Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 01:43

General

  • Target

    068242821b22a66a123b067aa5d588f2875329d2d7c4d15f56a9d0dffd1a0711.exe

  • Size

    671KB

  • MD5

    a75be4620f57692f422beacc17d5fd33

  • SHA1

    cfbff2f91ccb078db34b77b911317df44bcb69d6

  • SHA256

    068242821b22a66a123b067aa5d588f2875329d2d7c4d15f56a9d0dffd1a0711

  • SHA512

    243a154228f491f12d81ab97a3e988987bd9b688b9e351004d07b95cf39c623e17eae024b2f522fd5bc0c9acaa45cb93fcc23cf393e5b078205afdd52eb4caac

  • SSDEEP

    12288:WMrOy90A2yvfyELpmgws87ukZ3EO0fgw7Uj204FX3LqsY+b+uWf3d:8yzfvfyEnL873FEO0fES0kX3Gs1b+uat

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\068242821b22a66a123b067aa5d588f2875329d2d7c4d15f56a9d0dffd1a0711.exe
    "C:\Users\Admin\AppData\Local\Temp\068242821b22a66a123b067aa5d588f2875329d2d7c4d15f56a9d0dffd1a0711.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078619.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078619.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1044.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1084
          4⤵
          • Program crash
          PID:4772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1288.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1288.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5092 -ip 5092
    1⤵
      PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un078619.exe

      Filesize

      529KB

      MD5

      10526ebf3c1a22efcaac9bd1eb29cda9

      SHA1

      3aec437dc795fa59c8e2bb87594ddb4c71845cd0

      SHA256

      d1ae88771d8d84df90083384253db3d1144fdd28c51a0bbd0fc62d1695ef79c7

      SHA512

      9546c174e18d40dd75f0b51013ac3e05fe16ef1d08d0343178edf4eec946c04a9964dd7ccc73dafd258bbdc243055ce18cb037a7dc2c196db5e4c83cbd2b61f1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1044.exe

      Filesize

      301KB

      MD5

      3746718b3c6a06fe38239e37ccec1e11

      SHA1

      b845bd2e43e17d1f7b43233d807f725410438161

      SHA256

      fa60d5e327685f9e1d972c5b4e0ca4c331b083ea8145c2ed32300b2f58704ffd

      SHA512

      7baa23b4442e041fd6fafcdfb2d3904e7378e6fb9b8d2fc6774b427a1eadf6d2c5a6595b444ef37254be6421b7801bd5dd89e3e48d0e3680446fb0ba630f5403

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1288.exe

      Filesize

      359KB

      MD5

      c4c9a3956c40b035c78a1170e3a30c95

      SHA1

      e282aa45a492c9332d3edbb21f71c30e3c56c637

      SHA256

      8fd6b8cf447c8077d0d67deeb67b37da1d154fda6e7563207a3fe33c91eaed85

      SHA512

      b363e72f2fbe621e5a7ef93b2b901a80a29de79356abd46f07a8fc7701e02454f2aefb9b1c2791f175e8f526b16bb1603b07a6a5ee24b4a1f2783543d7e9c841

    • memory/2644-77-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-84-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-971-0x0000000006DD0000-0x0000000006EDA000-memory.dmp

      Filesize

      1.0MB

    • memory/2644-970-0x0000000006740000-0x0000000006D58000-memory.dmp

      Filesize

      6.1MB

    • memory/2644-64-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-67-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-69-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-71-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-73-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-75-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-973-0x0000000006F30000-0x0000000006F6C000-memory.dmp

      Filesize

      240KB

    • memory/2644-974-0x0000000007080000-0x00000000070CC000-memory.dmp

      Filesize

      304KB

    • memory/2644-81-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-972-0x0000000006F10000-0x0000000006F22000-memory.dmp

      Filesize

      72KB

    • memory/2644-85-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-87-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-90-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-91-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-93-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-95-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-97-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-79-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-65-0x00000000060E0000-0x000000000611F000-memory.dmp

      Filesize

      252KB

    • memory/2644-63-0x00000000060E0000-0x0000000006124000-memory.dmp

      Filesize

      272KB

    • memory/2644-62-0x0000000003AF0000-0x0000000003B36000-memory.dmp

      Filesize

      280KB

    • memory/5092-23-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-57-0x0000000000400000-0x0000000001AE3000-memory.dmp

      Filesize

      22.9MB

    • memory/5092-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5092-53-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5092-51-0x0000000003710000-0x000000000373D000-memory.dmp

      Filesize

      180KB

    • memory/5092-50-0x0000000001DC0000-0x0000000001EC0000-memory.dmp

      Filesize

      1024KB

    • memory/5092-37-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-39-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-41-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-43-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-45-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-47-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-49-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-29-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-31-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-22-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-25-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-27-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-35-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-33-0x0000000006080000-0x0000000006092000-memory.dmp

      Filesize

      72KB

    • memory/5092-21-0x0000000006080000-0x0000000006098000-memory.dmp

      Filesize

      96KB

    • memory/5092-20-0x00000000061B0000-0x0000000006754000-memory.dmp

      Filesize

      5.6MB

    • memory/5092-19-0x0000000000400000-0x0000000001AE3000-memory.dmp

      Filesize

      22.9MB

    • memory/5092-18-0x0000000006000000-0x000000000601A000-memory.dmp

      Filesize

      104KB

    • memory/5092-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/5092-15-0x0000000001DC0000-0x0000000001EC0000-memory.dmp

      Filesize

      1024KB

    • memory/5092-16-0x0000000003710000-0x000000000373D000-memory.dmp

      Filesize

      180KB