Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:18

General

  • Target

    b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe

  • Size

    674KB

  • MD5

    398526a2f48021151c58d010f44ca2be

  • SHA1

    001f5a796086f796f02d9d57e384f4e7ef571a9e

  • SHA256

    b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0

  • SHA512

    2fce9b213b379f5dfac16ecfb6b58cde3c0650bf9acd3534251ecf2fdc8fbd2c0b2b9bd52a0a2c2c5f185b3af55f5c7e0fb7773a2ed31f5668a28a43c8912cb0

  • SSDEEP

    12288:9MrCy90/UKqiK78HO2ZTjnA+t4qWlfeQALQbzHAoVTxLzuluXI42mXAEphVjYvdI:jyoU5/4u21jn2Jf0KWN42mXAWsvu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566756.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566756.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3065.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3065.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 1080
          4⤵
          • Program crash
          PID:1580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1123.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1123.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4236 -ip 4236
    1⤵
      PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566756.exe

      Filesize

      532KB

      MD5

      db1a0b0ad03e59b4a6df558aaa8ddfae

      SHA1

      a240774a2aed8cfd2523532caa1aed971a48a265

      SHA256

      a88267d149004511eeb58c17c5e5cd862c248a790fab634d738a756178ff6fe2

      SHA512

      aa8838f6b2eb64ff316d1636686e4575beae03a99f76ab0cca83b251e5685931b49f3ac8a78e1c71c199de440fbdfbe5c29a9d14b12e26327b1ec03b042e97ad

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3065.exe

      Filesize

      376KB

      MD5

      c706a5b8483d71ec1ed7c6f552ef5d4d

      SHA1

      70ddd25aaca716ca9420a18dadf6fcdb95fc6b54

      SHA256

      ce83e5eba2957ab2f3257ea72eb35d3f3a6fc758033f80cd2db5e6fc71fa31af

      SHA512

      669230afc4f1544fc6b6bae315fa478b6c2d7238ff431b6e8b34fc717638163e3b61afcb5fcb7bff45d2a30afad629f7d8deb4d895a8bf918aa08ba09ebc780f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1123.exe

      Filesize

      435KB

      MD5

      03ec3a14c759adffb52e7a8d5b72eeb6

      SHA1

      bee603076e24753b5dac1fe715b51e2ca588555c

      SHA256

      4446508eb3dcdfe9eee1ce0c47c42d53f36afb04935597dd51979fd608abe085

      SHA512

      e553cbadf3e1d9e89adccd7fccf2e348d346f05b1463e70c4ca50fa41facd45807493028a52935aba1e74d4df762d233017ad7f2a448090d69b8b8b2af8a7af3

    • memory/2064-78-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-82-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-970-0x00000000075B0000-0x00000000076BA000-memory.dmp

      Filesize

      1.0MB

    • memory/2064-969-0x0000000006F10000-0x0000000007528000-memory.dmp

      Filesize

      6.1MB

    • memory/2064-63-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-64-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-66-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-92-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-70-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-76-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-972-0x0000000007710000-0x000000000774C000-memory.dmp

      Filesize

      240KB

    • memory/2064-973-0x0000000007860000-0x00000000078AC000-memory.dmp

      Filesize

      304KB

    • memory/2064-80-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-971-0x00000000076F0000-0x0000000007702000-memory.dmp

      Filesize

      72KB

    • memory/2064-84-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-86-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-88-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-90-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-94-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-96-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-72-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-74-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-68-0x0000000006E90000-0x0000000006ECF000-memory.dmp

      Filesize

      252KB

    • memory/2064-62-0x0000000006E90000-0x0000000006ED4000-memory.dmp

      Filesize

      272KB

    • memory/2064-61-0x00000000041E0000-0x0000000004226000-memory.dmp

      Filesize

      280KB

    • memory/4236-43-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-55-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4236-56-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4236-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4236-51-0x0000000000650000-0x000000000067D000-memory.dmp

      Filesize

      180KB

    • memory/4236-50-0x00000000006E0000-0x00000000007E0000-memory.dmp

      Filesize

      1024KB

    • memory/4236-22-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-23-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-25-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-27-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-31-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-33-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-35-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-37-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-39-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-41-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-46-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-47-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-49-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-29-0x00000000024D0000-0x00000000024E2000-memory.dmp

      Filesize

      72KB

    • memory/4236-21-0x00000000024D0000-0x00000000024E8000-memory.dmp

      Filesize

      96KB

    • memory/4236-20-0x0000000004F50000-0x00000000054F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4236-19-0x0000000002390000-0x00000000023AA000-memory.dmp

      Filesize

      104KB

    • memory/4236-18-0x0000000000400000-0x00000000005A3000-memory.dmp

      Filesize

      1.6MB

    • memory/4236-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4236-16-0x0000000000650000-0x000000000067D000-memory.dmp

      Filesize

      180KB

    • memory/4236-15-0x00000000006E0000-0x00000000007E0000-memory.dmp

      Filesize

      1024KB