Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 21:24

General

  • Target

    9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9.exe

  • Size

    988KB

  • MD5

    21b7870d0f106a67fc5786da0e4830e6

  • SHA1

    1c25bf8a36277a21fd2c9d5458087d6b4d64e5a5

  • SHA256

    9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9

  • SHA512

    0db6cac158b187427ca09c8db0eac3990ca84d419aaf4b3abfe59703a4de518858d500ece7690d092c5c30245f1a7dfa0597f5ab341a59083c0c5157b847cb05

  • SSDEEP

    24576:fytsW40n/twX95bWBWvzxapUKKlulXyZAEgPx1Xlhx:qtsI/6XvWuamKIugAEGx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9.exe
    "C:\Users\Admin\AppData\Local\Temp\9d4804e070ff68fed08a780ec041a9f13fac511946746ab6faa64db7baf729d9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1403.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1403.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5734.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5734.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7763.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7763.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3936
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0661.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0661.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4556
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7135Im.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7135Im.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2352
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 1080
              6⤵
              • Program crash
              PID:1820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w77rd80.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w77rd80.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2352 -ip 2352
    1⤵
      PID:944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1403.exe

      Filesize

      805KB

      MD5

      aae473b77edc7dc5b03f7ffd51079ca1

      SHA1

      8bcab463524c25f9d615c25a6d66cbe18a0816cc

      SHA256

      3938d620a7a3c622ea7e6d156bebbbd956b12ff0ffe9fc4a783098f7e45e3b89

      SHA512

      d6f719f5f975b21f44b1db7aa645fe8a0f1d0fb83e4e444554a1c063c5096ddd1514a2f666e7c38ec991546e63b1a9c75ab1983337b8b2ab3d5b2a15ad809f0e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5734.exe

      Filesize

      651KB

      MD5

      39a55614ed19bc54be45f85f83abafc4

      SHA1

      a7406345fde484139f4eb12fe6a72a2cbc61281d

      SHA256

      f45dec9eccb67b8933fe9905449abd605cf7e1910e5ba78940cfc2cf90755dd9

      SHA512

      08822785128a3919143b24c0094ef1450dc54af6017b4e0a14f149216c8cd028692de14f917edb0732eb205f94878529e7f443f3e5905bf32cdb596706260d63

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w77rd80.exe

      Filesize

      292KB

      MD5

      b0196e415ccd37b94993ec35ec632850

      SHA1

      692c199e5e16304fd09b7f29da7a6a342fc00141

      SHA256

      ec574c52620d57a887454a99e17e9e58901161e0a03c404a1f78c0e51946de94

      SHA512

      04401a3175440bac080587d492108361f668fcd1f51f59d2b6bbaf79a19f90b047e824244de4460aec65ad1d95fb87a49d2eeb2585a8ca5d5a8efec0f64db392

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7763.exe

      Filesize

      322KB

      MD5

      163eb624e886adbe388240aee1b656b6

      SHA1

      7900946bd204032eef9a6c2506fd007a2dd334f4

      SHA256

      d55b1e20df3e39a9bfe011d8b091e8e898c769b2f36508f7f73de5abb1cc8cdc

      SHA512

      6e61c518613f1066d5d37dce0803fe842330946c02d1b5a7351b518f3e613b0f4fe859b84ab34484adf97c4f183844749d8ca8306a7458347b0e1ecad2927fd4

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0661.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7135Im.exe

      Filesize

      235KB

      MD5

      561136deed072c7c530dc574edabd264

      SHA1

      dd382789ff198506cad2d0ce80f7e3240cfbdcfe

      SHA256

      612ed378b45906523bee08ff025c67cc732114d5df2cf574f1fcac1068921d18

      SHA512

      25862226971e3f6788e3e4bce2cef57860fe78bdb8bb97b972dbb7b75698258f8b87442edb7c6d93bd38bfbe4c845a8367c034aa0729271147164d94ae818f1a

    • memory/2352-67-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2352-35-0x0000000004CD0000-0x0000000005274000-memory.dmp

      Filesize

      5.6MB

    • memory/2352-36-0x0000000002290000-0x00000000022A8000-memory.dmp

      Filesize

      96KB

    • memory/2352-37-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-54-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-64-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-62-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-60-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-58-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-56-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-52-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-50-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-48-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-46-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-44-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-42-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-40-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-38-0x0000000002290000-0x00000000022A2000-memory.dmp

      Filesize

      72KB

    • memory/2352-65-0x0000000000400000-0x00000000004A8000-memory.dmp

      Filesize

      672KB

    • memory/2352-34-0x0000000002190000-0x00000000021AA000-memory.dmp

      Filesize

      104KB

    • memory/3088-77-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-87-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-73-0x00000000026B0000-0x00000000026F4000-memory.dmp

      Filesize

      272KB

    • memory/3088-984-0x0000000005B80000-0x0000000005BCC000-memory.dmp

      Filesize

      304KB

    • memory/3088-93-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-107-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-105-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-103-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-101-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-99-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-95-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-91-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-89-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-72-0x0000000002290000-0x00000000022D6000-memory.dmp

      Filesize

      280KB

    • memory/3088-85-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-83-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-81-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-79-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-97-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-75-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-74-0x00000000026B0000-0x00000000026EF000-memory.dmp

      Filesize

      252KB

    • memory/3088-980-0x00000000052F0000-0x0000000005908000-memory.dmp

      Filesize

      6.1MB

    • memory/3088-981-0x0000000005910000-0x0000000005A1A000-memory.dmp

      Filesize

      1.0MB

    • memory/3088-982-0x0000000005A20000-0x0000000005A32000-memory.dmp

      Filesize

      72KB

    • memory/3088-983-0x0000000005A40000-0x0000000005A7C000-memory.dmp

      Filesize

      240KB

    • memory/4556-28-0x0000000000120000-0x000000000012A000-memory.dmp

      Filesize

      40KB