Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 12:54

General

  • Target

    325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe

  • Size

    658KB

  • MD5

    d93d0bc1ed0cc99097245fb5ff3561ee

  • SHA1

    df3ab8a48517ed615626e6dae383502c20500d54

  • SHA256

    325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36

  • SHA512

    a3e5570a360f358ca9bc65fba3f8d6fd236c8f2d1703caa300c1a8ac8a5e052f79aafc92004d8b4a0bee909474401b1192cd39be360a1d95e320eb3ebccde97a

  • SSDEEP

    12288:4Mrdy90hWzutru/Byd5pK3FkyU8BRi9j0XTYKjFQoqBiPed6hbfxgy:lycruZyd+3yJ8BRW+5RQDtUhdgy

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe
    "C:\Users\Admin\AppData\Local\Temp\325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454984.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454984.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1088
          4⤵
          • Program crash
          PID:536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7365.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2292 -ip 2292
    1⤵
      PID:3924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454984.exe

      Filesize

      517KB

      MD5

      709245354694f05cecfcfce4c4a960e9

      SHA1

      0c2c549155a95364751a13dc8538829d2d222a26

      SHA256

      147a0c0eae614b72f325ac61b3f9b34ae0729804f0659fec83e71534e73ce5e0

      SHA512

      7bb4d3a134f1cf82dfd3043777114d923bf92aec1a444a8b6bbf6dbe65676442fe62b7a90417286859792520b971d909d3e081627cbdf8505b73b77d95238d96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exe

      Filesize

      295KB

      MD5

      502cdc1d065246afafcad73e2df58763

      SHA1

      8e017873d6b66c9a228013353e073bf20e1cd2c1

      SHA256

      565798380fb35ca27ce15526bac1dff24e4151c0bae16748ae2b94e61b38417e

      SHA512

      2162e55f9b30b79760e55c7e204e08469211bed387dd1aa364ca6ea12ec352c03101df9a2abc2fb8c6ff0668456fa6e3b2643365926e21900409d0c96255080b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7365.exe

      Filesize

      354KB

      MD5

      a59ac118f99e8302bbf0f42e47b49c37

      SHA1

      aa401375319ed6cddc5ea2d9eb11bc9445926b3a

      SHA256

      3313051b78b8860321d3f81ce9ef4be881cb00696d98d21049d195820c604f74

      SHA512

      dd99edd9e45b20894356a38a20a259c3456b965b2542b62b629361dc8bef6a69ee4f14a6da4123ecf6b65cedb49666accd7363c499a561675c9b42438866082d

    • memory/2292-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2292-15-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB

    • memory/2292-17-0x0000000004900000-0x000000000491A000-memory.dmp

      Filesize

      104KB

    • memory/2292-18-0x0000000007320000-0x00000000078C4000-memory.dmp

      Filesize

      5.6MB

    • memory/2292-20-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/2292-19-0x0000000004DC0000-0x0000000004DD8000-memory.dmp

      Filesize

      96KB

    • memory/2292-34-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-46-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-48-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-44-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-42-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-40-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-38-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-36-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-32-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-30-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-29-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-26-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-24-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-22-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-21-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

      Filesize

      72KB

    • memory/2292-49-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB

    • memory/2292-50-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2292-51-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/2292-53-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/2292-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4016-59-0x0000000007090000-0x00000000070D6000-memory.dmp

      Filesize

      280KB

    • memory/4016-60-0x0000000007720000-0x0000000007764000-memory.dmp

      Filesize

      272KB

    • memory/4016-82-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-94-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-92-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-90-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-88-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-86-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-84-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-80-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-78-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-76-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-74-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-72-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-70-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-68-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-66-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-64-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-62-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-61-0x0000000007720000-0x000000000775F000-memory.dmp

      Filesize

      252KB

    • memory/4016-967-0x00000000077C0000-0x0000000007DD8000-memory.dmp

      Filesize

      6.1MB

    • memory/4016-968-0x0000000007E60000-0x0000000007F6A000-memory.dmp

      Filesize

      1.0MB

    • memory/4016-969-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/4016-970-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

      Filesize

      240KB

    • memory/4016-971-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB