Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 12:23

General

  • Target

    01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe

  • Size

    671KB

  • MD5

    2e25ca50731f7badc86f47ba28dee1e0

  • SHA1

    18d365cca7954061d1b00ec7e17e539b1cfb1925

  • SHA256

    01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07

  • SHA512

    04936ed01e8ba3d313036d0478a08a9f705ae0f6a6502e7829c6b7f8ea528dce36de26a2ba149bd0fa4454e2a7b36a818b87cc6046125e5d369c0c9c7a899e35

  • SSDEEP

    12288:uMrvy90/u+M00R8NhmCf+kPHrTKAhbVTJXmCJRz7dEMXfA:tybv0TPX/bVT8Mfdfo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe
    "C:\Users\Admin\AppData\Local\Temp\01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621023.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621023.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1329.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 1084
          4⤵
          • Program crash
          PID:4240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7449.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7449.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1216 -ip 1216
    1⤵
      PID:3536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621023.exe

      Filesize

      517KB

      MD5

      853c0b9b50bda76bf13c19ef950e160d

      SHA1

      c93190f122466e70c0ccc3fee2f94fb3b8d7a0b3

      SHA256

      3237ce6c3645a2677c233ec33bcdef87b19659e314d438bfafa055e0233b2387

      SHA512

      4ea44652168ffe7dfd1cceb071c7227baed5a97ccdcf90931756090eee3a594bb04f449530d12efe59144f45336a2136e14f5f1aadbc1d3a8d9d03e129d0bd63

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1329.exe

      Filesize

      237KB

      MD5

      78e3e94cead295cffb83b10d9190a4b9

      SHA1

      b0d68cefeab1b3ef9c303d537b4127a088c9ee93

      SHA256

      d5c41fea142a2dd008d3b8401609cd88bf86057a5469b4a238cfd48a7ffb8009

      SHA512

      97927198cdc05fd9bad1b2746950e787cd8eee884d9a8535b7d1aff11ae0012b609282d116e60259f93fc1a067de6a86cf336e6d5819fa91ed661195248bdece

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7449.exe

      Filesize

      295KB

      MD5

      20420ac65c16d629e9c8bb91bf9f6283

      SHA1

      6c81b7a7d7a91e3e69f478dd8f04b2871faf012c

      SHA256

      122681634a9b72ee1be6a9441c71ae627751d4ff4dad5591c059ecf17e01454d

      SHA512

      b1f896cd0bf9c62f536dc8994f9456039c99fe4053ea228ff44b9194f421aae226d40e226d803a6c4453e82e61e96ba4891f2f750fea406c4e475f4d35a83a62

    • memory/1216-15-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/1216-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1216-17-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/1216-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/1216-19-0x00000000049B0000-0x00000000049CA000-memory.dmp

      Filesize

      104KB

    • memory/1216-20-0x0000000004B80000-0x0000000005124000-memory.dmp

      Filesize

      5.6MB

    • memory/1216-21-0x0000000004A40000-0x0000000004A58000-memory.dmp

      Filesize

      96KB

    • memory/1216-22-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-49-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-48-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-46-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-43-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-42-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-39-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-37-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-36-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-33-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-31-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-29-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-27-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-25-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-23-0x0000000004A40000-0x0000000004A52000-memory.dmp

      Filesize

      72KB

    • memory/1216-50-0x00000000005D0000-0x00000000006D0000-memory.dmp

      Filesize

      1024KB

    • memory/1216-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1216-54-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/1216-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3724-60-0x00000000023B0000-0x00000000023F6000-memory.dmp

      Filesize

      280KB

    • memory/3724-61-0x0000000002650000-0x0000000002694000-memory.dmp

      Filesize

      272KB

    • memory/3724-71-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-75-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-95-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-93-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-91-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-89-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-85-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-83-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-81-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-79-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-77-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-73-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-69-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-87-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-67-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-65-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-63-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-62-0x0000000002650000-0x000000000268F000-memory.dmp

      Filesize

      252KB

    • memory/3724-968-0x0000000005220000-0x0000000005838000-memory.dmp

      Filesize

      6.1MB

    • memory/3724-969-0x0000000005840000-0x000000000594A000-memory.dmp

      Filesize

      1.0MB

    • memory/3724-970-0x00000000028A0000-0x00000000028B2000-memory.dmp

      Filesize

      72KB

    • memory/3724-971-0x00000000028C0000-0x00000000028FC000-memory.dmp

      Filesize

      240KB

    • memory/3724-972-0x0000000005A50000-0x0000000005A9C000-memory.dmp

      Filesize

      304KB