Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 17:48

General

  • Target

    1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe

  • Size

    658KB

  • MD5

    6bdc810a0b272404290e6cf486236023

  • SHA1

    d06b65c7ca1a0dce1f3222eb8b7fe1f4f36cc887

  • SHA256

    1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2

  • SHA512

    6fb058c7f1a8987fc34de3ccf4bab07105a40e0c0aa645cc4cbea3231f19506c5a88bd4170011b3a5163dd76c43359a4eb10c2d4b9f0d2d72440b131688081b3

  • SSDEEP

    12288:5MrCy90npfQCQFEitlh37TeuPDAiIyfK3jSyG6PKpN5l7yIL+EfZxV/Wn3Kyp:HyEIF2aVbAqM66P8yw+Efz8Kyp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe
    "C:\Users\Admin\AppData\Local\Temp\1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un956185.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un956185.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0233.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0233.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1080
          4⤵
          • Program crash
          PID:3212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8246.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8246.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4352
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3976 -ip 3976
    1⤵
      PID:3092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un956185.exe

      Filesize

      515KB

      MD5

      b816a7a885dc7a7e350371235b9cd961

      SHA1

      682695ded60ed029331d4f51220049bdd6390f6b

      SHA256

      4a0cf9df9aaff3b66971cabfc3a74596f9ef6da84fa8556963601aef7a610dda

      SHA512

      51d9ed82e3dc2cf92fdceac0ba8c617d23d8f5143fddcf88cb94f525b6e030a3bb2d8fee7b8f7240d1390dafa456ec4df7442438fed52f09e233dfeaab8e15ff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0233.exe

      Filesize

      295KB

      MD5

      9a02c089cf6a08af69e0589871df61a9

      SHA1

      5dd36f48f667dc562fc43f22b6d998af2b4e28cd

      SHA256

      7622dc92cf41868c02419e5437ca3195d7381becc34bad1e4d377baea677278d

      SHA512

      20de3a46a6af236f4420fd2e1284a318f7388904d4b0a8f0b19c1bffd2ccf9d89d3484c42c185d3d9939de6215afa4c86d8f6a77796100d2044f88bb74a4fb33

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8246.exe

      Filesize

      354KB

      MD5

      9628aa62678aee08a1a1084d69b826c0

      SHA1

      d5fe64a09323332b4c10c0c3d7832517c22e1ae3

      SHA256

      b176f13894a7e466117be06f304a5229008c51c4a5fc53e67279cd1d1005b35e

      SHA512

      0ed22959eab2584dc062c270886594fefee23cf109932b2e818800ac7909a8d8a4285fa5fa9650b6ed1d08c19f5a80da20da5c81ca0014958b0a29698d5b1440

    • memory/3976-15-0x0000000002F10000-0x0000000003010000-memory.dmp

      Filesize

      1024KB

    • memory/3976-16-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3976-17-0x0000000004980000-0x000000000499A000-memory.dmp

      Filesize

      104KB

    • memory/3976-20-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/3976-19-0x0000000007250000-0x0000000007268000-memory.dmp

      Filesize

      96KB

    • memory/3976-18-0x0000000007350000-0x00000000078F4000-memory.dmp

      Filesize

      5.6MB

    • memory/3976-46-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-48-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-44-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-42-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-40-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-38-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-36-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-34-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-32-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-30-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-28-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-26-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-24-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-22-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-21-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/3976-49-0x0000000002F10000-0x0000000003010000-memory.dmp

      Filesize

      1024KB

    • memory/3976-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3976-50-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/3976-53-0x0000000000400000-0x0000000002B78000-memory.dmp

      Filesize

      39.5MB

    • memory/3976-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4352-59-0x0000000004BE0000-0x0000000004C26000-memory.dmp

      Filesize

      280KB

    • memory/4352-60-0x0000000007760000-0x00000000077A4000-memory.dmp

      Filesize

      272KB

    • memory/4352-90-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-94-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-92-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-88-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-86-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-85-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-82-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-80-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-78-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-74-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-72-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-70-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-68-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-66-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-64-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-76-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-62-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-61-0x0000000007760000-0x000000000779F000-memory.dmp

      Filesize

      252KB

    • memory/4352-967-0x00000000077C0000-0x0000000007DD8000-memory.dmp

      Filesize

      6.1MB

    • memory/4352-968-0x0000000007E60000-0x0000000007F6A000-memory.dmp

      Filesize

      1.0MB

    • memory/4352-969-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

      Filesize

      72KB

    • memory/4352-970-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

      Filesize

      240KB

    • memory/4352-971-0x0000000008110000-0x000000000815C000-memory.dmp

      Filesize

      304KB