Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 16:41

General

  • Target

    798ec54a758f0225e651a96ab720a810fcca224e2e9cee0f74ace0dfdd07926f.exe

  • Size

    658KB

  • MD5

    ea653f56f7a7364ff6125f29f75ad4e6

  • SHA1

    f6503b9367af8b8b8a299c1b65b343be4872e747

  • SHA256

    798ec54a758f0225e651a96ab720a810fcca224e2e9cee0f74ace0dfdd07926f

  • SHA512

    2347e4bb0ce40b2b6ac7686391fd294aefbff347a5e3899a4de845671bedceef7c1edcef53236b1ecaec24877080d6bcfa2a5ae1d7020828687546c467618b6f

  • SSDEEP

    12288:xMrYy90tzleOVnCqC4cC693eVVQk6p+zCmNcpcwd0y+ELbkma:lyQICnVJcSVVQk6Uzic4rbkma

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\798ec54a758f0225e651a96ab720a810fcca224e2e9cee0f74ace0dfdd07926f.exe
    "C:\Users\Admin\AppData\Local\Temp\798ec54a758f0225e651a96ab720a810fcca224e2e9cee0f74ace0dfdd07926f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828789.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828789.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4625.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4625.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 1080
          4⤵
          • Program crash
          PID:1068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7694.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7694.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1292 -ip 1292
    1⤵
      PID:4860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828789.exe

      Filesize

      516KB

      MD5

      2c6c36009adfb4638b759818121b2aaf

      SHA1

      34177285e31b9319338140b5485b8ba08bbe1fab

      SHA256

      db68ba7f58c1cd1ad46a733a86988c6c4f6de98f2d1d68b4a3235c7298df559c

      SHA512

      55142cb2bb20c815ddf941140d56c6043878f9afa4608ad0f07efaa949aa919f09b7b0eb456e90dcc133385bc580807d66d7d4c25fb814ceb1ab906d897ee074

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4625.exe

      Filesize

      283KB

      MD5

      7faf1be22ed365c5fd6342bffb13e13b

      SHA1

      dd65c64b378905cd1bde54f7cf83f6527964078e

      SHA256

      d519287af7196f3e0757ef00e02f656c7d3979623bf289bb255e873e04be158e

      SHA512

      e3cddb3b06d282e4801afc333c4f17624eedf2818961a774ccbd284a135109ecf22fea2f4956e7d2a1a19f8adbc5a4961c788c7b0bfefa24efe1ab2b6f9b9b0d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7694.exe

      Filesize

      342KB

      MD5

      793a44d61638692c376e2510f08b9728

      SHA1

      2ff85ab31462f4bd34ce59ae03235eef2115e2a1

      SHA256

      14447727382d54b208b1387f174b30e76e53daa288f5da3fe6a32e032b2d21c5

      SHA512

      bd14c8027fa6366a3dc4503e688b0cb1e03c96274e86ff93680411a244042aecf022fccfeef20ed8de6c0e38a662386c294c2be85845b185aed693ef92d68891

    • memory/1292-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1292-16-0x0000000002CC0000-0x0000000002CED000-memory.dmp

      Filesize

      180KB

    • memory/1292-15-0x0000000002B80000-0x0000000002C80000-memory.dmp

      Filesize

      1024KB

    • memory/1292-18-0x0000000004B10000-0x0000000004B2A000-memory.dmp

      Filesize

      104KB

    • memory/1292-19-0x0000000007180000-0x0000000007724000-memory.dmp

      Filesize

      5.6MB

    • memory/1292-20-0x0000000004CD0000-0x0000000004CE8000-memory.dmp

      Filesize

      96KB

    • memory/1292-28-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-48-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-46-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-45-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-42-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-40-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-38-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-36-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-34-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-32-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-30-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-26-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-24-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-22-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-21-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

      Filesize

      72KB

    • memory/1292-49-0x0000000002CC0000-0x0000000002CED000-memory.dmp

      Filesize

      180KB

    • memory/1292-50-0x0000000002B80000-0x0000000002C80000-memory.dmp

      Filesize

      1024KB

    • memory/1292-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1292-51-0x0000000000400000-0x0000000002B75000-memory.dmp

      Filesize

      39.5MB

    • memory/1292-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1292-54-0x0000000000400000-0x0000000002B75000-memory.dmp

      Filesize

      39.5MB

    • memory/4720-60-0x0000000004B40000-0x0000000004B86000-memory.dmp

      Filesize

      280KB

    • memory/4720-61-0x0000000007740000-0x0000000007784000-memory.dmp

      Filesize

      272KB

    • memory/4720-95-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-93-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-91-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-89-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-87-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-85-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-83-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-81-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-79-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-77-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-75-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-73-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-71-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-69-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-67-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-65-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-63-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-62-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/4720-968-0x00000000077C0000-0x0000000007DD8000-memory.dmp

      Filesize

      6.1MB

    • memory/4720-969-0x0000000007E60000-0x0000000007F6A000-memory.dmp

      Filesize

      1.0MB

    • memory/4720-970-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/4720-971-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

      Filesize

      240KB

    • memory/4720-972-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB