Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 16:24

General

  • Target

    0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe

  • Size

    988KB

  • MD5

    88b43cbb705d6ff252035cd54e8f42d8

  • SHA1

    8afd69d5d90eaf80488d929e059874c382040cdf

  • SHA256

    0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c

  • SHA512

    2cfe5fcc7e69a6345e9f537bceae5aa2e05a7a36c32d6f0f4709f1d276544d8b11e5ac798f108a3d7df5807ffbcdacdbba2fa29989cd2974dc35356b660c9c3c

  • SSDEEP

    12288:zMrOy90++cbS15kJdr8+r+yzTae+QUCpbzAmNw1tnK7fFXp3+ulOlqztcBbk40AW:ByRrwGgo+OT3YmNwXGfF5uulaqztcdi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe
    "C:\Users\Admin\AppData\Local\Temp\0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2242.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2242.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6432.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6618.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6618.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1084
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0380XC.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0380XC.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:400
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 1100
              6⤵
              • Program crash
              PID:4068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w33Yc63.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w33Yc63.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 400 -ip 400
    1⤵
      PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2242.exe

      Filesize

      805KB

      MD5

      f4b585df2ed3ae8cf26de9f4e147302b

      SHA1

      65bab4177fcc81d230b38e6969db9b83a58cb325

      SHA256

      4b2e699258187db7c38b6deea0d6826354514e3b3ae19e4fe973a44bc749d2d7

      SHA512

      e91b0b9d45b69fdbea52973607378af7abe727a9e226dd2b2c3e990b74b9e2c58b5570264071ac588570c73425e5ea69aa3c59fc0aa8abc11864a138ea489eff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6432.exe

      Filesize

      651KB

      MD5

      31076539babf29b45a79d7c1136f7265

      SHA1

      bb9cfd22f4299a04524b6049e88a78e331cd3856

      SHA256

      eded3d402460796aeb233dbc106139f8ab11c0f37992bf34b6981352aefa3765

      SHA512

      3029bc56114a91a03f2be10d91ceb8f443866b1f6c3e3e7de8dc201aacbc0173e5bd62aa7c5ef992d4f873b2124891d9511db25e771697289edc4ded9899398d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w33Yc63.exe

      Filesize

      292KB

      MD5

      d0d4b5c91da839d302de1033a675bf9f

      SHA1

      62d6f1c17d54a01954ecc2b237f0aa16576d06b9

      SHA256

      bb113dc81b4d80121a6f0e73054011239b72b2d4ebf72c9094485bbdc690e4b2

      SHA512

      d013b1b6e24ecb1262d12f2460353a2492834a475af78ebe1d99433edc74e25cced1e8d72f2b2ac2fdf793ea1ad4ed8ad377fd68d65183d46d6d2659eed50759

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6618.exe

      Filesize

      322KB

      MD5

      aaf43bdf1fda96b70eafd30992f74e25

      SHA1

      29f1e4cd851eee09a9332bb5a14a11578c8f1354

      SHA256

      720baaceb65c1a33d1324fb99b0fbeed1f67c4f173b4b0b4588cc555a45417b5

      SHA512

      e25df0516fe18ab0f0ba0dd86dc0c201e92f59bbfd7c7315b1e0f6a62aa1fc2a26e6208617e97b3fb24e24717b735fcc269ca291130afca016aeff8d5dbc9a28

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0380XC.exe

      Filesize

      235KB

      MD5

      9bb71766e2acf95eb22cb508c69ec067

      SHA1

      059ad053769eec21d066a4e691b810a0f5ba1192

      SHA256

      8fa037999479fd8f45c2af19168199fc5d18408920a157c7433db976adfe15d2

      SHA512

      5bfc4086a90ef6285bd0692768573e300aac39ce833471576c493683c8109e3c8440583481fee9b9a2f0d0a9976b7f71a2ee0f4b987123c94023ffd9712d0cf7

    • memory/400-67-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/400-35-0x0000000004DA0000-0x0000000005344000-memory.dmp

      Filesize

      5.6MB

    • memory/400-36-0x0000000002390000-0x00000000023A8000-memory.dmp

      Filesize

      96KB

    • memory/400-37-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-46-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-64-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-62-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-60-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-58-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-56-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-54-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-52-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-50-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-48-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-44-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-42-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-40-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-38-0x0000000002390000-0x00000000023A2000-memory.dmp

      Filesize

      72KB

    • memory/400-65-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/400-34-0x0000000002070000-0x000000000208A000-memory.dmp

      Filesize

      104KB

    • memory/456-77-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-91-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-73-0x0000000004AC0000-0x0000000004B04000-memory.dmp

      Filesize

      272KB

    • memory/456-984-0x0000000004C50000-0x0000000004C9C000-memory.dmp

      Filesize

      304KB

    • memory/456-83-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-108-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-105-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-103-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-101-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-99-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-97-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-95-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-93-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-72-0x0000000002410000-0x0000000002456000-memory.dmp

      Filesize

      280KB

    • memory/456-89-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-87-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-81-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-79-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-85-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-75-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp

      Filesize

      252KB

    • memory/456-980-0x0000000005260000-0x0000000005878000-memory.dmp

      Filesize

      6.1MB

    • memory/456-981-0x0000000005880000-0x000000000598A000-memory.dmp

      Filesize

      1.0MB

    • memory/456-982-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

      Filesize

      72KB

    • memory/456-983-0x0000000004C00000-0x0000000004C3C000-memory.dmp

      Filesize

      240KB

    • memory/1084-28-0x0000000000930000-0x000000000093A000-memory.dmp

      Filesize

      40KB