Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 16:03

General

  • Target

    cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe

  • Size

    660KB

  • MD5

    0176f3e09d5ff729b329317c2c8a0a55

  • SHA1

    1da78ac7ec01fe95675ddbeda72d9f6e72ec33c0

  • SHA256

    cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d

  • SHA512

    d32da1caf2000d42d50d9bd3ad2138c7bedf8c687d1a18b1e2ffdcd66c2c37b8ae0a1f19a2c3c48d01749fe669148cba268486013c538ff0bba1efdbb42cc9c6

  • SSDEEP

    12288:fMr+y90ESmAwcvi/1hIR8UHNIu+5ZlmXcct4L9ENwu:hyl3Pk01yph+nlTct4L9m

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe
    "C:\Users\Admin\AppData\Local\Temp\cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un183555.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un183555.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6395.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 1084
          4⤵
          • Program crash
          PID:888
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8861.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8861.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1272 -ip 1272
    1⤵
      PID:396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un183555.exe

      Filesize

      518KB

      MD5

      2bf3d32c2fad06581566894ca6434294

      SHA1

      8635e559f525a933fd234e90b061f3cd1b177182

      SHA256

      4c0cdd3298b364301e8462568438f2e63192be81586f5fd3daa64d8604b23b70

      SHA512

      0fdcc11698065388116d0ad57c3d8b4bb7a96a3fa9eadc69cb5e3d88da3c7bafa6d94a9af42ef9d618b490692cd4c47f24d903b16871f6f8d5619125bfe01fa5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6395.exe

      Filesize

      276KB

      MD5

      5d702b58724c5f2bcd46408aa50bd086

      SHA1

      3f9f45523f1b6dbb19e66db89cb523f65a567ec8

      SHA256

      a2aec9eb2913f28e24d91d04da81ffab282903ac56cc836679d1cccce8b7657a

      SHA512

      1bab5f66f8dbfcf57e1d8bbbca808781663b397fa494b1325fbe952a729de268b4822e22b385391cc97c8e6a9fc92e74fda8444d8d2b4a417259d001be54c39c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8861.exe

      Filesize

      295KB

      MD5

      463aa549c86888c35600e920c614ad47

      SHA1

      43217b7cb5011e164e76e5bd1157f9bef42153b2

      SHA256

      6f4c6ae0308834b2c95dfcd356d37bad18399912b3866961978f99e57d4ee631

      SHA512

      6db45e4b454e91602237d483b70a771e78ac88c0a0d46e9870909f455bc7c05e555da36723e0817a1252a6c964ab9e89c58d3fce656d730c528a857d34184222

    • memory/1272-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1272-16-0x0000000001BB0000-0x0000000001BDD000-memory.dmp

      Filesize

      180KB

    • memory/1272-15-0x0000000001D50000-0x0000000001E50000-memory.dmp

      Filesize

      1024KB

    • memory/1272-18-0x0000000003AB0000-0x0000000003ACA000-memory.dmp

      Filesize

      104KB

    • memory/1272-19-0x0000000000400000-0x0000000001ADC000-memory.dmp

      Filesize

      22.9MB

    • memory/1272-20-0x0000000006400000-0x00000000069A4000-memory.dmp

      Filesize

      5.6MB

    • memory/1272-21-0x0000000003B40000-0x0000000003B58000-memory.dmp

      Filesize

      96KB

    • memory/1272-47-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-49-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-45-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-43-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-41-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-39-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-37-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-35-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-33-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-25-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-23-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-22-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-31-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-29-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-27-0x0000000003B40000-0x0000000003B52000-memory.dmp

      Filesize

      72KB

    • memory/1272-50-0x0000000001D50000-0x0000000001E50000-memory.dmp

      Filesize

      1024KB

    • memory/1272-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1272-56-0x0000000000400000-0x0000000001ADC000-memory.dmp

      Filesize

      22.9MB

    • memory/1272-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4084-61-0x00000000022D0000-0x0000000002316000-memory.dmp

      Filesize

      280KB

    • memory/4084-62-0x0000000002760000-0x00000000027A4000-memory.dmp

      Filesize

      272KB

    • memory/4084-88-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-92-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-96-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-94-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-90-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-86-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-84-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-82-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-969-0x0000000005290000-0x00000000058A8000-memory.dmp

      Filesize

      6.1MB

    • memory/4084-970-0x0000000002860000-0x000000000296A000-memory.dmp

      Filesize

      1.0MB

    • memory/4084-971-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/4084-80-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-78-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-77-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-74-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-972-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/4084-66-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-64-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-63-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-72-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-70-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB

    • memory/4084-973-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/4084-68-0x0000000002760000-0x000000000279F000-memory.dmp

      Filesize

      252KB