Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 09:39

General

  • Target

    e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f.exe

  • Size

    658KB

  • MD5

    b972d05fd992c174e476b8723e781a8e

  • SHA1

    60aa9b76dc5e9a8bc273452ef9977b8ddb1034c3

  • SHA256

    e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f

  • SHA512

    eaec185e2e0a0c20c16af734c72dc651de4ee668f5d9dce16b597bdc44eab55b62c085585ab054006ba0335f78b6c316cb969eb58e007df48020d74a0627a1de

  • SSDEEP

    12288:oMr1y90W92NdeiJxcuCPMYNMYtiJTPBJvIT8Lt8CBSs49446zWKl18vWkAHsT8:tyL9eeRuYNMYtq9Jvw8h/N4e4DK46N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f.exe
    "C:\Users\Admin\AppData\Local\Temp\e55a6d622d3761170f0fa21a7dd70f7859c4a069d179dee0eb5b969b5733b92f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853563.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853563.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7579.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7579.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 1100
          4⤵
          • Program crash
          PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5278.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5278.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4180 -ip 4180
    1⤵
      PID:840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853563.exe

      Filesize

      516KB

      MD5

      ef7c997c29d64ab0a5be81e93cd39af0

      SHA1

      a1a85d57f695747b411f4d49b8fa8aa7f816c0ab

      SHA256

      4d84d14524a1b8cf5dccb2e24932ff27a4813d646166c5e17592bedcc96c1d0b

      SHA512

      c1f9a92b1ad6dafd3711bdacbf8ea489bf6c0d5079278c9eb4e264f9775367b213c68ebc5935c5c49ed40b77a299b4f1985865afadfe7c72fcb270eeadcc0087

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7579.exe

      Filesize

      235KB

      MD5

      022f2124248d228c638305001f4c486d

      SHA1

      fd95ba08246ebfea5329ed20f40b9ff22d929450

      SHA256

      f9ea74c98f85d4a3ed5e5189046263d1217de9f35ef2f86e8fbbe472b3d1729b

      SHA512

      6fc5df95fccf2c4ac853f8bd855faa259295464a857f0af3490cafdac1e312d0fff776974f1ccb16d95de9359f48436a55c7e1834a0e88bc0ba9aaa7c447dc9b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5278.exe

      Filesize

      294KB

      MD5

      f2eb5525b9068eb5be3be127530e4b59

      SHA1

      c0e0a910828d0938bfeadc5014be013bf131d0c4

      SHA256

      d974e043f73c10cf0fd7727194945912d1cbd18d9e572721a9f8339e1573f322

      SHA512

      2937b7492b11936a8057bfc9f0ab0dcd01ea5e5cdd797bc04c11e2e0be1979b86261429f2738c7e91eff8976a3d6ca93a95036d1305b96f98ef5d8aff7c4dd95

    • memory/4180-15-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/4180-17-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4180-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4180-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4180-19-0x00000000025F0000-0x000000000260A000-memory.dmp

      Filesize

      104KB

    • memory/4180-20-0x0000000004C90000-0x0000000005234000-memory.dmp

      Filesize

      5.6MB

    • memory/4180-21-0x0000000004B80000-0x0000000004B98000-memory.dmp

      Filesize

      96KB

    • memory/4180-33-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-49-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-47-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-45-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-43-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-41-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-39-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-37-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-35-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-29-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-27-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-25-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-23-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-22-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-31-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4180-50-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/4180-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4180-54-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4180-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4244-60-0x00000000023E0000-0x0000000002426000-memory.dmp

      Filesize

      280KB

    • memory/4244-61-0x0000000002640000-0x0000000002684000-memory.dmp

      Filesize

      272KB

    • memory/4244-65-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-71-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-69-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-67-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-89-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-73-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-63-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-62-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-95-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-93-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-91-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-87-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-85-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-83-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-81-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-79-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-77-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-75-0x0000000002640000-0x000000000267F000-memory.dmp

      Filesize

      252KB

    • memory/4244-968-0x0000000005250000-0x0000000005868000-memory.dmp

      Filesize

      6.1MB

    • memory/4244-969-0x0000000005870000-0x000000000597A000-memory.dmp

      Filesize

      1.0MB

    • memory/4244-970-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

      Filesize

      72KB

    • memory/4244-971-0x0000000004C00000-0x0000000004C3C000-memory.dmp

      Filesize

      240KB

    • memory/4244-972-0x0000000005A80000-0x0000000005ACC000-memory.dmp

      Filesize

      304KB