Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 16:40

General

  • Target

    1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394.exe

  • Size

    810KB

  • MD5

    d8ac5fedb57e6bf906364f62b504fbc0

  • SHA1

    ca892b05accb6fdd1fa32d6a1ee52b6b72c84de0

  • SHA256

    1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394

  • SHA512

    8a5c7e43eb8d92007311337885894c40c7bd63819fa4dc4f0efd5048d7952a7fe229bd438080f3e724e7062392e793ae704d72555cda6628e49dfc79e549c8a5

  • SSDEEP

    12288:+MrIy90DoXH2fTVmJS5Woro6TH+e4H+5WwKV9x2z43A4Oc4VQcMbgDelqzsV:qycoKVm6WC/aeoNhl/bgD4KsV

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394.exe
    "C:\Users\Admin\AppData\Local\Temp\1918625ba1864fdc598278707ab1f74f5c9b5d1615d22bfb102597f312340394.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un862227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un862227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr086521.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr086521.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1088
          4⤵
          • Program crash
          PID:3580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu518685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu518685.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5044
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1380
          4⤵
          • Program crash
          PID:3128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si633529.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si633529.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4872 -ip 4872
    1⤵
      PID:4864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5044 -ip 5044
      1⤵
        PID:6048

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si633529.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un862227.exe

        Filesize

        656KB

        MD5

        87d0a04038e0d418c594b18547efc222

        SHA1

        c5e6fe8e6244a4ea194e5212d47f211d74c41134

        SHA256

        001cf7b617b184db481b832680c87db35903165b3eb18c313e02c5b443542a8e

        SHA512

        4844ac19804782ca3cc528aae675854b4a0fc80147945d1e537615c187d870809fa6dc3f848c5ae504022dc1b3ee43bb5cdf8f2e295ff384db9f0f2f69b647fd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr086521.exe

        Filesize

        254KB

        MD5

        48b703c2590d003c1940de957c1eb3c7

        SHA1

        f79eb4429d43f2dc5120926bfbb3311c14413b34

        SHA256

        c4d041c32cdbecf5bdf02299651112a420129edc1a8e9d1a0577431b49110e2e

        SHA512

        005455bac84d0eb8489124c6d13c5e27eda2044b7c57e519ca4a7afa2a4de88e17020718d9fadb091f012db8e010621b8400f2a277e678dd59bc71b07cdc6376

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu518685.exe

        Filesize

        438KB

        MD5

        eb0ee33141047811b40b4b08bfca7052

        SHA1

        354784de7a9505a84e8db847041b84d3e09a00d7

        SHA256

        0e9cf2a772e66af39bad9e8d15ec14a949192180cede23ca0d17b1a2b4cba734

        SHA512

        56eec836802a35e797bcc4e1a3826d0f31fc40a20604e27c1d8272ae5b05386dc5d87426c88c945f21fe367f1eb5c4a1aea44e6342e6b006d8199c6b9f3fca31

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/2308-2229-0x0000000000370000-0x00000000003A0000-memory.dmp

        Filesize

        192KB

      • memory/2308-2230-0x00000000025B0000-0x00000000025B6000-memory.dmp

        Filesize

        24KB

      • memory/4872-51-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/4872-16-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/4872-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4872-18-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4872-19-0x00000000022A0000-0x00000000022BA000-memory.dmp

        Filesize

        104KB

      • memory/4872-20-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/4872-21-0x00000000025F0000-0x0000000002608000-memory.dmp

        Filesize

        96KB

      • memory/4872-45-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-49-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-47-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-43-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-41-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-39-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-38-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-35-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-33-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-31-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-29-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-27-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-25-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-23-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-22-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/4872-50-0x00000000006E0000-0x00000000007E0000-memory.dmp

        Filesize

        1024KB

      • memory/4872-15-0x00000000006E0000-0x00000000007E0000-memory.dmp

        Filesize

        1024KB

      • memory/4872-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4872-55-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4872-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5044-61-0x0000000004A60000-0x0000000004AC8000-memory.dmp

        Filesize

        416KB

      • memory/5044-62-0x00000000051B0000-0x0000000005216000-memory.dmp

        Filesize

        408KB

      • memory/5044-76-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-88-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-96-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-94-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-90-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-86-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-84-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-82-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-80-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-78-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-74-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-72-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-70-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-68-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-92-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-66-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-64-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-63-0x00000000051B0000-0x0000000005210000-memory.dmp

        Filesize

        384KB

      • memory/5044-2205-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/5956-2218-0x0000000000C10000-0x0000000000C3E000-memory.dmp

        Filesize

        184KB

      • memory/5956-2219-0x0000000002ED0000-0x0000000002ED6000-memory.dmp

        Filesize

        24KB

      • memory/5956-2220-0x0000000005D00000-0x0000000006318000-memory.dmp

        Filesize

        6.1MB

      • memory/5956-2221-0x00000000057F0000-0x00000000058FA000-memory.dmp

        Filesize

        1.0MB

      • memory/5956-2222-0x0000000003030000-0x0000000003042000-memory.dmp

        Filesize

        72KB

      • memory/5956-2223-0x0000000003090000-0x00000000030CC000-memory.dmp

        Filesize

        240KB

      • memory/5956-2224-0x0000000005630000-0x000000000567C000-memory.dmp

        Filesize

        304KB