Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 22:01

General

  • Target

    3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe

  • Size

    815KB

  • MD5

    c8686cc5613060cf6d3d461a8c2c5221

  • SHA1

    0806f72e6442246fcb9bee7aaa44f37aab87a3c9

  • SHA256

    3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d

  • SHA512

    b62f30f04d3d24bc4e2847ed225e9498592b5e406d405686e622bda276ec8a75cbb262b178f4b0d20af21c1966d42ab23d3d087190ff6575da6ecac5b0289bb8

  • SSDEEP

    12288:wMrKy90+YHGsT/fWypwN2dcdi2AugS4TPJrS1Nr0YOw:qy0GIxpa2dck2KHV6low

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe
    "C:\Users\Admin\AppData\Local\Temp\3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468372.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468372.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0957.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0957.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 1088
          4⤵
          • Program crash
          PID:2520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4436.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4436.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:6968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 1488
          4⤵
          • Program crash
          PID:5708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4636 -ip 4636
    1⤵
      PID:2636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2628 -ip 2628
      1⤵
        PID:6524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exe

        Filesize

        169KB

        MD5

        c9546bde2923c73847cdf80eb75af94c

        SHA1

        bdba089825f822bed238fd16617f974d510e22c4

        SHA256

        a3d13fa2eb1e7691f151c88f91fb2f543269801c289e38b511ac108668904862

        SHA512

        7c44612bc094fb6d936be0faa1de538f53f2124ac0ebfd3402391b758e27063a74f3408bd9885d46a5349752a583e20e3fbb05da9ebd00d55ada79e39046315c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468372.exe

        Filesize

        661KB

        MD5

        c6fab10bab20a3144bfc40e40373e476

        SHA1

        44a593623e9f8f7fe5e8fbcc0441c7e14fd00760

        SHA256

        5f574a87397881e072fad9298e268270d7998be3f74377e4ec35423f5e340c09

        SHA512

        f7212db2701892c4f4bc6d39fa223c36a1a5d38b8cd233f5be4919eac9e635670cc74b9eda9cd95d45c8bb53ba4da04b2fe511013d20e129b9fa4c6db5856c7c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0957.exe

        Filesize

        332KB

        MD5

        9cf3755e7b86c5ff55b845c497142aa6

        SHA1

        430d1908152d8af25f9a282489ddb60d57ad40dd

        SHA256

        68c053817aa29e9ed93ad5d803b20b91c6ba5606dc1b3d605226a3454ef3481b

        SHA512

        48ebf7a4956365bbc74d6b4339f2e5020bf258d23453cdbcfe3d004eef5bf40a3733989585b3ec2b929236d7522e4cf3dba854292fc2ff1e82569f32e3ce51a6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4436.exe

        Filesize

        495KB

        MD5

        ff0012a44a8d27cc5744c47c6cf37a2a

        SHA1

        6eaf7d389fadf372b26e8b34ea9b5bdaa26409fd

        SHA256

        e90ebe6d5941d229cbadac429c05169b923243bb25a73654aac98272593494d5

        SHA512

        3360e54482075e71b42240080fab35992fd66c008f0374b27e3f82f3343408368ca45bd13d44c0a68fb0978e532ebc4378c669a7c3be71e9d838f2d03f9066de

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1908-2167-0x0000000003090000-0x0000000003096000-memory.dmp

        Filesize

        24KB

      • memory/1908-2166-0x0000000000F50000-0x0000000000F7E000-memory.dmp

        Filesize

        184KB

      • memory/2628-71-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-68-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-2142-0x0000000004EE0000-0x0000000004F12000-memory.dmp

        Filesize

        200KB

      • memory/2628-93-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-69-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-73-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-77-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-79-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-82-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-83-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-85-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-88-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-89-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-91-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-95-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-75-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-62-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-63-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-65-0x00000000055D0000-0x000000000562F000-memory.dmp

        Filesize

        380KB

      • memory/2628-61-0x00000000055D0000-0x0000000005636000-memory.dmp

        Filesize

        408KB

      • memory/2628-60-0x00000000028F0000-0x0000000002956000-memory.dmp

        Filesize

        408KB

      • memory/4636-45-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-22-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4636-20-0x0000000004ED0000-0x0000000005474000-memory.dmp

        Filesize

        5.6MB

      • memory/4636-50-0x0000000000B20000-0x0000000000C20000-memory.dmp

        Filesize

        1024KB

      • memory/4636-25-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-29-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-19-0x0000000002580000-0x000000000259A000-memory.dmp

        Filesize

        104KB

      • memory/4636-23-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-27-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-31-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-35-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-37-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-47-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-41-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-43-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4636-54-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/4636-39-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-21-0x00000000026F0000-0x0000000002708000-memory.dmp

        Filesize

        96KB

      • memory/4636-49-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-33-0x00000000026F0000-0x0000000002702000-memory.dmp

        Filesize

        72KB

      • memory/4636-18-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/4636-15-0x0000000000B20000-0x0000000000C20000-memory.dmp

        Filesize

        1024KB

      • memory/4636-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4636-16-0x0000000000920000-0x000000000094D000-memory.dmp

        Filesize

        180KB

      • memory/6968-2158-0x0000000005AD0000-0x0000000005BDA000-memory.dmp

        Filesize

        1.0MB

      • memory/6968-2159-0x0000000005930000-0x0000000005942000-memory.dmp

        Filesize

        72KB

      • memory/6968-2160-0x00000000059C0000-0x00000000059FC000-memory.dmp

        Filesize

        240KB

      • memory/6968-2162-0x0000000005A00000-0x0000000005A4C000-memory.dmp

        Filesize

        304KB

      • memory/6968-2157-0x0000000005FE0000-0x00000000065F8000-memory.dmp

        Filesize

        6.1MB

      • memory/6968-2156-0x0000000001880000-0x0000000001886000-memory.dmp

        Filesize

        24KB

      • memory/6968-2155-0x0000000000FC0000-0x0000000000FF0000-memory.dmp

        Filesize

        192KB