Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 17:42

General

  • Target

    9486a1640ffdea515a2d96a7d78e7f5cafd6f6af83e6bb2c81bedf5c6c27786e.exe

  • Size

    674KB

  • MD5

    a1d2c0f09c8a2e77094459f7bc1046af

  • SHA1

    9eb62b63d962535176a340590513d8c30555d684

  • SHA256

    9486a1640ffdea515a2d96a7d78e7f5cafd6f6af83e6bb2c81bedf5c6c27786e

  • SHA512

    461f54fcc176ef8c9a415fa508718a9105fa9ff9713ca91df5fb9e6a8ddc16487ef2b45ae3f7c6d87a80b9e30760821ea5d1d2534ab7ebd38c6433228eed0049

  • SSDEEP

    12288:iMrey90ToahyPfUeD9+8tZLdOLaOQRND72XShyx1GW/adTsA:YynaM/D9+dLaOQrv2Jrp/YJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9486a1640ffdea515a2d96a7d78e7f5cafd6f6af83e6bb2c81bedf5c6c27786e.exe
    "C:\Users\Admin\AppData\Local\Temp\9486a1640ffdea515a2d96a7d78e7f5cafd6f6af83e6bb2c81bedf5c6c27786e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222902.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222902.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5822.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5822.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1080
          4⤵
          • Program crash
          PID:1628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1365.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1468
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1288 -ip 1288
    1⤵
      PID:4100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222902.exe

      Filesize

      520KB

      MD5

      1c81e8d3e82776b7706c5bb9e2957980

      SHA1

      0a6c5c731bf30ebac287c8b6ec5648fb852072e1

      SHA256

      a1933b7d1eb1bc6827083d26d9c6a14866945bf1b6f30bd29c8708e2ea270ce2

      SHA512

      5e86bb4dc69d45c6d1966c47bb27bb37d4c79dbd82a2be3e4c67f022f6398b08dd2c33737993b78ea77580fc1ac32da12ee7123d7807568a42efd49cfade6c29

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5822.exe

      Filesize

      253KB

      MD5

      e37502628dc888919f93fae6e0beb34e

      SHA1

      0c6bcd75e4db349a60411c012f32ea87efd5a0cf

      SHA256

      5855145c499e1e0f1ab15f7827a12144f0f1fb8bd66bb1f0ca9a94dd98c8863a

      SHA512

      3c441bac8383a926644058b4a43667e81c24ae8b4c67cd7056582b4367a547493ef239186c82f67271fe45702d705ab4795e293aec7b46f85a721f0daf40cf6c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1365.exe

      Filesize

      311KB

      MD5

      d39bf8e49532794024dcfcd6333f784d

      SHA1

      fc5689a99c8fd09f0cc42e5006be7653c4eea458

      SHA256

      e0765729a0fc9a2d3ac178ae1f9375a1664bc605d7cacf5b658834756af28bbc

      SHA512

      9f10e29f6ffd6ca1201865eea6648694992bdd6826b131f61558293f90f26ed24a045aa0102352edad34c034871d86829a9ca8bdf61bfed5118039780e41fa4d

    • memory/1288-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1288-16-0x0000000000640000-0x000000000066D000-memory.dmp

      Filesize

      180KB

    • memory/1288-15-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/1288-18-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/1288-19-0x0000000002290000-0x00000000022AA000-memory.dmp

      Filesize

      104KB

    • memory/1288-20-0x0000000004B90000-0x0000000005134000-memory.dmp

      Filesize

      5.6MB

    • memory/1288-21-0x0000000002530000-0x0000000002548000-memory.dmp

      Filesize

      96KB

    • memory/1288-33-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-49-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-47-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-45-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-43-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-41-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-39-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-37-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-35-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-31-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-29-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-27-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-26-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-22-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-23-0x0000000002530000-0x0000000002542000-memory.dmp

      Filesize

      72KB

    • memory/1288-50-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/1288-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1288-54-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/1288-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1468-60-0x00000000025D0000-0x0000000002616000-memory.dmp

      Filesize

      280KB

    • memory/1468-61-0x0000000002780000-0x00000000027C4000-memory.dmp

      Filesize

      272KB

    • memory/1468-83-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-93-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-95-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-91-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-89-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-87-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-85-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-81-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-79-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-78-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-75-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-73-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-71-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-69-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-67-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-65-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-63-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-62-0x0000000002780000-0x00000000027BF000-memory.dmp

      Filesize

      252KB

    • memory/1468-968-0x0000000005280000-0x0000000005898000-memory.dmp

      Filesize

      6.1MB

    • memory/1468-969-0x0000000004BB0000-0x0000000004CBA000-memory.dmp

      Filesize

      1.0MB

    • memory/1468-970-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/1468-971-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/1468-972-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB