Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 14:40

General

  • Target

    b5980c454bd94ea0a286cb0d9db4b7638ac1a3aabccba063bc9e9214df923501.exe

  • Size

    672KB

  • MD5

    ef5a2fd9d4a1038e5119a85ae642ab74

  • SHA1

    d795161efbbd79ba1cf42210b3a06237033eb803

  • SHA256

    b5980c454bd94ea0a286cb0d9db4b7638ac1a3aabccba063bc9e9214df923501

  • SHA512

    fe0e0b25b6bf237a5a4c3b3909dd8bd30a10d865bc2c59a2908e102d5d06a12b6285cf8e161ef11128381d14baa1c80a7a5405cf43c4d25cf1742399517d7548

  • SSDEEP

    12288:UMrhy90irybJuDOOt4byl2W9R6bJ+ovRG62wvdBObOrXmmI4a:lyebJkOOt4b5O6EgRG62w+bavS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5980c454bd94ea0a286cb0d9db4b7638ac1a3aabccba063bc9e9214df923501.exe
    "C:\Users\Admin\AppData\Local\Temp\b5980c454bd94ea0a286cb0d9db4b7638ac1a3aabccba063bc9e9214df923501.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157012.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157012.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4549.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4549.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 1004
          4⤵
          • Program crash
          PID:1448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7547.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2316 -ip 2316
    1⤵
      PID:2836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157012.exe

      Filesize

      530KB

      MD5

      db3e86d09597ef41c4d37ec429c448f7

      SHA1

      005f284fc4eec8063fc6e8c8c7697211925dca79

      SHA256

      f63f4b2037fb4724cd92a41a1cdbc98cf9edfdc5dda08304ce7961124762bfad

      SHA512

      8f022d4964dc5790e3bdcfcf65cb8592fcf11b27e8ece2f7dcb4b35e208bdcf80489b4811f8c37bb6e95bb0473fbea670ffb861e0734860cf98db89d651af45d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4549.exe

      Filesize

      260KB

      MD5

      3ec04fedb635aeed3886e2a6d107cceb

      SHA1

      9c6b5329be7426f3649887ee1accd6657fd3f9ca

      SHA256

      eee7947a079d9cda55725fd512bab09357972e0406d358b54b146cce1ec624ea

      SHA512

      5ae62ca7b610e78a58bb4a41efc0665e523a309c3bd35d1119d8e2c879f2ab7e3929017d34ab9af2674d3786b90ea666f13033c608f65dd1980e90a0a7a14760

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7547.exe

      Filesize

      318KB

      MD5

      e0dbd8c4086d348c1ea98be7664ef09c

      SHA1

      a925a67295ead8475a3c283bbd81c534d6309f75

      SHA256

      fc7484bfb866558afec4b619db8fec2eb787fb4aaae7d9327153b48a8eef373a

      SHA512

      c6dd53e9874c31892b931eecab71fc0e730bdb92d4e6c108cf53356e5d7679e6d68ad01fd44eee53e3f2e133267ace0d979919706e82b15f8fed6c7ab6d4e96e

    • memory/2316-15-0x0000000000650000-0x0000000000750000-memory.dmp

      Filesize

      1024KB

    • memory/2316-16-0x0000000002110000-0x000000000213D000-memory.dmp

      Filesize

      180KB

    • memory/2316-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2316-18-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2316-19-0x00000000022A0000-0x00000000022BA000-memory.dmp

      Filesize

      104KB

    • memory/2316-20-0x0000000004C40000-0x00000000051E4000-memory.dmp

      Filesize

      5.6MB

    • memory/2316-21-0x0000000002440000-0x0000000002458000-memory.dmp

      Filesize

      96KB

    • memory/2316-22-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-49-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-47-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-46-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-43-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-41-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-39-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-37-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-35-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-33-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-31-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-29-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-27-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-25-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-24-0x0000000002440000-0x0000000002452000-memory.dmp

      Filesize

      72KB

    • memory/2316-50-0x0000000000650000-0x0000000000750000-memory.dmp

      Filesize

      1024KB

    • memory/2316-51-0x0000000002110000-0x000000000213D000-memory.dmp

      Filesize

      180KB

    • memory/2316-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2316-55-0x0000000000400000-0x00000000004B1000-memory.dmp

      Filesize

      708KB

    • memory/2316-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2652-61-0x0000000004A20000-0x0000000004A66000-memory.dmp

      Filesize

      280KB

    • memory/2652-62-0x0000000005050000-0x0000000005094000-memory.dmp

      Filesize

      272KB

    • memory/2652-66-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-72-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-97-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-92-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-90-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-88-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-86-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-84-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-82-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-80-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-78-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-76-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-70-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-68-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-94-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-74-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-64-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-63-0x0000000005050000-0x000000000508F000-memory.dmp

      Filesize

      252KB

    • memory/2652-969-0x00000000050F0000-0x0000000005708000-memory.dmp

      Filesize

      6.1MB

    • memory/2652-970-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/2652-971-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/2652-972-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/2652-973-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB