Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 15:08

General

  • Target

    84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe

  • Size

    667KB

  • MD5

    acaa29981003e122ef6684cc2212478d

  • SHA1

    63c81db3ed8b015c400742695c0f838e2e1fc425

  • SHA256

    84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467

  • SHA512

    f60ce041a240454c9450713b30e6bb1d95e580ed141a0500c199ba760457612ef83123bf75e6d57d8a037f207446e87a7f49e42ebcfda51eaa814d1431e7599e

  • SSDEEP

    12288:oMrzy90vVknh9MUvrqcy9W816I31CizB2vIvALWjBrUUkH/wvZGddapU6:7ycV+heUGcy9731Ci1qWALWjBrefwvZv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe
    "C:\Users\Admin\AppData\Local\Temp\84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un877451.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un877451.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1080
          4⤵
          • Program crash
          PID:2160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9215.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9215.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1984 -ip 1984
    1⤵
      PID:436
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un877451.exe

      Filesize

      525KB

      MD5

      feecae739ee93d098274b01869628df8

      SHA1

      26ed6fbb3f9d40bd3ecc1164da44b3cc8f87413a

      SHA256

      cc1c18803efd97ae48bff9f1b9a45b70c0ef652384163b92d35834f75c84d904

      SHA512

      d1c911990e55555884a4916dc439f0968861cc46b7cd26f5e87853eb11dbb2dfd6da7571bb1516a73b2eebe5b3205e5b7bbd74f21020b013829aa38aef6092a1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exe

      Filesize

      294KB

      MD5

      db7368dac801e34d5f28f1c19b74085a

      SHA1

      8c46b2ec71793c5a2bdb53da8702f7744682c298

      SHA256

      8046b246ed41fe34495f9a134712b652b1d47df25c4bf3167140943077a7d9b2

      SHA512

      0dc4be03ff5e0330250abdc34a2330e14618bf4eaf273aef6ff26c1315fa4d031c4e4de1308d913a04c07142a0bdd1f612cddb0073fa8a390a187737b3442b55

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9215.exe

      Filesize

      352KB

      MD5

      90481eabc83659f6499744f71aab6307

      SHA1

      ae447afd0bb136f92cdb2496ecb64030b9849c9c

      SHA256

      5a760d56402f5d9dbac901a20dac618b68f64f182f6f65b2dfc06ad96e51a4d5

      SHA512

      67dd5e039b2224cefc8512e4ad317fb1addb694f460d002c0fcf65e0613e125aeecb94d79a1d65f8b3a10c422999b2d58258f5ad861a61892b264fa25cbe3c1e

    • memory/1984-15-0x0000000000830000-0x0000000000930000-memory.dmp

      Filesize

      1024KB

    • memory/1984-16-0x0000000000AB0000-0x0000000000ADD000-memory.dmp

      Filesize

      180KB

    • memory/1984-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1984-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/1984-19-0x00000000025A0000-0x00000000025BA000-memory.dmp

      Filesize

      104KB

    • memory/1984-20-0x0000000004E90000-0x0000000005434000-memory.dmp

      Filesize

      5.6MB

    • memory/1984-21-0x0000000002940000-0x0000000002958000-memory.dmp

      Filesize

      96KB

    • memory/1984-25-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-49-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-47-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-45-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-44-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-41-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-39-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-37-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-36-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-33-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-31-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-29-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-27-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-23-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-22-0x0000000002940000-0x0000000002952000-memory.dmp

      Filesize

      72KB

    • memory/1984-50-0x0000000000830000-0x0000000000930000-memory.dmp

      Filesize

      1024KB

    • memory/1984-51-0x0000000000AB0000-0x0000000000ADD000-memory.dmp

      Filesize

      180KB

    • memory/1984-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1984-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1984-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/4280-61-0x0000000004D80000-0x0000000004DC6000-memory.dmp

      Filesize

      280KB

    • memory/4280-62-0x00000000053F0000-0x0000000005434000-memory.dmp

      Filesize

      272KB

    • memory/4280-88-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-90-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-96-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-94-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-92-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-86-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-84-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-83-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-80-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-79-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-76-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-75-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-70-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-72-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-68-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-66-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-64-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-63-0x00000000053F0000-0x000000000542F000-memory.dmp

      Filesize

      252KB

    • memory/4280-969-0x0000000005440000-0x0000000005A58000-memory.dmp

      Filesize

      6.1MB

    • memory/4280-970-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

      Filesize

      1.0MB

    • memory/4280-971-0x0000000005C20000-0x0000000005C32000-memory.dmp

      Filesize

      72KB

    • memory/4280-972-0x0000000005C40000-0x0000000005C7C000-memory.dmp

      Filesize

      240KB

    • memory/4280-973-0x0000000005D90000-0x0000000005DDC000-memory.dmp

      Filesize

      304KB