Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:17

General

  • Target

    c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98.exe

  • Size

    690KB

  • MD5

    284449c77de8fea6f5dec4921747ae79

  • SHA1

    7b7508a34ac37752dff9547c0652933395a4d3f1

  • SHA256

    c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98

  • SHA512

    5ca9451b8997dc2c6bef86564a84425679e209578e35c571330d65f001ad40943f561b18e88994b06c812b91afaccbf908543faba83c6c010c18dfb3b1ba61a5

  • SSDEEP

    12288:iMrAy90ySr1MSCMzdrUxcpHd3YHr5aDfqHKQV6zWhOy2aMC4:mygaqpd3YL5G2KGyWple

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98.exe
    "C:\Users\Admin\AppData\Local\Temp\c60d44363d6fb16b4e3797f79c891e4a8544a4f035d1c0d6a2abb7d937139c98.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un674965.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un674965.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5329.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1076
          4⤵
          • Program crash
          PID:3480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3417.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1952 -ip 1952
    1⤵
      PID:3348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un674965.exe

      Filesize

      536KB

      MD5

      1c98955c1b701164b27d49e1c5125256

      SHA1

      ed95f9344f96c526a7e990018ca0edcc92a6a6e7

      SHA256

      f95cd05eb3c21113df9a144bb1c89432776173584325b4c1842eebca5f2d73cf

      SHA512

      4081fe61426b87784396e956069db64dcf503e186d58722321be5f931dcc43624442dbf871062cf00fb6be1552ba4c202cb65e90e7fd834f60e5572a99a73bb9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5329.exe

      Filesize

      314KB

      MD5

      1866381b507ef5fb38ea152985b9e052

      SHA1

      13f02e9cdfe05ef82fc1fc6ce14a7bbe97ec9457

      SHA256

      f2c00d9c196af2f1227d64e6268ae5d19cea7cfb5e9834731b1b53b2923d9114

      SHA512

      ec413ba59c222407a0ca5119155ff9658e4e3f895560913ddcb462010cb3d1eca5a51f0b493c681dd47054fa760e73a54d4c9a3b5ba6e30f325930e96c030c96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3417.exe

      Filesize

      372KB

      MD5

      3b5faaf00c78d8036e371223c97e9cf3

      SHA1

      1f81ed4a2539bac9c2790e31e051abb84638749e

      SHA256

      c55b0c7ff03b7b5aa8d0da757275a69537f3196c4ec1f949f3187b07be8bccd1

      SHA512

      4eaa45e4234fa74df08b9d7d4c7d32c79687a6b0b93cfb0b991aa87ed46ef20214e4715fcbbe787d8669954b349859dd1c1c040289187a39182ba8ad048ebd79

    • memory/1952-15-0x0000000000AD0000-0x0000000000BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1952-16-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/1952-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1952-18-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/1952-19-0x0000000000AB0000-0x0000000000ACA000-memory.dmp

      Filesize

      104KB

    • memory/1952-20-0x0000000004FC0000-0x0000000005564000-memory.dmp

      Filesize

      5.6MB

    • memory/1952-21-0x0000000002970000-0x0000000002988000-memory.dmp

      Filesize

      96KB

    • memory/1952-45-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-43-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-49-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-47-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-41-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-39-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-33-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-31-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-29-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-27-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-25-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-23-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-22-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-37-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-36-0x0000000002970000-0x0000000002982000-memory.dmp

      Filesize

      72KB

    • memory/1952-50-0x0000000000AD0000-0x0000000000BD0000-memory.dmp

      Filesize

      1024KB

    • memory/1952-51-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/1952-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1952-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1952-55-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/4720-61-0x0000000002790000-0x00000000027D6000-memory.dmp

      Filesize

      280KB

    • memory/4720-62-0x0000000004CF0000-0x0000000004D34000-memory.dmp

      Filesize

      272KB

    • memory/4720-76-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-78-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-96-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-94-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-92-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-88-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-86-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-84-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-82-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-80-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-74-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-73-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-70-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-90-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-68-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-66-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-64-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-63-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

      Filesize

      252KB

    • memory/4720-969-0x0000000005450000-0x0000000005A68000-memory.dmp

      Filesize

      6.1MB

    • memory/4720-970-0x0000000005AF0000-0x0000000005BFA000-memory.dmp

      Filesize

      1.0MB

    • memory/4720-971-0x0000000005C30000-0x0000000005C42000-memory.dmp

      Filesize

      72KB

    • memory/4720-972-0x0000000005C50000-0x0000000005C8C000-memory.dmp

      Filesize

      240KB

    • memory/4720-973-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

      Filesize

      304KB