Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:04

General

  • Target

    c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe

  • Size

    659KB

  • MD5

    6969a91dee48caf07782bcf83ac0349b

  • SHA1

    830eaac276d0086368a8f46e14f7fa2d94cf1bfc

  • SHA256

    c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7

  • SHA512

    466f697882b2e708e58ca7beeb65d0d759130dd9b0682786bdc2b7e880556fe9085d9eead141d8a8b23a2c41100f8d5ef674e0c370bb58d8a3e0157089e25fdc

  • SSDEEP

    12288:9Mrgy904EW2hTu9kcYAlomgXi5V8NNLMJtJ5FslRSdsON8/KpaB9FEbQ:hylQhy9zh9DUgJtJ5Fqn99

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe
    "C:\Users\Admin\AppData\Local\Temp\c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433093.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433093.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6311.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6311.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 1080
          4⤵
          • Program crash
          PID:3700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4171.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4171.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4640 -ip 4640
    1⤵
      PID:5112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433093.exe

      Filesize

      517KB

      MD5

      1bd54478c01c926fba6f1a328e9898b7

      SHA1

      f5bea5eb774450da8974354f7243fa130a6ab382

      SHA256

      00632bc5f6ce49dfc43587c7fb2b58fef0161d2199c693031b31e591fde03c97

      SHA512

      843906d1e264ab0510b51be05211a43ff229c95ec7f86139d1633fa39d72f97145518a2f03cb50169845362bb2ba8ce93df7bdff2836702f57f7ceb9bce22f51

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6311.exe

      Filesize

      295KB

      MD5

      d9728b843608399f0d708051bd4c9f75

      SHA1

      9fb9301cc4ab7be6e83e61a9ce57526cd1b22f48

      SHA256

      4b4885e5110b451094596903040b78a09191a0c281b4c3224ea981ed5d54453f

      SHA512

      e2e9a9e78e07e61d02c767b9d1d2226d280ac8d0c3b8c9a8f8f9fdd1ed3c571179d635b839ee027e4de119399a387dae7ec94f631b0fa6fe4ed6649e73557e92

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4171.exe

      Filesize

      353KB

      MD5

      01c53fde37e881847610777ca9567825

      SHA1

      f302995c9e0f14ec60438b65135f36197a601b0b

      SHA256

      8cd672e0ef7b0df7b31e2bdfa7f86433356dc0ab8f25d917d9a22b597b14872c

      SHA512

      d54b9db38f1dcc34933a3d75b113f3f1210d4658d210e2d62a806ae475436a85153f01b7372194d31d6faea8d807891193f9a976c1b565a690d0796af263590b

    • memory/1536-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-970-0x0000000005C50000-0x0000000005D5A000-memory.dmp

      Filesize

      1.0MB

    • memory/1536-969-0x0000000005630000-0x0000000005C48000-memory.dmp

      Filesize

      6.1MB

    • memory/1536-63-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-972-0x0000000005D80000-0x0000000005DBC000-memory.dmp

      Filesize

      240KB

    • memory/1536-973-0x0000000005F10000-0x0000000005F5C000-memory.dmp

      Filesize

      304KB

    • memory/1536-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-971-0x0000000005D60000-0x0000000005D72000-memory.dmp

      Filesize

      72KB

    • memory/1536-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-90-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-92-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-94-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-96-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-79-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp

      Filesize

      252KB

    • memory/1536-62-0x0000000004E10000-0x0000000004E54000-memory.dmp

      Filesize

      272KB

    • memory/1536-61-0x00000000025D0000-0x0000000002616000-memory.dmp

      Filesize

      280KB

    • memory/4640-43-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4640-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4640-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4640-51-0x0000000002440000-0x000000000246D000-memory.dmp

      Filesize

      180KB

    • memory/4640-50-0x0000000000860000-0x0000000000960000-memory.dmp

      Filesize

      1024KB

    • memory/4640-22-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-23-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-25-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-27-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-29-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-32-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-35-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-37-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-39-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-41-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-45-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-47-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-49-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-33-0x00000000054A0000-0x00000000054B2000-memory.dmp

      Filesize

      72KB

    • memory/4640-21-0x00000000054A0000-0x00000000054B8000-memory.dmp

      Filesize

      96KB

    • memory/4640-20-0x0000000004EB0000-0x0000000005454000-memory.dmp

      Filesize

      5.6MB

    • memory/4640-19-0x0000000004E10000-0x0000000004E2A000-memory.dmp

      Filesize

      104KB

    • memory/4640-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4640-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4640-16-0x0000000002440000-0x000000000246D000-memory.dmp

      Filesize

      180KB

    • memory/4640-15-0x0000000000860000-0x0000000000960000-memory.dmp

      Filesize

      1024KB