Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 16:03

General

  • Target

    5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a.exe

  • Size

    666KB

  • MD5

    35da149ca6182a0e8df20cf85377fcf3

  • SHA1

    34693681cc5b9cd5271c744b4bfbbaf0a1f3446c

  • SHA256

    5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a

  • SHA512

    1048d270f48991ca7f816509f8e7a830e11fe220fb877dd61032779a1611fc3748a3780044006026821d802784461350d0cfc97b1e0a9137a2b9fb9f48e262aa

  • SSDEEP

    12288:WMrry90T2fkZYq7xS8E/eOyHISOs0a9zU7VrUeKC/wtHWKEEce:5yVzq88hO4RODuY7VrucwJxEEce

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a.exe
    "C:\Users\Admin\AppData\Local\Temp\5d9b2dc0ffa9d901e104872649d7833b74003a5c095671abd9649dc0609bb53a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806887.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0031.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0031.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 1084
          4⤵
          • Program crash
          PID:1752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4929.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4929.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1376 -ip 1376
    1⤵
      PID:4904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un806887.exe

      Filesize

      524KB

      MD5

      4560df450f2f36be45da747d58d8d605

      SHA1

      e451c6b5824ecc78ca63b3742dd15545dfee8ea6

      SHA256

      576c4f9e332a72d3965303ff6bba2953c387dd6cebb803075655307bffcad85b

      SHA512

      713b116409dcd160b235185ccb83f6c62ffc45fa33eb0277592d2ec7a1880b872f3cfe526e25542962ac926639bc7b63c9172db4afdfeb5c703e5c2ac22d204f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0031.exe

      Filesize

      294KB

      MD5

      3abf2dc0eb541ee17bc14af539454278

      SHA1

      a2b29e5759fd4dbd01610e53ecea01cf74e7d0cc

      SHA256

      a2916acef9f91f03748095f9141d05df4525c8ed1116b8c3a8d0ef77a75c8101

      SHA512

      a4f09cb82fb4715178cdc226e468c4754deee9e4d9355d5e0fee3157c415ec9e350923a14d38dd5cbe4a933ebacdc24602684fbfd231a6b1528065a385c58f97

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4929.exe

      Filesize

      352KB

      MD5

      fe111290354806259561e9c1eb9a861a

      SHA1

      f5ee64f9a5d8ad3b314321e8ab9d557d6b19b9e7

      SHA256

      3797eebf18cd0c175a31f72b12b4e255857ba5d7c0f405ac015b0624e4d5ca6f

      SHA512

      2060dfd1eabc585ad0f71ded15bfb3f8ffa4c6e4668989413f18a3322d3c5a02556f03957c8474bc2a1720966ed4d8959520beb43194b900c5b32bee8e9aa60d

    • memory/1376-15-0x00000000008C0000-0x00000000009C0000-memory.dmp

      Filesize

      1024KB

    • memory/1376-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1376-17-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/1376-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/1376-19-0x00000000027E0000-0x00000000027FA000-memory.dmp

      Filesize

      104KB

    • memory/1376-20-0x0000000004E80000-0x0000000005424000-memory.dmp

      Filesize

      5.6MB

    • memory/1376-21-0x0000000004D90000-0x0000000004DA8000-memory.dmp

      Filesize

      96KB

    • memory/1376-27-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-49-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-47-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-45-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-43-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-41-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-39-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-37-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-35-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-34-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-31-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-29-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-25-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-23-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-22-0x0000000004D90000-0x0000000004DA2000-memory.dmp

      Filesize

      72KB

    • memory/1376-50-0x00000000008C0000-0x00000000009C0000-memory.dmp

      Filesize

      1024KB

    • memory/1376-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1376-54-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/1376-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5060-60-0x00000000029F0000-0x0000000002A36000-memory.dmp

      Filesize

      280KB

    • memory/5060-61-0x00000000053D0000-0x0000000005414000-memory.dmp

      Filesize

      272KB

    • memory/5060-63-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-73-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-96-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-93-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-92-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-89-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-87-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-86-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-83-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-81-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-79-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-77-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-75-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-72-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-69-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-67-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-65-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-62-0x00000000053D0000-0x000000000540F000-memory.dmp

      Filesize

      252KB

    • memory/5060-968-0x0000000005440000-0x0000000005A58000-memory.dmp

      Filesize

      6.1MB

    • memory/5060-969-0x0000000005AE0000-0x0000000005BEA000-memory.dmp

      Filesize

      1.0MB

    • memory/5060-970-0x0000000005C20000-0x0000000005C32000-memory.dmp

      Filesize

      72KB

    • memory/5060-971-0x0000000005C40000-0x0000000005C7C000-memory.dmp

      Filesize

      240KB

    • memory/5060-972-0x0000000005D90000-0x0000000005DDC000-memory.dmp

      Filesize

      304KB