Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 11:33

General

  • Target

    c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe

  • Size

    660KB

  • MD5

    fa0b27c89e82d2252bdb78ca09ec6528

  • SHA1

    2dd932bb822e49759d91f0348701e0e48f36b0e1

  • SHA256

    c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb

  • SHA512

    d6be8bd9a770272402c114f9221811ac8c82b8f024199e19b7af421ae794b9199421b5ca654b5fb05c0124a2d3b0b68152c714e8d8822f768fe5a07f7b287aa8

  • SSDEEP

    12288:GMriy90dltTfl5ESzstivbRyL3PAWQ5JCX5JnD63K90fs3rLiiiraWPWBYNSE8Cr:wy4/ESOgyL3pQ5IVD669Gs36iir5vNT9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe
    "C:\Users\Admin\AppData\Local\Temp\c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204051.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0905.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 1084
          4⤵
          • Program crash
          PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8921.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4952 -ip 4952
    1⤵
      PID:1712
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204051.exe

      Filesize

      518KB

      MD5

      e8ad577690873209550adfc4f7fbb08b

      SHA1

      58babf20b357d251adb1ed8179ba18fb5b7ff5e5

      SHA256

      2133803361cdc785e77eb12a86a5816483f80585eada07f785cedf751676a9da

      SHA512

      758cb11ecc49d41298a215c1c42e01759f56fd196d5175d77db16fd75026fd6261f9c3ffe380dc62d3511c2d6d0f22ec69c6531bd3308aa87f08ae8687036adf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0905.exe

      Filesize

      236KB

      MD5

      c6e2dfd13feea5544582422b27f4dc60

      SHA1

      e6452f9f426c76b36ef11b34d6629b1edc34d58e

      SHA256

      a02d760962fa62b2131c40e194cb237f3289855c5bb17d6f0c8a8aaacadc0678

      SHA512

      761cd98a02f5118d81c68a928775be652176bb2ea3a48d71c52ffb08018135a1dcbdeb22d79f89d2f32fcb2fe32128b61433dd43c1ed274379ccab7b36f652f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8921.exe

      Filesize

      295KB

      MD5

      b567c3e1332e8954f9df8fdad31d8434

      SHA1

      80f6afb0f61802d2df2273e19e8fd50b5bbf042f

      SHA256

      a56eeb8a0d783045350a6f3551c532dbd1226f2a2016ff094b5e7167ac75d33c

      SHA512

      4695b582a947f3f2aeb554e2895dbb5e8c6fec7224850b0f4f21d6f8dd52437adf8123fe05d84c6dadba850a3b69bdfc1a14631b32490111be7e8e523e8c963c

    • memory/2328-72-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-76-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-970-0x0000000004BB0000-0x0000000004CBA000-memory.dmp

      Filesize

      1.0MB

    • memory/2328-969-0x00000000052C0000-0x00000000058D8000-memory.dmp

      Filesize

      6.1MB

    • memory/2328-63-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-64-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-66-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-68-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-88-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-70-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-972-0x0000000005900000-0x000000000593C000-memory.dmp

      Filesize

      240KB

    • memory/2328-973-0x0000000005A80000-0x0000000005ACC000-memory.dmp

      Filesize

      304KB

    • memory/2328-74-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-971-0x00000000058E0000-0x00000000058F2000-memory.dmp

      Filesize

      72KB

    • memory/2328-80-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-82-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-84-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-90-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-92-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-94-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-96-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-86-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-78-0x0000000002750000-0x000000000278F000-memory.dmp

      Filesize

      252KB

    • memory/2328-62-0x0000000002750000-0x0000000002794000-memory.dmp

      Filesize

      272KB

    • memory/2328-61-0x00000000026D0000-0x0000000002716000-memory.dmp

      Filesize

      280KB

    • memory/4952-43-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-55-0x0000000000400000-0x00000000004AA000-memory.dmp

      Filesize

      680KB

    • memory/4952-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4952-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4952-51-0x0000000000600000-0x000000000062D000-memory.dmp

      Filesize

      180KB

    • memory/4952-50-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/4952-22-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-23-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-37-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-25-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-27-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-29-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-31-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-33-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-35-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-41-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-45-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-47-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-49-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-39-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/4952-21-0x0000000004B80000-0x0000000004B98000-memory.dmp

      Filesize

      96KB

    • memory/4952-20-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/4952-19-0x0000000004B10000-0x0000000004B2A000-memory.dmp

      Filesize

      104KB

    • memory/4952-18-0x0000000000400000-0x00000000004AA000-memory.dmp

      Filesize

      680KB

    • memory/4952-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4952-16-0x0000000000600000-0x000000000062D000-memory.dmp

      Filesize

      180KB

    • memory/4952-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB