Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:06

General

  • Target

    175c03e9b9ac95ed303f3fd940b26cc2f72f27fd734fc97f2efb34c325d6178e.exe

  • Size

    668KB

  • MD5

    40fe04a78131cef8e99194cd7d4b18f4

  • SHA1

    50466464a9a0b6f9992196a4c703e03966be0e35

  • SHA256

    175c03e9b9ac95ed303f3fd940b26cc2f72f27fd734fc97f2efb34c325d6178e

  • SHA512

    7bc51215aa6d74c4e84234b113c4f884fea4919f1c9efcb90790d043e8ac55dc3269521685da7f224e6c0d12004d914466643ae2dc3825841ccfff04b77e4295

  • SSDEEP

    12288:6Mrfy90BluBR3p0cyEqET+yURMH/J4R/tzNCblOzAMg/SP:xyOoR+nDEA7R/FNCszAF/SP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\175c03e9b9ac95ed303f3fd940b26cc2f72f27fd734fc97f2efb34c325d6178e.exe
    "C:\Users\Admin\AppData\Local\Temp\175c03e9b9ac95ed303f3fd940b26cc2f72f27fd734fc97f2efb34c325d6178e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287522.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287522.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0100.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0100.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 236
          4⤵
          • Program crash
          PID:964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1105.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1105.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3916 -ip 3916
    1⤵
      PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287522.exe

      Filesize

      525KB

      MD5

      70658ee702270c156e9a2eaea6ebbf3f

      SHA1

      ff86444b4f57b8c66b57052a2e1a6f36ca0f0e8d

      SHA256

      b0badd8aa1a5aedcf803b35d375ce57e39dd08ea9010c96f8b40050214bb9455

      SHA512

      c7463618f98c9d346132d8842b791b6ad9d7b8a6a7a7ba304e7c8999b967edc91922d01c6f072764402dc969ab55ee5870c98b37095a149a12b56b0308f2c5da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0100.exe

      Filesize

      294KB

      MD5

      8e4df735e32e9e48d98587df8cf10a68

      SHA1

      803ef9874cb797fd5576e44540da314181bab55b

      SHA256

      c9b094fc5b1355952a5fb962963cd750b42275de8763056e794438a7f6e719fe

      SHA512

      643aa2bca5f6548277c6919bfb507e1998f3b54dfd86e4b6462ac00db855b3faf6928e6a6f8b646b48ed972c60e6fbb3d43d7f008d707ed00fd2d5fd50d570b3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1105.exe

      Filesize

      353KB

      MD5

      1227e3551c8a245b7c784937a1c536b8

      SHA1

      2938db229b6dacc4ebea8ab78bd42920f79a69b4

      SHA256

      1e29e04f164c7dadbc659af04515dde2118e75cec4bcd1e04af4aa7c1ca1f7a5

      SHA512

      586f8ee244b2345de3fcd17b92587ca16d9abf7aebeb912aed05873bc3bd9d62d7abdf76f79b1b152696042b46e237098ce3d024fbbe42db77e894c2d128f74f

    • memory/1952-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-970-0x0000000005C20000-0x0000000005D2A000-memory.dmp

      Filesize

      1.0MB

    • memory/1952-969-0x00000000055E0000-0x0000000005BF8000-memory.dmp

      Filesize

      6.1MB

    • memory/1952-63-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-972-0x0000000005D80000-0x0000000005DBC000-memory.dmp

      Filesize

      240KB

    • memory/1952-973-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

      Filesize

      304KB

    • memory/1952-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-971-0x0000000005D60000-0x0000000005D72000-memory.dmp

      Filesize

      72KB

    • memory/1952-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-90-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-92-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-94-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-96-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1952-62-0x0000000004DF0000-0x0000000004E34000-memory.dmp

      Filesize

      272KB

    • memory/1952-61-0x00000000028A0000-0x00000000028E6000-memory.dmp

      Filesize

      280KB

    • memory/3916-41-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-55-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3916-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3916-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3916-51-0x0000000000980000-0x00000000009AD000-memory.dmp

      Filesize

      180KB

    • memory/3916-50-0x0000000000A30000-0x0000000000B30000-memory.dmp

      Filesize

      1024KB

    • memory/3916-23-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-22-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-25-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-27-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-30-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-32-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-33-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-35-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-37-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-39-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-43-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-45-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-47-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-49-0x0000000002830000-0x0000000002842000-memory.dmp

      Filesize

      72KB

    • memory/3916-21-0x0000000002830000-0x0000000002848000-memory.dmp

      Filesize

      96KB

    • memory/3916-20-0x0000000004F80000-0x0000000005524000-memory.dmp

      Filesize

      5.6MB

    • memory/3916-19-0x0000000002760000-0x000000000277A000-memory.dmp

      Filesize

      104KB

    • memory/3916-18-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3916-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3916-16-0x0000000000980000-0x00000000009AD000-memory.dmp

      Filesize

      180KB

    • memory/3916-15-0x0000000000A30000-0x0000000000B30000-memory.dmp

      Filesize

      1024KB