Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 18:58

General

  • Target

    b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f.exe

  • Size

    694KB

  • MD5

    1ab185612cfba54f22399b06b3617a3c

  • SHA1

    ecc54be9398bc17232e9cf9a14a2a52db3e6cbcc

  • SHA256

    b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f

  • SHA512

    47e79e8dc37c34f41bbfcbd142fdef98bd2e8fbf355e9a0ce47145c9127d3d2ba3edca63f335931f430e4c00ed7d446a592df1d4b491aabbd129bc4cee09f098

  • SSDEEP

    12288:FMrRy903N4+xJKEK9tYXkRTaDzCDdb7h96NVZLWZWI4Zwxc/MHao:Iy8xAZTOuDdbX+PWc7PM6o

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f.exe
    "C:\Users\Admin\AppData\Local\Temp\b8ab16322f16da5aa983938ad9a88bb4bd5b755fbdb48dcad2d79cf8d8b10e3f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un271257.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un271257.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3639.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3639.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 1080
          4⤵
          • Program crash
          PID:2484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6433.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6433.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2072 -ip 2072
    1⤵
      PID:2008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un271257.exe

      Filesize

      553KB

      MD5

      595f4fb16283895008094cad7fcbb8d9

      SHA1

      c46f3467f0c478132691a2e3e67507bd18237eb1

      SHA256

      8d543d6d2f115c70b6b7229c9e0a04cbdf572d4caa4bf5339b326766259f0f97

      SHA512

      8d8fc721675d4a5c8969ad087fc93d6eac19baa58dfce10b46f21688036911c351fa6f7fe7f5cdb52d759325667ec0db5823689d976578f3303fc327441e9ee4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3639.exe

      Filesize

      347KB

      MD5

      4191e95bb6c0da3b0d0e884ff330e4c1

      SHA1

      d393d2cca8e8f2fc4b026503a6cd37482fa934d6

      SHA256

      2bb3f54871654d2c4ffa46a9d198b879fc294a4a661d5f45469ea2e93c55e15c

      SHA512

      89ee6d82c4e28cbc8d9c520cf367536551d175a1f6fc95ebecb504f1f7e86c79ed9e684eca14478b5528e8ba26c2f7d3c581e61662641c9afa3b63e1ebaea296

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6433.exe

      Filesize

      405KB

      MD5

      6641e9a4e9ed40f574a2601a81ef0142

      SHA1

      115c15f2e9723ea41b6ade23d74d985599ab3f0e

      SHA256

      ce1ad2224c80b72f694d1b453d342ce6a81e4209c51d7eb8d3d9299c2e6cdd2c

      SHA512

      d37ea062a054c4fcd24899be8fd6180b95ceedea418d1b4c0863b508dfb7659b958b2dad61c872f9f3e133e4eb5ce78e902c67e9c45a49437590521bea7916fe

    • memory/2072-15-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

      Filesize

      1024KB

    • memory/2072-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2072-17-0x0000000004730000-0x000000000474A000-memory.dmp

      Filesize

      104KB

    • memory/2072-18-0x00000000072A0000-0x0000000007844000-memory.dmp

      Filesize

      5.6MB

    • memory/2072-19-0x0000000004DE0000-0x0000000004DF8000-memory.dmp

      Filesize

      96KB

    • memory/2072-20-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2072-48-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-46-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-44-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-42-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-40-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-38-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-36-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-34-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-32-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-30-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-28-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-26-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-24-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-22-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-21-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

      Filesize

      72KB

    • memory/2072-49-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

      Filesize

      1024KB

    • memory/2072-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2072-50-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2072-53-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2072-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3996-59-0x0000000004970000-0x00000000049B6000-memory.dmp

      Filesize

      280KB

    • memory/3996-60-0x0000000004D30000-0x0000000004D74000-memory.dmp

      Filesize

      272KB

    • memory/3996-88-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-94-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-92-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-90-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-86-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-84-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-82-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-80-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-78-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-76-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-74-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-72-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-70-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-68-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-66-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-64-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-62-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-61-0x0000000004D30000-0x0000000004D6F000-memory.dmp

      Filesize

      252KB

    • memory/3996-967-0x0000000007930000-0x0000000007F48000-memory.dmp

      Filesize

      6.1MB

    • memory/3996-968-0x0000000007F50000-0x000000000805A000-memory.dmp

      Filesize

      1.0MB

    • memory/3996-969-0x00000000072C0000-0x00000000072D2000-memory.dmp

      Filesize

      72KB

    • memory/3996-970-0x00000000072E0000-0x000000000731C000-memory.dmp

      Filesize

      240KB

    • memory/3996-971-0x0000000008160000-0x00000000081AC000-memory.dmp

      Filesize

      304KB