Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 22:09

General

  • Target

    eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059.exe

  • Size

    652KB

  • MD5

    a4fbccfb98f09d5a5b88d61632164302

  • SHA1

    d4663b8f22b64395d80b5082004963cda8594386

  • SHA256

    eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059

  • SHA512

    c0acc249c6edee021a153d1ba67136b277982d2e89f2f630afaec9ee0414a597feec07c6e55fe9d1e40f236608f6c2bf439efd3aa6d04e821ea3c4142b373e1a

  • SSDEEP

    12288:1MrJy90npVpLckRyoXTBMBNiJrOtPs4lVmDtXeu1sVWCS:MyuzdBmP7ytB

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059.exe
    "C:\Users\Admin\AppData\Local\Temp\eae58dadc4691205bdda812f8a41a4f3514e0397e045fef1f2c90b529f385059.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMt2264.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMt2264.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364853.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364853.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960229.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1376
          4⤵
          • Program crash
          PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr786384.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr786384.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4752 -ip 4752
    1⤵
      PID:5672
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:4520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr786384.exe

      Filesize

      169KB

      MD5

      3c599ba4d5eddca2b0af810f848441f9

      SHA1

      3e9be7af3bea8700cc71084928c79235c3e788b1

      SHA256

      905f2a6dff87aa1deea24e5fd53c994f9c7f14fe5832d48dc0aba19dbd95f40c

      SHA512

      35e7c23f600905aa58127199d1edab81b4e40c913bce2a0abb7feb7cef07d7b033f586d9377f05455827b0de3a58c6edfecce15c15160572014f088189a654c4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMt2264.exe

      Filesize

      498KB

      MD5

      946c02da07ce84aee12073def6f61557

      SHA1

      1b793453df6e81f9d49ab8cf7a45c8c113125d35

      SHA256

      8446d6adc850c7c831c87b19c2fccf3df09166ac56a50ad73fe80a29a720feea

      SHA512

      e64faaa94f93a4145109c70bbf3697c738926d6db178f053f12b966e2ece65636c664fb2f5f72b098af2035558138121eb060ac45e0a13e1e7989bf800f91156

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364853.exe

      Filesize

      12KB

      MD5

      1fe24cb65327e7cdaaf6876f57ff2e66

      SHA1

      8bb9649637eb0e3c0c1dd51ce8acef6f6427d30c

      SHA256

      16ec70c2cb67ab0aece11d4bee317d5bc77fdb386423bea50db810d2ef6995f8

      SHA512

      a8e45bc1c578939ec54864a41a512dd501b8f6e4e4ce5fd8069a0b47e72e264cabf9b45a132b899d17e3f2b8d66ce9b3d82e1390be94356659521a9b67d02952

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku960229.exe

      Filesize

      417KB

      MD5

      2bac110bcba6084285237cd2043fb059

      SHA1

      157c903c6a7f1189b1aae89e15ad3c6c3c0d8020

      SHA256

      d8fc728a53d5a88a2fe33a6551443196bf78db0c32aa961740742cb08e1a7f30

      SHA512

      768cb40fd229c4e9d53f2024b9f1d7df61a7996a92e014b8d2466c5470ee077feb7137e73ea471d13d0f4a7f8add3a5faf82b16020874ddb3948d68af0aa4474

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/3036-2129-0x0000000000B40000-0x0000000000B6E000-memory.dmp

      Filesize

      184KB

    • memory/3036-2130-0x0000000002E90000-0x0000000002E96000-memory.dmp

      Filesize

      24KB

    • memory/3912-14-0x00007FF823E53000-0x00007FF823E55000-memory.dmp

      Filesize

      8KB

    • memory/3912-15-0x0000000000FF0000-0x0000000000FFA000-memory.dmp

      Filesize

      40KB

    • memory/3912-16-0x00007FF823E53000-0x00007FF823E55000-memory.dmp

      Filesize

      8KB

    • memory/4752-64-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-52-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-24-0x0000000005370000-0x00000000053D6000-memory.dmp

      Filesize

      408KB

    • memory/4752-36-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-88-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-86-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-84-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-82-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-80-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-78-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-76-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-74-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-72-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-70-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-68-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-66-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-22-0x0000000004CF0000-0x0000000004D56000-memory.dmp

      Filesize

      408KB

    • memory/4752-62-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-60-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-56-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-54-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-23-0x0000000004DC0000-0x0000000005364000-memory.dmp

      Filesize

      5.6MB

    • memory/4752-50-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-48-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-46-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-44-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-42-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-40-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-38-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-34-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-32-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-30-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-28-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-58-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-26-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-25-0x0000000005370000-0x00000000053CF000-memory.dmp

      Filesize

      380KB

    • memory/4752-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/4848-2118-0x00000000004C0000-0x00000000004F0000-memory.dmp

      Filesize

      192KB

    • memory/4848-2119-0x0000000002630000-0x0000000002636000-memory.dmp

      Filesize

      24KB

    • memory/4848-2120-0x0000000005470000-0x0000000005A88000-memory.dmp

      Filesize

      6.1MB

    • memory/4848-2121-0x0000000004F60000-0x000000000506A000-memory.dmp

      Filesize

      1.0MB

    • memory/4848-2122-0x0000000004E50000-0x0000000004E62000-memory.dmp

      Filesize

      72KB

    • memory/4848-2123-0x0000000004E70000-0x0000000004EAC000-memory.dmp

      Filesize

      240KB

    • memory/4848-2124-0x0000000004EF0000-0x0000000004F3C000-memory.dmp

      Filesize

      304KB