Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 11:48

General

  • Target

    f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe

  • Size

    694KB

  • MD5

    2ffd2c00d39ff9c7985070760ffcb848

  • SHA1

    2504978caf38bebfd5ec4ae9a4f60fa8411464e4

  • SHA256

    f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174

  • SHA512

    fdb9f64fa443907456c96034a2cb58b34a827871e0a9a89da8ef55b39644c4b071db9da18df597037614d415985c5656a82b000722ea04c303392f846f426ba1

  • SSDEEP

    12288:SMrOy90LnUOiHXmHG0MENKXyaDzoq3qX+CTP5pV2ElZAipuTXA4ApmUU21PA:syInUN3mHjMgKXyOU//TPjjlRuDAHmU2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe
    "C:\Users\Admin\AppData\Local\Temp\f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888051.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8785.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8785.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1084
          4⤵
          • Program crash
          PID:1284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7684.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7684.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4356
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1652 -ip 1652
    1⤵
      PID:4004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888051.exe

      Filesize

      553KB

      MD5

      a63901664b1d837362e076d9a11c326f

      SHA1

      2541a07fbd3dfc45b578783360070bb84a7ffdca

      SHA256

      605975c49b89b5a5ec4498aaadd9108fcbd2f2b3d1117e2b3d1baaf68ea12676

      SHA512

      0705d8a94a168b6e70f9c67c54859f420811cbcc701ddf65188be2391d84dd8e34e183a1f62c32cb300e5dd6e553fad97f3b619d42321cae4d0dab261c10b73d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8785.exe

      Filesize

      347KB

      MD5

      c7387b4b9aa767d4adfa724eb0b8caba

      SHA1

      9f7f08a9d235bec0ee4a06b7a9fa065430f2b99b

      SHA256

      69c87fd054d67b05d7f60730e7cedc0c8bafbb6f30abc4f275d8d3fcf7ef4cc4

      SHA512

      9f9410e4ad61dfacc99d2c15e5607f688c2cdf5a54fbba122d905f6c33cb7df07bc6154d5ae33dbe000118e791f9a1b0b4ad97fbf99db3eb9122374573122186

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7684.exe

      Filesize

      405KB

      MD5

      074a00cc38d027686586d49e56774fae

      SHA1

      60a21c98c7a98c902f6a42fb7378ff70552cfe68

      SHA256

      929b82cca68fc9a6388095a31d96d581a1705778e18567f02d31126d647dbe15

      SHA512

      14816622eb96ce1d48c7cef34fbc4efed715733890e1bf1836f87f1ab69811a646dcf7e84e968650bc97b54239634c0581adc0b39c5b5b77495eded5fb772f1d

    • memory/1652-15-0x0000000002D30000-0x0000000002E30000-memory.dmp

      Filesize

      1024KB

    • memory/1652-16-0x0000000002C80000-0x0000000002CAD000-memory.dmp

      Filesize

      180KB

    • memory/1652-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1652-18-0x0000000004970000-0x000000000498A000-memory.dmp

      Filesize

      104KB

    • memory/1652-19-0x00000000073C0000-0x0000000007964000-memory.dmp

      Filesize

      5.6MB

    • memory/1652-20-0x0000000004D70000-0x0000000004D88000-memory.dmp

      Filesize

      96KB

    • memory/1652-24-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-46-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-45-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-42-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-40-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-38-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-36-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-34-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-32-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-48-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-30-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-28-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-26-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-21-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-22-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/1652-49-0x0000000002D30000-0x0000000002E30000-memory.dmp

      Filesize

      1024KB

    • memory/1652-50-0x0000000002C80000-0x0000000002CAD000-memory.dmp

      Filesize

      180KB

    • memory/1652-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1652-51-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/1652-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1652-54-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/4356-60-0x00000000048E0000-0x0000000004926000-memory.dmp

      Filesize

      280KB

    • memory/4356-61-0x0000000007780000-0x00000000077C4000-memory.dmp

      Filesize

      272KB

    • memory/4356-93-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-95-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-91-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-89-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-87-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-85-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-83-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-79-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-77-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-75-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-73-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-72-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-69-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-67-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-81-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-65-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-63-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-62-0x0000000007780000-0x00000000077BF000-memory.dmp

      Filesize

      252KB

    • memory/4356-968-0x00000000077D0000-0x0000000007DE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4356-969-0x0000000007E70000-0x0000000007F7A000-memory.dmp

      Filesize

      1.0MB

    • memory/4356-970-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

      Filesize

      72KB

    • memory/4356-971-0x0000000007FD0000-0x000000000800C000-memory.dmp

      Filesize

      240KB

    • memory/4356-972-0x0000000008120000-0x000000000816C000-memory.dmp

      Filesize

      304KB