Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 16:16

General

  • Target

    61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe

  • Size

    665KB

  • MD5

    c28755bc09052f8a72497263c5560e91

  • SHA1

    711f6027e2186aac1c3b00e446af575546b549fa

  • SHA256

    61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a

  • SHA512

    4e27558f0f090c2d51bb36461980c44c950228f98adc2a9ffb12334fb8c55cbafac2b292943cc7df85b0bccbe969387c1b2484247c81760a34ac45f6196de458

  • SSDEEP

    12288:XMrgy90xi8r7Wb4p6EnpTa+wgAK5LzuUJ66N2bekL4LFK8:jyei8/SGvmkLCP6N2J4BN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe
    "C:\Users\Admin\AppData\Local\Temp\61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un314883.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un314883.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9761.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9761.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 1080
          4⤵
          • Program crash
          PID:4088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5543.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5543.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3972 -ip 3972
    1⤵
      PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un314883.exe

      Filesize

      523KB

      MD5

      29fc00e818d3b8aa454ada43131d4249

      SHA1

      1ebd658696d55a33dd7418e707ba84bc765ed819

      SHA256

      a6c3e5ab173019f706bcd541e7d90df4b8390cced31edaa516c2eea8d572ddd5

      SHA512

      269f4087e6ca1c89ed28f44ec6bd458e3ff1346c3d6eb5f759b885bc53b56e5c08f18d9eed9a6d1fb3b0f92e50a1a831de212da4d549376028ec8886038647fb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9761.exe

      Filesize

      294KB

      MD5

      5f1fe8ca4a19b7addd321828a705ba41

      SHA1

      e26a8b9a3c467aee850badf4baf0a2eb7900aa30

      SHA256

      c47625272ffd209ecb26852eb5068200711911c1b2f7176ffde96c9f3db536a9

      SHA512

      6157830090b8da6d7ea75525aa7043d30887a56abb5265618f73835c232659e2a4e8aa3ec95fee4ef6b2ad3d1d8e63f90083b844f38a3b8e87a8cbe90b2a1fa1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5543.exe

      Filesize

      353KB

      MD5

      1877bb0e7d5be6e32283bd84a3278db0

      SHA1

      8e45e7c06534e51eb9682b1de6f66e9ece979ce5

      SHA256

      03e581534b1365ebb78384bda7cc1fd36bed8634a62d544b64250f5d114ed067

      SHA512

      0475a19a14046be20aaef3aaf16d3f687c47a1edd0e79e0579184c9f8df46026c3082f3871367de31562c5ceaef78ff2e30b397a570125d1ae4032839c14b01d

    • memory/1084-76-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-80-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-970-0x0000000005BA0000-0x0000000005CAA000-memory.dmp

      Filesize

      1.0MB

    • memory/1084-969-0x0000000005580000-0x0000000005B98000-memory.dmp

      Filesize

      6.1MB

    • memory/1084-63-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-66-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-68-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-70-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-72-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-74-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-972-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/1084-973-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

      Filesize

      304KB

    • memory/1084-78-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-971-0x0000000004F30000-0x0000000004F42000-memory.dmp

      Filesize

      72KB

    • memory/1084-82-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-84-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-86-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-88-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-90-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-93-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-94-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-96-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-64-0x0000000002AA0000-0x0000000002ADF000-memory.dmp

      Filesize

      252KB

    • memory/1084-62-0x0000000002AA0000-0x0000000002AE4000-memory.dmp

      Filesize

      272KB

    • memory/1084-61-0x00000000028C0000-0x0000000002906000-memory.dmp

      Filesize

      280KB

    • memory/3972-41-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3972-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3972-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3972-51-0x0000000000960000-0x000000000098D000-memory.dmp

      Filesize

      180KB

    • memory/3972-50-0x0000000000A40000-0x0000000000B40000-memory.dmp

      Filesize

      1024KB

    • memory/3972-23-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-22-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-27-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-29-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-32-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-33-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-35-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-37-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-49-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-39-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-43-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-45-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-47-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-25-0x0000000002850000-0x0000000002862000-memory.dmp

      Filesize

      72KB

    • memory/3972-21-0x0000000002850000-0x0000000002868000-memory.dmp

      Filesize

      96KB

    • memory/3972-20-0x0000000005220000-0x00000000057C4000-memory.dmp

      Filesize

      5.6MB

    • memory/3972-19-0x0000000002680000-0x000000000269A000-memory.dmp

      Filesize

      104KB

    • memory/3972-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3972-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3972-16-0x0000000000960000-0x000000000098D000-memory.dmp

      Filesize

      180KB

    • memory/3972-15-0x0000000000A40000-0x0000000000B40000-memory.dmp

      Filesize

      1024KB