Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 12:19

General

  • Target

    4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe

  • Size

    689KB

  • MD5

    54c249b90808ac4b4f4ece502024cea7

  • SHA1

    16cf05ae44cf770352157247e0d6334683886116

  • SHA256

    4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6

  • SHA512

    356ab3060a975e5ac4c717dc5a77ecdbb7ab912e18bd004e72dae80278efe380b610145c5458a1f72de6ec50a568dfe870d888eb4c33bce30f5561e2d2cdd660

  • SSDEEP

    12288:UMruy90esd9R3dyWWcks+1iBaavpN1X8Yju5mUJXgkMHOVZeJo:ayFsd9p5s3Bavp5u4+gkMHBJo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe
    "C:\Users\Admin\AppData\Local\Temp\4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385418.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3827.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3827.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1080
          4⤵
          • Program crash
          PID:1392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6186.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6186.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4376 -ip 4376
    1⤵
      PID:4184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385418.exe

      Filesize

      535KB

      MD5

      9f40449edac5ad418f9ab73d4d363cc7

      SHA1

      9e7898358893d9023dab93257d33c5befcdc4c63

      SHA256

      16f0d7a7e5e7d05d18d56b7a3b26200dfd329f5be57b86fb9ec6d95e73a46a94

      SHA512

      4dc7e5d325fcedd21cd805ec9c2e9a3233cb5021a7cb916b5fe2e392d83bb789fd04526888b210db877ddf6736a5436053740e956a015bdc5099bf56741bae81

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3827.exe

      Filesize

      311KB

      MD5

      6e89c69c505e5c22008985f9d8fefd36

      SHA1

      9936c068d616f247ccb06cdfc77f261a83c3ded5

      SHA256

      64a71b03a9fd5a5c432d733a7d031eb80463e7d0a7600443935ee414ff773902

      SHA512

      93a982cdb4dc3f0ac186b10987a7a7bf8a14d9c07d5420ef487fff086d378dca15e6705f6236494f3bfad109d762ee55772a4964c3c0f8083f6ac72ea6e222b9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6186.exe

      Filesize

      370KB

      MD5

      c1e926a9f985ca44574497405244d1d9

      SHA1

      3e555fc82c3d411b8759a976ef382723ddf5c3d9

      SHA256

      40e10c7e0c0fd70fe752ddf8f1d1c9bc80e572dae446b833dfd285ea1c22fad4

      SHA512

      df2009d14fbba34c2626a83a00f4ffc5da4a6bb38a788e70efd206baa78e6d1af977b4b64f93d08b5784363cf4b8ff5b35d04174746f84db9c376f64af707217

    • memory/4376-16-0x0000000000910000-0x000000000093D000-memory.dmp

      Filesize

      180KB

    • memory/4376-15-0x0000000000B10000-0x0000000000C10000-memory.dmp

      Filesize

      1024KB

    • memory/4376-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4376-18-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/4376-19-0x0000000002880000-0x000000000289A000-memory.dmp

      Filesize

      104KB

    • memory/4376-20-0x0000000004F60000-0x0000000005504000-memory.dmp

      Filesize

      5.6MB

    • memory/4376-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp

      Filesize

      96KB

    • memory/4376-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

      Filesize

      72KB

    • memory/4376-50-0x0000000000B10000-0x0000000000C10000-memory.dmp

      Filesize

      1024KB

    • memory/4376-51-0x0000000000910000-0x000000000093D000-memory.dmp

      Filesize

      180KB

    • memory/4376-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4376-54-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/4540-60-0x0000000002870000-0x00000000028B6000-memory.dmp

      Filesize

      280KB

    • memory/4540-61-0x0000000004E30000-0x0000000004E74000-memory.dmp

      Filesize

      272KB

    • memory/4540-65-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-75-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-96-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-93-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-91-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-89-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-87-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-85-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-83-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-81-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-77-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-71-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-69-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-67-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-79-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-63-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-62-0x0000000004E30000-0x0000000004E6F000-memory.dmp

      Filesize

      252KB

    • memory/4540-968-0x0000000005610000-0x0000000005C28000-memory.dmp

      Filesize

      6.1MB

    • memory/4540-969-0x0000000005C30000-0x0000000005D3A000-memory.dmp

      Filesize

      1.0MB

    • memory/4540-970-0x0000000005D70000-0x0000000005D82000-memory.dmp

      Filesize

      72KB

    • memory/4540-971-0x0000000005D90000-0x0000000005DCC000-memory.dmp

      Filesize

      240KB

    • memory/4540-972-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

      Filesize

      304KB