Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 13:50

General

  • Target

    1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe

  • Size

    659KB

  • MD5

    a0849e77b41c61c577173c4dd4710f04

  • SHA1

    607f5f4ad01842f3cfd2977f0baa0276a1cc0cba

  • SHA256

    1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510

  • SHA512

    3287c52c881518161800413689ff2d13e280a6ac3d6d66480d1d22cbcb33cbf7e09afa308d4aca23d48f43258c12ad42094b4d89d18498a14c19a5a7b41f8c59

  • SSDEEP

    12288:mMrZy90iPWKWrdrHmZbX9ohUChGc2501RIguPr6N3u:rybPWKQdjmZE9fU0LItPrKu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe
    "C:\Users\Admin\AppData\Local\Temp\1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un796925.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un796925.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9136.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1096
          4⤵
          • Program crash
          PID:4396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6008.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6008.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1604
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3904 -ip 3904
    1⤵
      PID:4364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un796925.exe

      Filesize

      516KB

      MD5

      3e6619b2229cce972abeaa4b8a08a852

      SHA1

      a9b4c755c5b7e254888da1fd6d9c0bfc455525bd

      SHA256

      13c1a8511f0fd6a5906459e8c84edb0f4230466b79a344c6619dfe243eb350b7

      SHA512

      c4cc7ec07e05e7997e9b3c6669bdcc471b45f873ef68b08491e4ad3b8bea03dbf207df87fa1ad975355d8f7f17dfd66faa0ede25de5d9b5e607369a045bb289f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9136.exe

      Filesize

      236KB

      MD5

      4605dd99b8ba8fca76360c5768092454

      SHA1

      3505c0aa7e6dbda4026a449f4954a44b42e3b15b

      SHA256

      73f4a4ff09ec3cc07459873f06d2a6d2bcc9da4805cb6b38677313d9553e680a

      SHA512

      fd0df53440e500bac297b72d449f2d564a27913c1996cdb908d4dbcd5522676e91939d9bdc0309add0e37f335476b15571dc8c174ddf69f8ed69754cde43b1cd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6008.exe

      Filesize

      294KB

      MD5

      ddcc1b5fbf63ee3ba78362086f3062bb

      SHA1

      9392e43dfa4f5f52c355cce0e46af76b493a57a7

      SHA256

      910f1b453722ec17bea20f3f8ea3db27a6ab5c41faf4cc61d03617e73e715dbb

      SHA512

      2823c509edbaa82608649e7ccb98c84745327ffcca42927ba4fbb15df5898b69c7da446f48349b77b7d5f3541036d70539ccb5be59009414b83a90c4d2479587

    • memory/1604-74-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-77-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-969-0x0000000004BB0000-0x0000000004CBA000-memory.dmp

      Filesize

      1.0MB

    • memory/1604-968-0x0000000005280000-0x0000000005898000-memory.dmp

      Filesize

      6.1MB

    • memory/1604-62-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-63-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-65-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-85-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-70-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-71-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-971-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/1604-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/1604-76-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-970-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/1604-79-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-81-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-87-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-89-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-91-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-93-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-95-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-83-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-67-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/1604-61-0x0000000004AF0000-0x0000000004B34000-memory.dmp

      Filesize

      272KB

    • memory/1604-60-0x0000000002410000-0x0000000002456000-memory.dmp

      Filesize

      280KB

    • memory/3904-43-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3904-54-0x0000000000400000-0x00000000004AA000-memory.dmp

      Filesize

      680KB

    • memory/3904-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3904-50-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB

    • memory/3904-23-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-25-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-27-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-29-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-32-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-33-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-35-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-37-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-40-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-41-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-45-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-47-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-49-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-22-0x0000000002700000-0x0000000002712000-memory.dmp

      Filesize

      72KB

    • memory/3904-21-0x0000000002700000-0x0000000002718000-memory.dmp

      Filesize

      96KB

    • memory/3904-20-0x0000000004C90000-0x0000000005234000-memory.dmp

      Filesize

      5.6MB

    • memory/3904-19-0x0000000002390000-0x00000000023AA000-memory.dmp

      Filesize

      104KB

    • memory/3904-18-0x0000000000400000-0x00000000004AA000-memory.dmp

      Filesize

      680KB

    • memory/3904-17-0x0000000000400000-0x00000000004AA000-memory.dmp

      Filesize

      680KB

    • memory/3904-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3904-15-0x0000000000560000-0x0000000000660000-memory.dmp

      Filesize

      1024KB