Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 18:28

General

  • Target

    8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe

  • Size

    660KB

  • MD5

    857e34f22dbe32e8f9046bda15a877c0

  • SHA1

    4dfc57646d790022c83bd6bda1d927896d4fd321

  • SHA256

    8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5

  • SHA512

    910e09ae93b5279e5d4d7bd4da5d66e70828cf1de8e1f158498bcb2c0a03c78a6605aefa16b0721dbc385ed5026134ca908ba69cec9c5cfa9c1e34e79a5b2b97

  • SSDEEP

    12288:6MrOy90eMaqSuy/rYKQhfCltnN8PnXzlIUlifyoQCFvAft/juH/+ySA:QyEa9uyUMtN4XinrdFIB+/+yD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe
    "C:\Users\Admin\AppData\Local\Temp\8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147691.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147691.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6457.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 1088
          4⤵
          • Program crash
          PID:4396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5958.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5958.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 688 -ip 688
    1⤵
      PID:4504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147691.exe

      Filesize

      517KB

      MD5

      febcd113b20d59157f9b7fba64932fb8

      SHA1

      33fb29fc980360d847e57b5ec86235e8db2e3d7d

      SHA256

      41433b498eae7254bc7971fb58183adaccf0a8cfdf64acc03c24dcff3a10e939

      SHA512

      6a185515b5dc615a1e4e43db6fd11ae6b3aacf2e02797f5b320bddea17fc17df24089adbba8bb5f4d74a8c61d5e36ce82405578c932a00ff6ddb658d43bc03c4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6457.exe

      Filesize

      237KB

      MD5

      9fd656b7cb57b6c9cd5a1bb187663b32

      SHA1

      e4b27789dfd2dd54280a5a7768de2b21fdcce357

      SHA256

      b831c7895fbf2d6cbe98435cc75ec6cfa532d2e1dafe0a85db4c7c03a64d0ceb

      SHA512

      c778ceba3578ded7cafab08427cb1bb62d8127062ddb40bcade6ee47e090083875f642440b74613a672db243f4df03ccadd9573e77ef4e2049451f9f95ea782a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5958.exe

      Filesize

      295KB

      MD5

      d96b5d103a5c26afa358a46e68fe3996

      SHA1

      e1f00a11b1265faf7684f062ebba858d85d56565

      SHA256

      912d959605b529c35abf94813f5da5cb7c8d28378e251169c37650832afa2fce

      SHA512

      1a433773e9fabb14faaa0a4ac8b5637d1fa17c1fcacc6f4ae9a97a2c76b213b9d56a7b16128eb004f4a1ecdde5b96b2623c4a614831fee55252a8de393ac4fe3

    • memory/412-87-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-91-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-969-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/412-968-0x0000000005140000-0x0000000005758000-memory.dmp

      Filesize

      6.1MB

    • memory/412-73-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-75-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-77-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-79-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-83-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-85-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-971-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/412-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/412-89-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-970-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/412-93-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-95-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-62-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-65-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-81-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-69-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-71-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-67-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

      Filesize

      252KB

    • memory/412-61-0x0000000004AA0000-0x0000000004AE4000-memory.dmp

      Filesize

      272KB

    • memory/412-60-0x00000000025A0000-0x00000000025E6000-memory.dmp

      Filesize

      280KB

    • memory/688-43-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/688-54-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/688-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/688-50-0x00000000004B0000-0x00000000005B0000-memory.dmp

      Filesize

      1024KB

    • memory/688-22-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-23-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-25-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-27-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-29-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-31-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-33-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-37-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-39-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-41-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-45-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-47-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-49-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-35-0x0000000004B80000-0x0000000004B92000-memory.dmp

      Filesize

      72KB

    • memory/688-21-0x0000000004B80000-0x0000000004B98000-memory.dmp

      Filesize

      96KB

    • memory/688-20-0x0000000004CA0000-0x0000000005244000-memory.dmp

      Filesize

      5.6MB

    • memory/688-19-0x0000000004AF0000-0x0000000004B0A000-memory.dmp

      Filesize

      104KB

    • memory/688-18-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/688-17-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/688-15-0x00000000004B0000-0x00000000005B0000-memory.dmp

      Filesize

      1024KB

    • memory/688-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB