Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 22:53

General

  • Target

    8416d05db235ae721fc4b50ec9d9b38d8ee0750a32e2394d595ee327115278bd.exe

  • Size

    655KB

  • MD5

    60ac37755a96ffd45fe44084f8f5c64c

  • SHA1

    7e824591ad767b0732973c12027c87d19f3f7e3d

  • SHA256

    8416d05db235ae721fc4b50ec9d9b38d8ee0750a32e2394d595ee327115278bd

  • SHA512

    c82117e7fcee994cac1772f2bca4e7d91a3e54c2671f570f6832afe72bc1fa24ec700e4a386f0ea96fd69e9f193ec3a4573394975df0ecca71f2d7c4cf56e219

  • SSDEEP

    12288:oMroy90kveWgTdm5UuZcVffSnu8At44YugZILq8PS5/NPxxsOafHReR0TB:Qyjevd1f56nub/YugZp8uPxxmg0TB

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8416d05db235ae721fc4b50ec9d9b38d8ee0750a32e2394d595ee327115278bd.exe
    "C:\Users\Admin\AppData\Local\Temp\8416d05db235ae721fc4b50ec9d9b38d8ee0750a32e2394d595ee327115278bd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQQ9794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQQ9794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr004009.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr004009.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku765241.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku765241.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 1380
          4⤵
          • Program crash
          PID:1848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr722695.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr722695.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2564 -ip 2564
    1⤵
      PID:5100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr722695.exe

      Filesize

      168KB

      MD5

      398021e729241f3330819734629cee52

      SHA1

      d2056bf7d95d1ce0c86a15f42776e18a6618f0dd

      SHA256

      ea2345f6dbf3be4aad3cfb14f7543f0c553e808b95d8c17541412dbf40a08555

      SHA512

      15390a6008d4a984e76b5e6890cfd46b215939880b34c081549c34dbf866f1df25e7e9b3527a7b09543567ef3aec54dfb7a5572dc6925cd1d7ea05ae8611e9f8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQQ9794.exe

      Filesize

      502KB

      MD5

      d659e12fa2ca935ffbe8847f71744212

      SHA1

      9e0e0395398ba8213e13dcf43d5cb666cab0b579

      SHA256

      28b905aa47c4ae6016984395b767e4075414766ca1847809eb7b81b9e3bc339b

      SHA512

      3695824c3401bfac2487f0d27a3a42188edf9cc540a6c4d0a431ca1d2acc389647612b3909fd1b732bbab3d4c14c610e2e9180408fda13c3071204bc07bd57f0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr004009.exe

      Filesize

      11KB

      MD5

      926401d28f2d419dd13ae4176ec862f7

      SHA1

      fb7637099ab685a43294536062ea62e28f915d25

      SHA256

      2af10a84aa25d352e2e2c6903062c5edcdb79c12a76f8794a1e26c8713e62bbf

      SHA512

      ad9bed0a4436af434503c55e5c51ead97de81db3bab912beb4f183b2de15b2977caf3710a5e04f456611130a965ace76c4388ca1073c71cd67d0becc04d275d8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku765241.exe

      Filesize

      424KB

      MD5

      4b528e1c17277344cb355f3899d277c8

      SHA1

      e8ca4415ed049aab365e8746ccd1854331893fae

      SHA256

      5ce945051132dfd6792df971b856af64651e11cd5bbab0bf14d1b376bc57f125

      SHA512

      a47093358924b1a914fb6ba13b5301552fa09dbed7a19ad1d5a0727c8a27f24e886aa185b4f31ba55a5f5855ddaea01056edcc459913ffffea6cb1de634a75ba

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1624-16-0x00007FF989293000-0x00007FF989295000-memory.dmp

      Filesize

      8KB

    • memory/1624-15-0x00000000001F0000-0x00000000001FA000-memory.dmp

      Filesize

      40KB

    • memory/1624-14-0x00007FF989293000-0x00007FF989295000-memory.dmp

      Filesize

      8KB

    • memory/2176-2118-0x0000000000A10000-0x0000000000A40000-memory.dmp

      Filesize

      192KB

    • memory/2176-2119-0x0000000001240000-0x0000000001246000-memory.dmp

      Filesize

      24KB

    • memory/2176-2120-0x00000000059A0000-0x0000000005FB8000-memory.dmp

      Filesize

      6.1MB

    • memory/2176-2124-0x0000000005440000-0x000000000548C000-memory.dmp

      Filesize

      304KB

    • memory/2176-2123-0x0000000005400000-0x000000000543C000-memory.dmp

      Filesize

      240KB

    • memory/2176-2122-0x00000000053A0000-0x00000000053B2000-memory.dmp

      Filesize

      72KB

    • memory/2176-2121-0x0000000005490000-0x000000000559A000-memory.dmp

      Filesize

      1.0MB

    • memory/2564-64-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-42-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-84-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-82-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-78-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-76-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-74-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-72-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-70-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-68-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-66-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-89-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-62-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-60-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-58-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-56-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-52-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-50-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-46-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-86-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-41-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-38-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-36-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-34-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-32-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-80-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-54-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-30-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-48-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-44-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-24-0x0000000005330000-0x0000000005396000-memory.dmp

      Filesize

      408KB

    • memory/2564-23-0x0000000004D40000-0x00000000052E4000-memory.dmp

      Filesize

      5.6MB

    • memory/2564-22-0x0000000004CD0000-0x0000000004D36000-memory.dmp

      Filesize

      408KB

    • memory/2564-28-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-26-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-25-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/2564-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/5132-2129-0x0000000000030000-0x000000000005E000-memory.dmp

      Filesize

      184KB

    • memory/5132-2130-0x0000000000940000-0x0000000000946000-memory.dmp

      Filesize

      24KB