Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 19:50

General

  • Target

    2cbd2947a7c58fce8092e43a07c5fa189fe464232b033ccdc170863a41795500.exe

  • Size

    814KB

  • MD5

    f9ac094baac80d3719f72fe866d82e54

  • SHA1

    d904c5098610b0d17cdaa4453546b51ddf860133

  • SHA256

    2cbd2947a7c58fce8092e43a07c5fa189fe464232b033ccdc170863a41795500

  • SHA512

    6376124fac806c63282ddad4d3ba9d6d630bd3f02adeb8399244faa0fa7c7de05920d030a0275f427a9388ea8cca4b057365f8b3ec135edbeb6ca3bba77f6478

  • SSDEEP

    12288:pMrsy90rQYhvy4UUO6aJJxpC/kAOD519cj31TwHtcz50QILwxyHDQt3mxlRF0Dr6:ZyVYhvup6aJo8nfaT1TwRMeDyo5MdM

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cbd2947a7c58fce8092e43a07c5fa189fe464232b033ccdc170863a41795500.exe
    "C:\Users\Admin\AppData\Local\Temp\2cbd2947a7c58fce8092e43a07c5fa189fe464232b033ccdc170863a41795500.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un231098.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un231098.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2716.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2716.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 1080
          4⤵
          • Program crash
          PID:3668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0242.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 1368
          4⤵
          • Program crash
          PID:3444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490777.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490777.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4560 -ip 4560
    1⤵
      PID:3960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4572 -ip 4572
      1⤵
        PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490777.exe

        Filesize

        169KB

        MD5

        29f74ae6a84b8257484cd905baff80d7

        SHA1

        5d3e1eceda44cc0b69a42727980796d8db209dca

        SHA256

        aa610b10871587eab8511cae975f3da1a59b1a6e245dc92c7535f06b5d70fc14

        SHA512

        c530b2d85a76a15510bde0a5dab84e7d277ff90f04c97d15458371b5b28e8c80100045213c744f8b788ace1c43dc1cb2f6fe3d580c9611659637f96bf3d4bd0c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un231098.exe

        Filesize

        660KB

        MD5

        f9205aa7a47b416bf06d90288ec095f7

        SHA1

        a5da76a3ff5d680c6143355cdb75315bc520f2c1

        SHA256

        d1e5161d01dd50894047f4b51a4d2c755c8cbbcae87914d0b9394ab8cc692f43

        SHA512

        85646240e68379dcabba60d1b923255c65e43de41139d80a387fc013d635f1194b0df6fa543be5ce3d0be8bd289be60757234e00fab3b9a098b699d53ffefdcb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2716.exe

        Filesize

        312KB

        MD5

        af96c37a9106bad3e31b72314769b0b3

        SHA1

        20c2514c0cf59b3109effba369e662a03daae568

        SHA256

        4e952273fb4191445d47b20611e6a04e255fd1c23a6bf8dfc7c55e7056da4f7a

        SHA512

        506bfe660e0d427c3883f232bd4d3765783cb94b4e1b52cad6380f68e24586dd23288ce9e2f0ad195fa101b92c3ffe6257586e87c415e621e0c61a55de9fd407

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0242.exe

        Filesize

        495KB

        MD5

        400100f062e9c7a07473331cf838daba

        SHA1

        e7c1c228fb36cc6a17c4d05dbc8b5ba77464465f

        SHA256

        2b2100eb953aca6d0418d1b4e195e94e6ac6492bb836b404ed5cce044eaea70b

        SHA512

        5aab1d4cdbecb5d40eb0cf708894fbf42e504b0eddf298dfbf3bf8d1ce02b5d2ecb47b074d94427578b3da3acfc7161edcd9953d05a36a024ab46f99cb124cbd

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2092-2168-0x0000000002D00000-0x0000000002D06000-memory.dmp

        Filesize

        24KB

      • memory/2092-2167-0x0000000000BB0000-0x0000000000BDE000-memory.dmp

        Filesize

        184KB

      • memory/2760-2157-0x0000000002760000-0x0000000002766000-memory.dmp

        Filesize

        24KB

      • memory/2760-2158-0x000000000A830000-0x000000000AE48000-memory.dmp

        Filesize

        6.1MB

      • memory/2760-2156-0x0000000000490000-0x00000000004C0000-memory.dmp

        Filesize

        192KB

      • memory/2760-2163-0x0000000002640000-0x000000000268C000-memory.dmp

        Filesize

        304KB

      • memory/2760-2161-0x000000000A290000-0x000000000A2CC000-memory.dmp

        Filesize

        240KB

      • memory/2760-2159-0x000000000A320000-0x000000000A42A000-memory.dmp

        Filesize

        1.0MB

      • memory/2760-2160-0x000000000A230000-0x000000000A242000-memory.dmp

        Filesize

        72KB

      • memory/4560-51-0x0000000000AD0000-0x0000000000AFD000-memory.dmp

        Filesize

        180KB

      • memory/4560-22-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-47-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-45-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-43-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-41-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-39-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-35-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-34-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-29-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-27-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-25-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-23-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-21-0x0000000002830000-0x0000000002848000-memory.dmp

        Filesize

        96KB

      • memory/4560-31-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-50-0x0000000000890000-0x0000000000990000-memory.dmp

        Filesize

        1024KB

      • memory/4560-37-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-55-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/4560-16-0x0000000000AD0000-0x0000000000AFD000-memory.dmp

        Filesize

        180KB

      • memory/4560-15-0x0000000000890000-0x0000000000990000-memory.dmp

        Filesize

        1024KB

      • memory/4560-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-49-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4560-18-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/4560-19-0x00000000026A0000-0x00000000026BA000-memory.dmp

        Filesize

        104KB

      • memory/4560-20-0x0000000004FF0000-0x0000000005594000-memory.dmp

        Filesize

        5.6MB

      • memory/4572-78-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-66-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-96-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-64-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-84-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-63-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-94-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-92-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-90-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-88-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-68-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-70-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-72-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-74-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-76-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-62-0x00000000055A0000-0x0000000005606000-memory.dmp

        Filesize

        408KB

      • memory/4572-61-0x0000000002910000-0x0000000002976000-memory.dmp

        Filesize

        408KB

      • memory/4572-86-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-83-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-80-0x00000000055A0000-0x00000000055FF000-memory.dmp

        Filesize

        380KB

      • memory/4572-2143-0x0000000005770000-0x00000000057A2000-memory.dmp

        Filesize

        200KB