Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:13

General

  • Target

    dba07033713c3c8362119985150049a747b7a3fa42cb51799c6213defb87d25b.exe

  • Size

    989KB

  • MD5

    2989659a9a9e9d52bbaac77420eb2c5d

  • SHA1

    5da1398ec4cfb3d8c590d7f471491f20e6fe8bd3

  • SHA256

    dba07033713c3c8362119985150049a747b7a3fa42cb51799c6213defb87d25b

  • SHA512

    8abc0cf62cf274a91ab62e7c94a94a00bbe85cc687005880b0de5e6c05a4313e4e101f0515dcfb284e605f447754dd97a05c97b26fd6fe700fa9f35483860116

  • SSDEEP

    24576:aybCCJ/fO9N1qtiAf+MIUvV/HMhS/w2/Yqol/peVJO8+:h2wHOFeH+3S9sho/Lol/MLO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dba07033713c3c8362119985150049a747b7a3fa42cb51799c6213defb87d25b.exe
    "C:\Users\Admin\AppData\Local\Temp\dba07033713c3c8362119985150049a747b7a3fa42cb51799c6213defb87d25b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2524.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2524.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8616.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8616.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4072.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4072.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8603.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8603.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7780Ml.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7780Ml.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3596
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 1072
              6⤵
              • Program crash
              PID:1192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w17Ks24.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w17Ks24.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3596 -ip 3596
    1⤵
      PID:3668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2524.exe

      Filesize

      805KB

      MD5

      79987ba80404831d8a76e7c5a8d4a92a

      SHA1

      b1af665e1678ddc1745a7a2a8c9478816cdce0b2

      SHA256

      915fa2fd91a6354a7c1eb2bde54ec764b3950f0a57421a4c65be354ca1c5d524

      SHA512

      15646188125707a431569f6b47e781a3afc5740eb6493b56726ae9163c2fbd1f19b2495b8cb52b305f1fcdb9d898ee66be3a521da0a7f487b186587047412e50

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8616.exe

      Filesize

      663KB

      MD5

      2c146b727c2ef796458b167f6d4aa558

      SHA1

      18c1c28f69f6f1ebafea38be721d94ade279a1d4

      SHA256

      15bcb9c2b14020d7aa979d7411db172603d09933bd732e81daa5801219acc1da

      SHA512

      bbb10074cec5451fe7f6ea5bcd759680d17d9cf1b896a872355e46c36616a288886310730386b4ab2f46cbecfcc30857ede24b111911c80bb1bedb09cf18b067

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w17Ks24.exe

      Filesize

      333KB

      MD5

      0ffcd2ed750e7af3e8fff35ad2513fe3

      SHA1

      c8b3580f9e629899db6289d4f456905203f6ece9

      SHA256

      726f3cbccf1193d86006d116138f3cf00c833a37ed442bd98c327d2b0f3139cb

      SHA512

      c94e60a8f2dc2ee86e5a20e8895987cf109f6307645cdb3f385bd813e0789e9276e75b1e1f33d11d3ac3d3d885f5959080c6e69cdb074846fae71b4112bf63d5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4072.exe

      Filesize

      327KB

      MD5

      bab91e02e797412fd95898894a79642b

      SHA1

      d5119ca2c148d9a0ecd780ce5d165c665c8fb0a6

      SHA256

      35a372b3ba6f1f82fa36116557c718e01ae2d082ed44cbc5d25306157572e23f

      SHA512

      33c14594146533ef06ec57839517cd599e10e94a2ef370925ec4f305b3bef2f886b6670a9057e630afef959bd141986c734efcfca48028fee0865f00391844d9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8603.exe

      Filesize

      12KB

      MD5

      e09c9ac8eb0d28f92ca3d93544bee0a7

      SHA1

      a8847e3a88e8abd9ca7bb1c39b7de42c9023669b

      SHA256

      221f231d3baa43c6da7ee7de3c9d1a017de815eb0604f366458028d84518edb5

      SHA512

      bc37e934e8837330d6469909dd8a1aa90cc4df390806242fd412421c17e51a8be9154cccf8b7e1df56959e2b870c4cb08f418f269004dda02bbe61d4e8373fe4

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7780Ml.exe

      Filesize

      275KB

      MD5

      80cec86b7d713c81950a13e4ad70bd2f

      SHA1

      5ca14bea041da40b6934745b8dd93517b32e0529

      SHA256

      3ca9da774de7f4170bc290f220dfd360e203b65187ab980c945d024eaa9a0955

      SHA512

      e20f9f0ae1dab814f96d8fad2b52fc908e833a1ee5fa3d3c76c07bff0192121c29b8c7817640783876705383afda62d288beae2112f567b1bdf1dd0024c85006

    • memory/644-28-0x0000000000200000-0x000000000020A000-memory.dmp

      Filesize

      40KB

    • memory/3596-34-0x0000000004BD0000-0x0000000004BEA000-memory.dmp

      Filesize

      104KB

    • memory/3596-35-0x0000000007180000-0x0000000007724000-memory.dmp

      Filesize

      5.6MB

    • memory/3596-36-0x0000000004DD0000-0x0000000004DE8000-memory.dmp

      Filesize

      96KB

    • memory/3596-38-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-62-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-60-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-58-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-56-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-54-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-52-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-50-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-48-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-46-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-44-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-42-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-40-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-37-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-64-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

      Filesize

      72KB

    • memory/3596-65-0x0000000000400000-0x0000000002B73000-memory.dmp

      Filesize

      39.4MB

    • memory/3596-67-0x0000000000400000-0x0000000002B73000-memory.dmp

      Filesize

      39.4MB

    • memory/3828-73-0x0000000007180000-0x00000000071C4000-memory.dmp

      Filesize

      272KB

    • memory/3828-72-0x0000000004BB0000-0x0000000004BF6000-memory.dmp

      Filesize

      280KB

    • memory/3828-107-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-105-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-103-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-101-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-99-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-97-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-95-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-93-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-91-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-89-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-87-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-85-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-83-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-81-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-79-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-77-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-75-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-74-0x0000000007180000-0x00000000071BF000-memory.dmp

      Filesize

      252KB

    • memory/3828-980-0x00000000078A0000-0x0000000007EB8000-memory.dmp

      Filesize

      6.1MB

    • memory/3828-981-0x0000000007EC0000-0x0000000007FCA000-memory.dmp

      Filesize

      1.0MB

    • memory/3828-982-0x00000000072B0000-0x00000000072C2000-memory.dmp

      Filesize

      72KB

    • memory/3828-983-0x0000000007FD0000-0x000000000800C000-memory.dmp

      Filesize

      240KB

    • memory/3828-984-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB