Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:25

General

  • Target

    125d01785500342580c6257f028a587f84274fdeb9986ea510a399d5c7e7008b.exe

  • Size

    697KB

  • MD5

    35c01496e6c68b7b4d73eab6b6366160

  • SHA1

    6a3f69ccfaf4ee48cd9a8b3a756e6c1cffdee2e7

  • SHA256

    125d01785500342580c6257f028a587f84274fdeb9986ea510a399d5c7e7008b

  • SHA512

    dd4c3ebc70fb0defaeaf8229e8e27ec827be9fd7b9082656098a32d40b645f4c8873f2333fef9f83acdba6302a808f3d1cfb80418222a27e79960ccdf8c987fa

  • SSDEEP

    12288:kMrDy90SDJNJu5aEboghNBkAB2C94PxjNPdlkmF4s6lEEK/aFqaDH:nyrE0lA743kar6lO/2qaDH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\125d01785500342580c6257f028a587f84274fdeb9986ea510a399d5c7e7008b.exe
    "C:\Users\Admin\AppData\Local\Temp\125d01785500342580c6257f028a587f84274fdeb9986ea510a399d5c7e7008b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un061564.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un061564.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7851.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7851.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1080
          4⤵
          • Program crash
          PID:1840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6341.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6341.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2804 -ip 2804
    1⤵
      PID:228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un061564.exe

      Filesize

      555KB

      MD5

      70f494bb2a2f7a6e6990cf0a1544d390

      SHA1

      6164ce213edbde6a4a7c20e9a4a0f8f00245d032

      SHA256

      9bc10b70705669b66910ea3bd8fb00fb4ec8e97d9a2e2aeab88c9149cd58df41

      SHA512

      6d043d542cd4766c5bcb2e7ae467a024b66621b5b0097699431dabb2eb1a38f1935ab97040b382075c1242e037f763a3c860096597b0ccfde5341cf2836e4acc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7851.exe

      Filesize

      347KB

      MD5

      ecc98f0bb80d9d36b7e4cf03d94161c5

      SHA1

      484bfbf95fe66c85c7e632dbe0d679c8c40f6c5f

      SHA256

      834cc7e398e12920366d7f63ff2b7e2421285e2f923860d5862863ad9db7ebcb

      SHA512

      a9e5ab7e5dc9d2e44de65a76f5dd71c07a5e0aa0167b84d0958afcadd71fbc28786f9e41826a1ccec3ccb85542e0be28c3e1c9a10fb7cfb1cb2bbc898e6c908c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6341.exe

      Filesize

      405KB

      MD5

      54fb8602f2451829596db60d73ae861a

      SHA1

      ff292bbcdbaa9f6533ba59356ace6989907410e8

      SHA256

      24f5a8ac4a61f2da0995b7dd664e647340407b33cc926014b0e04a5a9739699c

      SHA512

      b90d9a2b9107191a0ce1778b79f88d1805e13bda40f3b0ba91c82264648d1e0a3c792a752cf9bee599811430eff0ce24b5b4fdf86d87702de0554e06f87927ec

    • memory/2804-15-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB

    • memory/2804-16-0x0000000002C60000-0x0000000002C8D000-memory.dmp

      Filesize

      180KB

    • memory/2804-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2804-18-0x0000000004A50000-0x0000000004A6A000-memory.dmp

      Filesize

      104KB

    • memory/2804-19-0x0000000007110000-0x00000000076B4000-memory.dmp

      Filesize

      5.6MB

    • memory/2804-20-0x00000000076E0000-0x00000000076F8000-memory.dmp

      Filesize

      96KB

    • memory/2804-34-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-48-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-46-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-44-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-42-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-40-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-38-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-32-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-30-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-28-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-26-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-24-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-22-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-36-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-21-0x00000000076E0000-0x00000000076F2000-memory.dmp

      Filesize

      72KB

    • memory/2804-49-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

      Filesize

      1024KB

    • memory/2804-50-0x0000000002C60000-0x0000000002C8D000-memory.dmp

      Filesize

      180KB

    • memory/2804-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2804-51-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2804-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2804-54-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2992-60-0x0000000004880000-0x00000000048C6000-memory.dmp

      Filesize

      280KB

    • memory/2992-61-0x0000000007740000-0x0000000007784000-memory.dmp

      Filesize

      272KB

    • memory/2992-79-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-87-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-96-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-93-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-91-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-90-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-85-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-84-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-81-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-77-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-76-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-74-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-71-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-67-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-65-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-69-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-63-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-62-0x0000000007740000-0x000000000777F000-memory.dmp

      Filesize

      252KB

    • memory/2992-968-0x00000000077D0000-0x0000000007DE8000-memory.dmp

      Filesize

      6.1MB

    • memory/2992-969-0x0000000007E70000-0x0000000007F7A000-memory.dmp

      Filesize

      1.0MB

    • memory/2992-970-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

      Filesize

      72KB

    • memory/2992-971-0x0000000007FD0000-0x000000000800C000-memory.dmp

      Filesize

      240KB

    • memory/2992-972-0x0000000008120000-0x000000000816C000-memory.dmp

      Filesize

      304KB