Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 12:50

General

  • Target

    ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe

  • Size

    671KB

  • MD5

    35be64d704dad823673f061ad3ac88c6

  • SHA1

    29110f86cbce9c5d114f52c7a0e8f7eb387a1aaf

  • SHA256

    ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9

  • SHA512

    62cc30c63838a05a9bf2e00d4041ab3305357edda5c71043e6b12200814a23f258f12642796be6a6895a540950555b8603b6def3b08508de56c9a4759bd8c450

  • SSDEEP

    12288:UMrCy90F8uq0BOwoW9WI2tOigj3yoNZyAjKb252UVM3Lq0zyph37vq:eyMJxJigGaE5UVM3G0+phLq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe
    "C:\Users\Admin\AppData\Local\Temp\ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588005.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4153.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4153.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 984
          4⤵
          • Program crash
          PID:3408
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1894.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4764 -ip 4764
    1⤵
      PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588005.exe

      Filesize

      530KB

      MD5

      a15505e2f695b00a7a4eb9177684c5d6

      SHA1

      edb04860ecacb7408f94588a8f9bf2c8173d1f2b

      SHA256

      14e15b2d4cf62face8606b31e2cf6e7148bf6d316131ac637375b64ef2e502b3

      SHA512

      07e2ba9cff6947a738d3628e34e28a736aa0faac3c5fabb3bd667aceda427363e68f2fdb0a08b5ee902eff7a2b4140b4f1f3ec4c42523aac6512cf96b648e813

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4153.exe

      Filesize

      301KB

      MD5

      bb272c221ff897208f8ca583924ca492

      SHA1

      330107dc0ecfca8bbec935b902568c0915cb17ee

      SHA256

      14be1814a654d38c4a5ff720cb419e1fb47273a80a9c2914e64768aac310da17

      SHA512

      b6576f8ea9447f0a4274833c9d2a8c89499cc369f6578d969871853925498b9541b9bcbd8e6c59671fd77f8a2f8a0483b5778cc089b310683bbad5e7410aa98e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1894.exe

      Filesize

      359KB

      MD5

      f948b0ba3c2a4bf8623d0922f96a2360

      SHA1

      adaba51c78a8a5cbca3684fa8d310aff2afa8a44

      SHA256

      913c31df2ed22d2153e9cf13da3b262dadd6be8587e6b1911b6e3ccbe727caf2

      SHA512

      b10af21f676aa797eb84248a2223238ada3195bd22f7dc13eface4f28cc37e385cdd961a078cc89ba48b81313a01a624e2c627ee17d3b4ca3066199b3b6bc17b

    • memory/1532-82-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-970-0x0000000006DD0000-0x0000000006EDA000-memory.dmp

      Filesize

      1.0MB

    • memory/1532-973-0x0000000007080000-0x00000000070CC000-memory.dmp

      Filesize

      304KB

    • memory/1532-68-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-70-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-72-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-74-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-76-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-972-0x0000000006F30000-0x0000000006F6C000-memory.dmp

      Filesize

      240KB

    • memory/1532-78-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-84-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-63-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-86-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-66-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-971-0x0000000006F10000-0x0000000006F22000-memory.dmp

      Filesize

      72KB

    • memory/1532-969-0x0000000006740000-0x0000000006D58000-memory.dmp

      Filesize

      6.1MB

    • memory/1532-88-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-90-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-92-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-94-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-96-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-80-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-64-0x00000000060D0000-0x000000000610F000-memory.dmp

      Filesize

      252KB

    • memory/1532-62-0x00000000060D0000-0x0000000006114000-memory.dmp

      Filesize

      272KB

    • memory/1532-61-0x0000000003A30000-0x0000000003A76000-memory.dmp

      Filesize

      280KB

    • memory/4764-41-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4764-55-0x0000000000400000-0x0000000001AE3000-memory.dmp

      Filesize

      22.9MB

    • memory/4764-53-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4764-51-0x0000000001C40000-0x0000000001C6D000-memory.dmp

      Filesize

      180KB

    • memory/4764-50-0x0000000001E50000-0x0000000001F50000-memory.dmp

      Filesize

      1024KB

    • memory/4764-22-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-23-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-25-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-27-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-29-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-31-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-33-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-35-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-37-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-39-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-43-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-45-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-47-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-49-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

      Filesize

      72KB

    • memory/4764-21-0x0000000000400000-0x0000000001AE3000-memory.dmp

      Filesize

      22.9MB

    • memory/4764-20-0x0000000003BD0000-0x0000000003BE8000-memory.dmp

      Filesize

      96KB

    • memory/4764-19-0x00000000062A0000-0x0000000006844000-memory.dmp

      Filesize

      5.6MB

    • memory/4764-18-0x0000000003900000-0x000000000391A000-memory.dmp

      Filesize

      104KB

    • memory/4764-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4764-16-0x0000000001C40000-0x0000000001C6D000-memory.dmp

      Filesize

      180KB

    • memory/4764-15-0x0000000001E50000-0x0000000001F50000-memory.dmp

      Filesize

      1024KB