Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 13:14

General

  • Target

    941230ca1fb838e3551244e36e23b0d69eedcf6641bcad167f54a3a5a4152226.exe

  • Size

    650KB

  • MD5

    b53442b3f6b21aad6ae4e80a25ffbee1

  • SHA1

    5ab632a8dfb6bd9c08a21bce0722b2f8d6ecac2d

  • SHA256

    941230ca1fb838e3551244e36e23b0d69eedcf6641bcad167f54a3a5a4152226

  • SHA512

    e9d8f6d9eb0666456b9b6d4854fdc4afe2b2e1e84d32aaf81e0d52f793ba595d4f30a7764f0a6edbd98a55bde4444d8712782e191591265a2790d94687df641e

  • SSDEEP

    12288:RMrly90NXA3DVJ6zXNczgvJ+b+7Kg7B4m2Zwl7v8zgp02Cf:kyjz6zNccvJ+b+RimCKUp

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\941230ca1fb838e3551244e36e23b0d69eedcf6641bcad167f54a3a5a4152226.exe
    "C:\Users\Admin\AppData\Local\Temp\941230ca1fb838e3551244e36e23b0d69eedcf6641bcad167f54a3a5a4152226.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zial9582.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zial9582.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr370571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr370571.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku462821.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku462821.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 1384
          4⤵
          • Program crash
          PID:1440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr481741.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr481741.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5984
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3396 -ip 3396
    1⤵
      PID:2848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr481741.exe

      Filesize

      168KB

      MD5

      e81df970c4ed4d0c507cc3e2f5b87e54

      SHA1

      a94306846f8ae7157d6334ca0b060ecd959908f6

      SHA256

      57ad75eb5251e6fd34090970e9b21ceef7123d5a1098afa4c1d7f0fd6e0f63be

      SHA512

      3b79ea291737053be6fdc8a20eb89c26bfbb1bdfdd610e5b8d35207ab260e3ac550bd0deaed412a142a39f393e843d67721f6b0fac704272bf3325ead27dd0e9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zial9582.exe

      Filesize

      496KB

      MD5

      e39fe1de609292ca281ad1626a280383

      SHA1

      cebfc0de3e4012cedace67d01899932bdafc8831

      SHA256

      d20d5be99254759abcd7b7dda86cf1aee47e8976f2eae19b73ddda3a8e34f61c

      SHA512

      e555a38b236235c6022475159f08dba893b6dc645b8fde95d6ee253954e16ca1ac41b589f4119b351c27032247f0945cdb2f972e282bb37f77993f43af5d8e83

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr370571.exe

      Filesize

      11KB

      MD5

      f98c592dc383dea1e57fb014e254ab32

      SHA1

      0ee773115c77af3099adc2e2cb1378feaa4768bc

      SHA256

      af3086e869cbfa48f88e61aac4f302bd9e25ec28ec647daa8264e09b5ee509a5

      SHA512

      86a06292592f1778887e152d6430e918f1215d1d77613a2c6642fb2e3e5cb98c81d923f836e25653596150a89936d8cef6bb6dd8e69aaad61d83a33079446548

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku462821.exe

      Filesize

      414KB

      MD5

      5d7aacb49acb8865b7758d184295fcb1

      SHA1

      febd6db31e80f04c876135846fac54a039b5336f

      SHA256

      3bf7c3cc3d839d60075bbdb826d8cf8b05c220280cf99b049c1a590fb456b610

      SHA512

      44f32c2ad52a82bc76788a764cc0ba02bfcaac4995ac752a5a0bcbee37e6e858a7129f753c04064e6eecc21ad1a638800480f350e4bf3fa844088035419435f4

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1124-2118-0x0000000000950000-0x0000000000980000-memory.dmp

      Filesize

      192KB

    • memory/1124-2124-0x00000000053A0000-0x00000000053EC000-memory.dmp

      Filesize

      304KB

    • memory/1124-2123-0x0000000005360000-0x000000000539C000-memory.dmp

      Filesize

      240KB

    • memory/1124-2122-0x00000000051C0000-0x00000000051D2000-memory.dmp

      Filesize

      72KB

    • memory/1124-2121-0x0000000005430000-0x000000000553A000-memory.dmp

      Filesize

      1.0MB

    • memory/1124-2120-0x0000000005940000-0x0000000005F58000-memory.dmp

      Filesize

      6.1MB

    • memory/1124-2119-0x0000000001250000-0x0000000001256000-memory.dmp

      Filesize

      24KB

    • memory/3396-53-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-34-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-78-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-76-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-74-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-72-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-70-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-68-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-66-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-64-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-60-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-58-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-56-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-54-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-84-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-50-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-46-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-42-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-40-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-38-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-36-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-80-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-32-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-30-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-82-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-62-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-28-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-26-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-86-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-88-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-48-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-44-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-24-0x0000000005320000-0x0000000005386000-memory.dmp

      Filesize

      408KB

    • memory/3396-23-0x0000000004D30000-0x00000000052D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3396-22-0x0000000004CC0000-0x0000000004D26000-memory.dmp

      Filesize

      408KB

    • memory/3396-25-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3396-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/3712-14-0x00007FF840983000-0x00007FF840985000-memory.dmp

      Filesize

      8KB

    • memory/3712-15-0x0000000000600000-0x000000000060A000-memory.dmp

      Filesize

      40KB

    • memory/3712-17-0x00007FF840983000-0x00007FF840985000-memory.dmp

      Filesize

      8KB

    • memory/5984-2129-0x0000000000730000-0x000000000075E000-memory.dmp

      Filesize

      184KB

    • memory/5984-2130-0x0000000002860000-0x0000000002866000-memory.dmp

      Filesize

      24KB