Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 12:27

General

  • Target

    6e415b647f9ebb03cf380e0c1bcbb5958724544a55e4703335fd417d334e7a12.exe

  • Size

    659KB

  • MD5

    df436deba304e714b3d3e4da38aa0fe3

  • SHA1

    24ac52d118ed5012d3aa05d23182f02a3761424a

  • SHA256

    6e415b647f9ebb03cf380e0c1bcbb5958724544a55e4703335fd417d334e7a12

  • SHA512

    f1047961d5b7d05b7fbcfb111c2f7f4c8ffc0fef89fbb046739c4947757fcb27aec9255d5253f9555eed2ab1244d4b94ed9311256a9ddd5051b82e60d860ee5b

  • SSDEEP

    12288:dMrxy90qar5rwchvyH8zBpmCPGVcqVd+9pz+EQZxjunQZ:0yTa6Si8NpmGsIb+EQzjdZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e415b647f9ebb03cf380e0c1bcbb5958724544a55e4703335fd417d334e7a12.exe
    "C:\Users\Admin\AppData\Local\Temp\6e415b647f9ebb03cf380e0c1bcbb5958724544a55e4703335fd417d334e7a12.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308083.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308083.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1890.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 1028
          4⤵
          • Program crash
          PID:1452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4956 -ip 4956
    1⤵
      PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un308083.exe

      Filesize

      517KB

      MD5

      15dc58107f8db89d40aa81086cf19b85

      SHA1

      06dc168c53a0035eed42a137ad65e49ded7f150c

      SHA256

      93bb274c5118786c227c0b7dabece97b497b5b71e9fbf48f59741256b7ca3722

      SHA512

      b352aca4407c2a43754174fd378dac987e65eb219d416e34854472bda7fcb052d855aecad840041757be8937d718a9775429f64e0497c63cb7938549b3f0003b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1890.exe

      Filesize

      295KB

      MD5

      ccd7ca281701e656091256121684a87d

      SHA1

      8edbb3333743e5f937c226fb785555299d7cf7c7

      SHA256

      b0f91c82240b30d30f1c395e309031bc39660702912dc1bbb46a512b1c41f435

      SHA512

      2afb302dd8acbdc2978d929be9ef916a2e682a6bf3299f5e64e575dcac5874f07859fad28ecd0aa2a54c45f3322b05ece31f07b43a10dadb9200959580cd2e63

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1546.exe

      Filesize

      354KB

      MD5

      413998f2a6c6c7d99b0b87c4689705f4

      SHA1

      7c13582038d4f9f55f25364b54bff11a5a226e50

      SHA256

      4d0db39145146f321a9650e9fba216d21fd7f03f953f77967fd861bee39a4e0e

      SHA512

      ea09a58cbd6bef522f996d49d64771ed8ce72017aa060e7e95a3a34613f21518ffa3932dc62f64965988b9759110ac9897dc099ff862b95b3ba10b5ac406dd63

    • memory/2980-71-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-77-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-969-0x0000000007E60000-0x0000000007F6A000-memory.dmp

      Filesize

      1.0MB

    • memory/2980-968-0x00000000077D0000-0x0000000007DE8000-memory.dmp

      Filesize

      6.1MB

    • memory/2980-62-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-63-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-65-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-75-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-67-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-69-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-971-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

      Filesize

      240KB

    • memory/2980-60-0x0000000004A40000-0x0000000004A86000-memory.dmp

      Filesize

      280KB

    • memory/2980-73-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-970-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/2980-81-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-83-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-85-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-87-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-89-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-92-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-93-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-95-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-79-0x0000000007790000-0x00000000077CF000-memory.dmp

      Filesize

      252KB

    • memory/2980-61-0x0000000007790000-0x00000000077D4000-memory.dmp

      Filesize

      272KB

    • memory/2980-972-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB

    • memory/4956-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4956-54-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/4956-53-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/4956-50-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4956-49-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

      Filesize

      1024KB

    • memory/4956-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-31-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-35-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-47-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

      Filesize

      72KB

    • memory/4956-20-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/4956-19-0x0000000004BD0000-0x0000000004BE8000-memory.dmp

      Filesize

      96KB

    • memory/4956-18-0x0000000007350000-0x00000000078F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4956-17-0x00000000048C0000-0x00000000048DA000-memory.dmp

      Filesize

      104KB

    • memory/4956-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4956-15-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

      Filesize

      1024KB