Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 07:57

General

  • Target

    8155fc4671b153e422910b26c71398b7239a16b09062de8fdfde62d53d6183dc.exe

  • Size

    674KB

  • MD5

    ec4108aac341b0aa0c1cdc2234f4e40d

  • SHA1

    f47e910489a8695969fffa4592659b8c6111bc12

  • SHA256

    8155fc4671b153e422910b26c71398b7239a16b09062de8fdfde62d53d6183dc

  • SHA512

    4dfc135da4a5aa95cc6b4fc17abc32ca70a2f1fa69e47c69ad18ece059b015fb3220e935ea559f983efaa7a49961dfc7c8523d3d5c0c22cf39e801ff8c98ca84

  • SSDEEP

    12288:6MrJy90zYJXE1+K5o+mKo6gGK7v69kp8CqdQo3xI8uHuXP42XAGk8gRIr1:Xyhg+p+mKo6czHcbe242XAG3Vr1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8155fc4671b153e422910b26c71398b7239a16b09062de8fdfde62d53d6183dc.exe
    "C:\Users\Admin\AppData\Local\Temp\8155fc4671b153e422910b26c71398b7239a16b09062de8fdfde62d53d6183dc.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072950.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072950.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1504.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1080
          4⤵
          • Program crash
          PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9968.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9968.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4936 -ip 4936
    1⤵
      PID:4504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072950.exe

      Filesize

      533KB

      MD5

      c147ee241479df887b2577e9051fb8f4

      SHA1

      3d7cad882cbe3f893248ec5498a73aec26c10a4b

      SHA256

      729f34a7c6b3340b0deaff0d0c4039ecfbe8a7b66465bec0f5bf9d10b69b555c

      SHA512

      f8bb1d9e6d9277aa3864af6f05736bb33ec7e5292e590febba776d4603fc1a8a7d0799990a57bfd4ae260d5368f90fb8a9c007da3b90c83dcfe8389b81b8eb10

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1504.exe

      Filesize

      376KB

      MD5

      b7262dba9edf58ab93d187afb2ab422c

      SHA1

      f7578b45c75940cc6108cb40facd26d79cf894ff

      SHA256

      ad84edef5424a5bca4de0c7eb7e1a3ea380b54b3829b9692e707a1cabb58830c

      SHA512

      9f137955dcc5749d818752fc56953f295239850b6ea996620844530d096df54415f1393ddb9e8883889ea97b02f960fddf856be5464bf222777a3237a5c2ba15

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9968.exe

      Filesize

      435KB

      MD5

      0c301bf398d33f17be3be258a32d4a2f

      SHA1

      d3fdea357fc0e45c76b3d3bbdfbf9aac16b663cc

      SHA256

      c0b788be9fa551ace0ce30a48083193e9f95a44aa77d000172507d64aee57ed2

      SHA512

      48e2de57b8fc1d0aafe53d9c31a807f07edfef7a786c34f8002f648989b66b33737e47cec285a6b4d46420150904ffbdaed3863f1c76544278c40d53d28b5e88

    • memory/3964-88-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-95-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-970-0x00000000075B0000-0x00000000076BA000-memory.dmp

      Filesize

      1.0MB

    • memory/3964-969-0x0000000006F50000-0x0000000007568000-memory.dmp

      Filesize

      6.1MB

    • memory/3964-74-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-76-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-80-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-82-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-84-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-86-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-972-0x0000000007710000-0x000000000774C000-memory.dmp

      Filesize

      240KB

    • memory/3964-973-0x0000000007860000-0x00000000078AC000-memory.dmp

      Filesize

      304KB

    • memory/3964-90-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-971-0x00000000076F0000-0x0000000007702000-memory.dmp

      Filesize

      72KB

    • memory/3964-96-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-63-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-64-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-66-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-78-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-92-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-70-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-72-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-68-0x00000000068D0000-0x000000000690F000-memory.dmp

      Filesize

      252KB

    • memory/3964-62-0x00000000068D0000-0x0000000006914000-memory.dmp

      Filesize

      272KB

    • memory/3964-61-0x00000000042B0000-0x00000000042F6000-memory.dmp

      Filesize

      280KB

    • memory/4936-43-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-55-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4936-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4936-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4936-51-0x0000000000730000-0x000000000075D000-memory.dmp

      Filesize

      180KB

    • memory/4936-50-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB

    • memory/4936-22-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-33-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-23-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-37-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-25-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-27-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-31-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-36-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-39-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-41-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-45-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-47-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-49-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-29-0x0000000005110000-0x0000000005122000-memory.dmp

      Filesize

      72KB

    • memory/4936-21-0x0000000005110000-0x0000000005128000-memory.dmp

      Filesize

      96KB

    • memory/4936-20-0x0000000004B20000-0x00000000050C4000-memory.dmp

      Filesize

      5.6MB

    • memory/4936-19-0x00000000024A0000-0x00000000024BA000-memory.dmp

      Filesize

      104KB

    • memory/4936-18-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4936-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4936-16-0x0000000000730000-0x000000000075D000-memory.dmp

      Filesize

      180KB

    • memory/4936-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

      Filesize

      1024KB