Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 07:58

General

  • Target

    bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe

  • Size

    697KB

  • MD5

    5c973d896cd79f2f815126371799050b

  • SHA1

    8f252014e29d31d82024dd940c5c24853c8441b7

  • SHA256

    bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b

  • SHA512

    de0835cb983e7239d6ad4111c612d0736d37686d49d50fc86fcb38f71d46c3d92bffad03f6d637d7f161e763c0a06910341e2c188c4687f7e88a7511b21d4d89

  • SSDEEP

    12288:LMrhy907hv0+jqPfJvdgbXsU9SOZNkxbB0eHXJ3k5QbgKSpfpXx:WyGvTjqPfAzf2Txd0npf9x

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 1080
          4⤵
          • Program crash
          PID:2384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2432
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3732 -ip 3732
    1⤵
      PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe

      Filesize

      555KB

      MD5

      9bd107ee7371667e383e63ac71fc286b

      SHA1

      2c6dff10d6e2c575d73a395914e341e01d7c1eb8

      SHA256

      64c0d243c6c56939596cffae70fcc122ebe5d489933167ea9080cd86ad594c86

      SHA512

      c78091bf9d93e17f60610680bc6b71c7fed88758fb8bc378c0ee8b391e16b9c7529e3f39f17dc424e4d2f235cd966aefb528f31afcb7e90e2be70aa0911af696

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe

      Filesize

      348KB

      MD5

      50802132a7e4842390ce0414133a5f13

      SHA1

      efc2b3c58c104cdf21772a3b4ce9fb945d6bb4a6

      SHA256

      8abb8831093245a84eb7547c76095a69dce91cd791455fb1c4a015b6d6eef0f3

      SHA512

      e7f3378ef4cc113c33c5bcb35d7516768d575eae634f2f625dadd712de2bdcb8c105daa303c2165f57ae9f20dae2d3401685deb5350d42b92b8578bb6b67e54d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe

      Filesize

      406KB

      MD5

      ec93ad5c4639a2eb1cfb23901ad003f6

      SHA1

      227a1220e471fb32c112e48bdc849588893eaf94

      SHA256

      787b071d554f6c92d43262ed91522bb6b07496bfda01262a234fa83e04ab5797

      SHA512

      97552e95fb9286c513073159e9d1c2af266d8bb70fd0ea941cc6be8f22daf341cafc94e18387e4726bb2ff657de68374a34cce19796f236a8f1ecbb3980d7e63

    • memory/2432-71-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-75-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-969-0x0000000007FB0000-0x00000000080BA000-memory.dmp

      Filesize

      1.0MB

    • memory/2432-968-0x0000000007910000-0x0000000007F28000-memory.dmp

      Filesize

      6.1MB

    • memory/2432-62-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-67-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-77-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-63-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-65-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-69-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-971-0x0000000008110000-0x000000000814C000-memory.dmp

      Filesize

      240KB

    • memory/2432-972-0x0000000008260000-0x00000000082AC000-memory.dmp

      Filesize

      304KB

    • memory/2432-73-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-970-0x00000000080F0000-0x0000000008102000-memory.dmp

      Filesize

      72KB

    • memory/2432-79-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-81-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-83-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-85-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-87-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-89-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-93-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-95-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-91-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/2432-61-0x0000000007780000-0x00000000077C4000-memory.dmp

      Filesize

      272KB

    • memory/2432-60-0x0000000004D90000-0x0000000004DD6000-memory.dmp

      Filesize

      280KB

    • memory/3732-44-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-54-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/3732-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3732-51-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/3732-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3732-50-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

      Filesize

      180KB

    • memory/3732-49-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

      Filesize

      1024KB

    • memory/3732-25-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-26-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-28-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-30-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-32-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-34-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-36-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-38-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-40-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-46-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-48-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-42-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-21-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-22-0x0000000007130000-0x0000000007142000-memory.dmp

      Filesize

      72KB

    • memory/3732-20-0x0000000007130000-0x0000000007148000-memory.dmp

      Filesize

      96KB

    • memory/3732-19-0x00000000072C0000-0x0000000007864000-memory.dmp

      Filesize

      5.6MB

    • memory/3732-18-0x0000000004B60000-0x0000000004B7A000-memory.dmp

      Filesize

      104KB

    • memory/3732-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3732-16-0x0000000002CD0000-0x0000000002CFD000-memory.dmp

      Filesize

      180KB

    • memory/3732-15-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

      Filesize

      1024KB