Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 13:07

General

  • Target

    3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131.exe

  • Size

    657KB

  • MD5

    71fda2d82433fabd3940456f37c226e0

  • SHA1

    df6622ab42df8554c9897d089a91026d3fb26129

  • SHA256

    3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131

  • SHA512

    6678ae1d3c0525decefa579c761c7b0c435573bc5dda1b77d2fa23b313f0361efb75179332bccd9d4653cd6f88a8ed2a539b457870a4111b7a69b3ec720ea09e

  • SSDEEP

    12288:4MrOy90wfr44JTuP8W+06JXIyqKEjS96D7RGtl7Yi4+EVZxm/Wn9TL0:Wyi4JKP1jTLxPRGHYj+EVz3Tg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131.exe
    "C:\Users\Admin\AppData\Local\Temp\3e9246536d0e301f7bdc8d762ba15aff99b872af22ce9949906188b11b42c131.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3271.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3271.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 1080
          4⤵
          • Program crash
          PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3343.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1548 -ip 1548
    1⤵
      PID:4144
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:6196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949773.exe

      Filesize

      515KB

      MD5

      470dc42c42ed9f438272a89c07c2db9b

      SHA1

      ef1bd557f4ce175ceea39f2c0038b6a1b8894e49

      SHA256

      73f636f34c23bd43bab046b086520a64981a0af68aa280489f447643b726a37d

      SHA512

      59d90809414edb9897d31149052f3fe3e50fa6a16428d79e56e90f893144f951e2e3f6c4ba14dfc4af5663d148103a90f1fd30985021e218c62645b2baff7e0c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3271.exe

      Filesize

      295KB

      MD5

      ae9f5fd98ba81580499ae692638c33a6

      SHA1

      f5160eeda52cf78a77adc73f61067ddcaa2c740b

      SHA256

      e676e8cf14b2e8ce4458970df98b43663fb0895dedb5251bb4e700af42295a18

      SHA512

      e323e3c2fafb165af02eaaf61cbb8114e60a9a1fb95416c92fbc35e11f5a4a094f193bf8cee11cda93ebc47214edf53e8343f111dfcd6785832c1284595db8d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3343.exe

      Filesize

      354KB

      MD5

      f607c9cb873ddfa9eac64df45199ede1

      SHA1

      90f4c3e13d463fa06c880a862b1f14c1d054c2ce

      SHA256

      3351ffda3e9a2f087e73af8f94be4f333c1f044cba563342e4b4388eb003b922

      SHA512

      4754b970507a293dbd9e63ed92a12f1d87dd0073bc25ef818ba1ac53e2b724586145d9a48f63fea5dafd2c5d5fd60fa48d837777491567108290a2405939a7d6

    • memory/696-79-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-81-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-62-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-63-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-67-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-69-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-72-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-73-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-76-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-77-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-971-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

      Filesize

      240KB

    • memory/696-972-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB

    • memory/696-969-0x0000000007E60000-0x0000000007F6A000-memory.dmp

      Filesize

      1.0MB

    • memory/696-970-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/696-968-0x00000000077E0000-0x0000000007DF8000-memory.dmp

      Filesize

      6.1MB

    • memory/696-83-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-86-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-87-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-90-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-91-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-93-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-95-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-65-0x00000000077A0000-0x00000000077DF000-memory.dmp

      Filesize

      252KB

    • memory/696-61-0x00000000077A0000-0x00000000077E4000-memory.dmp

      Filesize

      272KB

    • memory/696-60-0x0000000007110000-0x0000000007156000-memory.dmp

      Filesize

      280KB

    • memory/1548-39-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1548-54-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/1548-53-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/1548-50-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1548-49-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

      Filesize

      1024KB

    • memory/1548-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-34-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/1548-20-0x0000000004BD0000-0x0000000004BE8000-memory.dmp

      Filesize

      96KB

    • memory/1548-19-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/1548-18-0x0000000007370000-0x0000000007914000-memory.dmp

      Filesize

      5.6MB

    • memory/1548-17-0x0000000004900000-0x000000000491A000-memory.dmp

      Filesize

      104KB

    • memory/1548-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1548-15-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

      Filesize

      1024KB