Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 03:10

General

  • Target

    bcb1a328fe4b40647d9378934fd974e09324309ab834e2cada37d0484d61502e.exe

  • Size

    541KB

  • MD5

    68fdbfb8fddab323afd22ee3f18039cd

  • SHA1

    3e9bc0107b69301f27dbb934d1a6497176341fef

  • SHA256

    bcb1a328fe4b40647d9378934fd974e09324309ab834e2cada37d0484d61502e

  • SHA512

    c7b45c727025722036c0f2a3ab09218ef6bf86ae46a0db78d466c2ccd75865e9bd07c32c835fe2b540619341dfccd2d35f08d4e72f71bae3a8954ea11379ee13

  • SSDEEP

    12288:uMrgy90Kmfqdxq1XNdm0jNpSBu/94BWmW:KyJyQAXTmWd/mQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb1a328fe4b40647d9378934fd974e09324309ab834e2cada37d0484d61502e.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb1a328fe4b40647d9378934fd974e09324309ab834e2cada37d0484d61502e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pro5990.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pro5990.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 1020
        3⤵
        • Program crash
        PID:3956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu3186.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu3186.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3944
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4904 -ip 4904
    1⤵
      PID:1684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pro5990.exe

      Filesize

      322KB

      MD5

      ced94cb70e915af8186371ae2dc7cbfb

      SHA1

      5908731a0cd9d3a7d81640bfb1f69beeab7ec7af

      SHA256

      3ca03a988f45af75b049b2a2572b518ae21c0554c19e2543779414695bff8df3

      SHA512

      c475477592ce993a411793d43fce86f300d4807a3fe20ea3531af2fd21a7ed9d391163b96ba30a69e2aad49f5d7f4b2c0f82e6890193956f04e44f2b6fdb9936

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu3186.exe

      Filesize

      379KB

      MD5

      70aa270f58d23e909e198f92c1bc0e80

      SHA1

      990257a22e5651773e2db871e0ec07eb48ebb763

      SHA256

      a33d7791b4711f9aa1e44857c8559582c1242c4bacdc7c2ef43dc9557a107d90

      SHA512

      8e36b28862b7ce41f6148a361ca06223908761a9ae3f5b820081753172e243bed3d4ffcfaa9e169d1f7568516bf484a0a5adc6c1efaa8f569ee85950c5ccdc19

    • memory/3944-68-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-58-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-965-0x0000000008250000-0x000000000829C000-memory.dmp

      Filesize

      304KB

    • memory/3944-964-0x0000000008100000-0x000000000813C000-memory.dmp

      Filesize

      240KB

    • memory/3944-53-0x0000000004C60000-0x0000000004CA6000-memory.dmp

      Filesize

      280KB

    • memory/3944-963-0x00000000080E0000-0x00000000080F2000-memory.dmp

      Filesize

      72KB

    • memory/3944-962-0x0000000007FA0000-0x00000000080AA000-memory.dmp

      Filesize

      1.0MB

    • memory/3944-961-0x0000000007960000-0x0000000007F78000-memory.dmp

      Filesize

      6.1MB

    • memory/3944-55-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-56-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-74-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-60-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-62-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-64-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-66-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-54-0x0000000007190000-0x00000000071D4000-memory.dmp

      Filesize

      272KB

    • memory/3944-72-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-76-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-78-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-80-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-82-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-84-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-86-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-88-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/3944-70-0x0000000007190000-0x00000000071CF000-memory.dmp

      Filesize

      252KB

    • memory/4904-13-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-20-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-10-0x0000000004920000-0x000000000493A000-memory.dmp

      Filesize

      104KB

    • memory/4904-11-0x0000000007300000-0x00000000078A4000-memory.dmp

      Filesize

      5.6MB

    • memory/4904-47-0x0000000000400000-0x0000000002B7E000-memory.dmp

      Filesize

      39.5MB

    • memory/4904-48-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4904-45-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4904-43-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

      Filesize

      1024KB

    • memory/4904-27-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-29-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-14-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-16-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-8-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

      Filesize

      1024KB

    • memory/4904-18-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-22-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-25-0x0000000000400000-0x0000000002B7E000-memory.dmp

      Filesize

      39.5MB

    • memory/4904-24-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-31-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-33-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-35-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-37-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-39-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-41-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

      Filesize

      72KB

    • memory/4904-12-0x0000000004CA0000-0x0000000004CB8000-memory.dmp

      Filesize

      96KB

    • memory/4904-9-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB