Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:14

General

  • Target

    fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b.exe

  • Size

    695KB

  • MD5

    e63d1f32f877d60f730d4f1f3a6666bf

  • SHA1

    5cff9984ee9ab3fd64fe89cb9b59168497b8edff

  • SHA256

    fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b

  • SHA512

    436e32b282dd4f0471ea3f56c60f4df5173a05897358ff9b071aff03c61a613366659ea507b31479a22fdcfad80a59940e665a530c8a06437e0eb8b37bb23d44

  • SSDEEP

    12288:IMrty90bvb7dE7Q0kXoi/M8XLM5AQgq7YaDz/I85nQoVu0iZSiCszG:lyg7yIXv/FM5/gq7YOj35nQo1iJzG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b.exe
    "C:\Users\Admin\AppData\Local\Temp\fe605ef7abc8196a35aa3a648d0d06ed89e8fbdb344ed1c5095b2b87b292ed8b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204679.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204679.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5578.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1092
          4⤵
          • Program crash
          PID:1132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9721.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9721.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1268 -ip 1268
    1⤵
      PID:2164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204679.exe

      Filesize

      554KB

      MD5

      f5da8b6adf1b64b997e29542db3bb793

      SHA1

      225e115858f4a37d3418c9cf0eaef6f1207510c8

      SHA256

      f43d18e95d1a9a4be163889ae52f1c50fb57c148ccc8747558071ed8ba09ca3f

      SHA512

      bc9dda3bc207e09068d4c9070f3e3be23d22bc1178a07fba2d656d74d5d33e75e8da637e23bc1876c3b013967cbe00a373d0106617bd64cbed3f8d75a966c6b5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5578.exe

      Filesize

      347KB

      MD5

      652a53898cc3ac2a242ae0491ce4b771

      SHA1

      d8b9951cabb0777cb000f8b3d3109bdc9bceff51

      SHA256

      4f99fdf0c0a53d04badde3ef4be7185a9a4330ae0f39cac5a7d69f2d9a9d1743

      SHA512

      6b774fcb52282aceb1bc26f95c03b51112830ff8800d4199841912ef78c75d4d25dd5589ee3ea60479aa31d9b470e47488f21fd8f5d4f3df4c63c3c1a7318107

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9721.exe

      Filesize

      405KB

      MD5

      834162c58cea1ad72937369edfb3e253

      SHA1

      29047f0a6b4b3a688a4c9fab02a3d87e9a0475a3

      SHA256

      92f1debe522bbf0b88f59aeffb6976e82cf6fd9bd1f33a64626e4dc450731e31

      SHA512

      5cd6f3fa6595a16abd725d592e36d0aeebfc8006132ea356687c77f1f359be29d377ebd56fcd9644a6e4bbdcd072d25c7d6ee4318cd7b154c8e06b6d63cbb956

    • memory/1268-50-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/1268-48-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-18-0x00000000049F0000-0x0000000004A0A000-memory.dmp

      Filesize

      104KB

    • memory/1268-19-0x0000000007450000-0x00000000079F4000-memory.dmp

      Filesize

      5.6MB

    • memory/1268-20-0x0000000004BB0000-0x0000000004BC8000-memory.dmp

      Filesize

      96KB

    • memory/1268-21-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-53-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/1268-46-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-44-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-42-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-40-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-38-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-36-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-34-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-32-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-31-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-28-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-26-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-15-0x0000000002D10000-0x0000000002E10000-memory.dmp

      Filesize

      1024KB

    • memory/1268-22-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-49-0x0000000002D10000-0x0000000002E10000-memory.dmp

      Filesize

      1024KB

    • memory/1268-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1268-16-0x0000000002B90000-0x0000000002BBD000-memory.dmp

      Filesize

      180KB

    • memory/1268-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1268-24-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1268-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4308-60-0x0000000007770000-0x00000000077B4000-memory.dmp

      Filesize

      272KB

    • memory/4308-92-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-970-0x0000000007FD0000-0x000000000800C000-memory.dmp

      Filesize

      240KB

    • memory/4308-94-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-74-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-90-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-88-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-70-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-84-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-82-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-80-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-971-0x0000000008120000-0x000000000816C000-memory.dmp

      Filesize

      304KB

    • memory/4308-72-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-76-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-86-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-68-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-66-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-64-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-62-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-61-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB

    • memory/4308-967-0x00000000077D0000-0x0000000007DE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4308-968-0x0000000007E70000-0x0000000007F7A000-memory.dmp

      Filesize

      1.0MB

    • memory/4308-969-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

      Filesize

      72KB

    • memory/4308-59-0x0000000004BB0000-0x0000000004BF6000-memory.dmp

      Filesize

      280KB

    • memory/4308-78-0x0000000007770000-0x00000000077AF000-memory.dmp

      Filesize

      252KB