Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:05

General

  • Target

    e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe

  • Size

    991KB

  • MD5

    e81ad2f72254acf7e4f6f48c12620a16

  • SHA1

    5168d53d4a2c5d7caf4ddade01c6c880e46b03d8

  • SHA256

    e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe

  • SHA512

    6cc0c548cde2f3709d38e09815fd2db1e9c6745f38c55a332d6c10dc1acb6bc55d9ed8ee2ed83d2a2a80214833e2a005a78a443159511f1108c5e2b6d7261bdb

  • SSDEEP

    24576:GyFGHm6wvAqXpwP0IxCDtrI2w/HqQxIFjr40k:Vl6wvBphI2sqQxmjE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe
    "C:\Users\Admin\AppData\Local\Temp\e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1883.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1883.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0662.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0662.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9172.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9172.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4532
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0918ZK.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0918ZK.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1500
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 1100
              6⤵
              • Program crash
              PID:4424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w09uS99.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w09uS99.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1500 -ip 1500
    1⤵
      PID:1624
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:5596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1883.exe

      Filesize

      807KB

      MD5

      ccd8818d5dfbb71c6c0182a441ebacda

      SHA1

      3409d5e55cbdfef9accad1207b372d7df55edbf0

      SHA256

      1ecd08e4d8e07176d4221f322d6536b21671db787f3262d48d1071c67fb53064

      SHA512

      361d8093ddff5949fd750e09ad1c51ddb7d0d32488033394c3ed9501c9049825588628378609dc073de888bbdd5a0f0d8532e5f2bebef47171d3686b5f81a1b7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0662.exe

      Filesize

      665KB

      MD5

      c67f90ba161a2f513cfb8a56ddf08f36

      SHA1

      0e517c71e5c6a787d2765d3e9e39b2738ef64c07

      SHA256

      90a73f0dc025dbac4657ec443352f4574946907cc65924ec13d37de40368a4f7

      SHA512

      108c33a91db7848203ff2d1dae8edf31cf7088a747dec06a77e06c0b49ccab4e6370773d21b166a28b9f03aeeeae84f8b3c1c7a0d7ec5ec4d284a6888f1470f8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w09uS99.exe

      Filesize

      342KB

      MD5

      7b30cc1a6f766de1ab06a8fc80303247

      SHA1

      6ca317741677686a84d2326a78b9a34bc39f55a3

      SHA256

      72e8a6f3749679daaa549478b8ded4dbf4301e92b8d48e4414bd0f5ab3ea177b

      SHA512

      cb42444f0f5ed9c43abd728f234f7c90db319c6ebf1db175309d87b5a1baa5268506f583c7a306bca8aaca3b9b48bee4550748a3ce2eff1990f1c1a6942f4e23

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9172.exe

      Filesize

      329KB

      MD5

      700cc2808f873915d0ce46215ccec5f5

      SHA1

      f595a5dec8852edbd003401fc408b2829a088eb9

      SHA256

      cb74957ab5fc6f0057bf0fccce230852c4e7dbc2ce5ac78cd9c85d7326b60e9a

      SHA512

      a7a527e44127a5b4dbde15bc8bccf64d4cd15d18efd50cc781b11e947a81000144fce7b031ffac72c78d220d4336ec0e24f9d0d3492b0879b38abd2b857d23c3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exe

      Filesize

      11KB

      MD5

      deca37f9a132e24ec089ac0ddaf6c6d5

      SHA1

      c31528bb75bcdbd0e5af6f9c38f3f6121768fe03

      SHA256

      685d946b39e750f1327d63291be9795c435ac34cc45c2b06c9304437ba9c1a19

      SHA512

      1ce6320d6a855a332bca720aa182bb82763e5ae130af9d3918c12e2162a1786edf894d5607c314823693154a7ab223f599ebde71a0b262b8cabba84c6f5b5e99

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0918ZK.exe

      Filesize

      284KB

      MD5

      1c2e652a5e971db7bf2cf0d57e071386

      SHA1

      15311954ac99526eeb865e54a74d7e7dd3cf22e9

      SHA256

      92b6bc528c6cfafe33ee2423053eb41635bcf3fe5d9dc98a1ce5a04904e470c7

      SHA512

      a4ba8f825896386f2a8bcee6e8ca9c90a16f541f74a65da4edf56515303e1579d4cf188c845589dcbeb425cbdae28470a678d8dfd546559efbf1a6d550f9310c

    • memory/1500-34-0x0000000004C10000-0x0000000004C2A000-memory.dmp

      Filesize

      104KB

    • memory/1500-35-0x0000000007260000-0x0000000007804000-memory.dmp

      Filesize

      5.6MB

    • memory/1500-36-0x0000000007120000-0x0000000007138000-memory.dmp

      Filesize

      96KB

    • memory/1500-44-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-64-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-62-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-60-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-58-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-56-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-54-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-52-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-50-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-48-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-46-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-42-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-40-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-38-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-37-0x0000000007120000-0x0000000007132000-memory.dmp

      Filesize

      72KB

    • memory/1500-65-0x0000000000400000-0x0000000002B75000-memory.dmp

      Filesize

      39.5MB

    • memory/1500-67-0x0000000000400000-0x0000000002B75000-memory.dmp

      Filesize

      39.5MB

    • memory/1840-28-0x0000000000EA0000-0x0000000000EAA000-memory.dmp

      Filesize

      40KB

    • memory/4336-72-0x0000000004B20000-0x0000000004B66000-memory.dmp

      Filesize

      280KB

    • memory/4336-73-0x0000000004C00000-0x0000000004C44000-memory.dmp

      Filesize

      272KB

    • memory/4336-97-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-107-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-105-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-103-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-101-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-99-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-95-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-93-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-91-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-89-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-87-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-85-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-83-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-81-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-79-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-77-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-75-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-74-0x0000000004C00000-0x0000000004C3F000-memory.dmp

      Filesize

      252KB

    • memory/4336-980-0x0000000007A20000-0x0000000008038000-memory.dmp

      Filesize

      6.1MB

    • memory/4336-981-0x0000000007320000-0x000000000742A000-memory.dmp

      Filesize

      1.0MB

    • memory/4336-982-0x0000000004E60000-0x0000000004E72000-memory.dmp

      Filesize

      72KB

    • memory/4336-983-0x0000000004E80000-0x0000000004EBC000-memory.dmp

      Filesize

      240KB

    • memory/4336-984-0x0000000008140000-0x000000000818C000-memory.dmp

      Filesize

      304KB