000-0x000000000592A000-memory.dmp

      Filesize

      1.0MB

    • memory/1052-968-0x0000000005200000-0x0000000005818000-memory.dmp

      Filesize

      6.1MB

    • memory/1052-62-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-63-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-65-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-67-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-89-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-69-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-971-0x0000000004C00000-0x0000000004C3C000-memory.dmp

      Filesize

      240KB

    • memory/1052-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/1052-73-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-970-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

      Filesize

      72KB

    • memory/1052-79-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-81-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-87-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-91-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-93-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-95-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-83-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-85-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-77-0x0000000002740000-0x000000000277F000-memory.dmp

      Filesize

      252KB

    • memory/1052-61-0x0000000002740000-0x0000000002784000-memory.dmp

      Filesize

      272KB

    • memory/1052-60-0x0000000002570000-0x00000000025B6000-memory.dmp

      Filesize

      280KB

    • memory/2144-39-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2144-54-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2144-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2144-50-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2144-22-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-23-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-25-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-27-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-29-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-31-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-33-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-35-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-37-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-49-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-41-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-43-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-46-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-47-0x0000000002500000-0x0000000002512000-memory.dmp

      Filesize

      72KB

    • memory/2144-21-0x0000000002500000-0x0000000002518000-memory.dmp

      Filesize

      96KB

    • memory/2144-20-0x0000000004B10000-0x00000000050B4000-memory.dmp

      Filesize

      5.6MB

    • memory/2144-19-0x00000000023B0000-0x00000000023CA000-memory.dmp

      Filesize

      104KB

    • memory/2144-18-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2144-16-0x0000000000640000-0x000000000066D000-memory.dmp

      Filesize

      180KB

    • memory/2144-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2144-15-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB