Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 02:10

General

  • Target

    ea5113f8c15d2f315b0a19fb4584fb15f8213151c406a4c4b5e483e23b10116a.exe

  • Size

    1.2MB

  • MD5

    9935bf3cc0b5f9b6456f49e60a73830a

  • SHA1

    bd87cf37d71bc876537f96c0e6a09f587bbd504c

  • SHA256

    ea5113f8c15d2f315b0a19fb4584fb15f8213151c406a4c4b5e483e23b10116a

  • SHA512

    4a49666ad000c2e9c3d2ddad10dcc888bb3a20014bd16e21165c8830e82b1a27060adaed350ae467b7cd5d2e51f512536ed415fc1388603dd6c22eebd3d52b2b

  • SSDEEP

    24576:nyJNy60pKrHYrhCRJDWN8lNDaqH0uvRO3ztDOm/GlJbwfp0Gq5E5/:ybyL4zYNgDrl5TGz1O+O16

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea5113f8c15d2f315b0a19fb4584fb15f8213151c406a4c4b5e483e23b10116a.exe
    "C:\Users\Admin\AppData\Local\Temp\ea5113f8c15d2f315b0a19fb4584fb15f8213151c406a4c4b5e483e23b10116a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un585184.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un585184.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un040664.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un040664.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr832512.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr832512.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 1088
            5⤵
            • Program crash
            PID:3272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu457472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu457472.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 1372
            5⤵
            • Program crash
            PID:6108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk458873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk458873.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5472
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1480 -ip 1480
    1⤵
      PID:1524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3180 -ip 3180
      1⤵
        PID:3452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un585184.exe

        Filesize

        865KB

        MD5

        c66b7e152b9de9c9a6f280823721c71b

        SHA1

        4886c98c7aca6f42235dd866c5910e430fa532d6

        SHA256

        3cd242ed2646bbac7bc22891885c9725770e5d0897d2098b47730e1b9315a8b3

        SHA512

        33083ccb2cbd938340d49da94b6e18d4d1796828cc233459ffbc9df7932e8646f75b66372f889c753db0ab9712d1d11d8a3671901e4e71e7e67a37a82f6f89b4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk458873.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un040664.exe

        Filesize

        711KB

        MD5

        b6af4bc4a3ff7f607c255220ef7f6ce2

        SHA1

        cd7b8e8b7fdfd3d68520875baeace3f491d0ed56

        SHA256

        3aaebf3985171540f2de8c83ab502121f745aae373b4f7994451a18ff778ffc7

        SHA512

        1cda7f0a443f574c754e59039f267c7d0ed59273ba78a86cb5e5782d8aabb8a372a04557c9b0e68bf71bbbae117dd6fd4a3863e3447a8f3b82bfb1670d8ad100

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr832512.exe

        Filesize

        405KB

        MD5

        8f494471dadeef99f5d2d9023b207338

        SHA1

        f8813eefdc26c198d7e4e34446df3df551f64f2e

        SHA256

        350050e7debbecf5551830ba4dd5d20084c79f09b529d8cd787351681bdaa005

        SHA512

        237b7aa62d529b11bfe3b2de28b559ad9fc6f05278e82fc639663398d1cbf06ede7d064b8c43887f569375a1de6958bd5d6eeb8e7cde09cb0ca42ad32ccff493

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu457472.exe

        Filesize

        588KB

        MD5

        c0e5736c3f566f6a2d5b241de3fb6a44

        SHA1

        4ca85b54fc1058f6d83860f31c71556320e88ee9

        SHA256

        5a2da28d402e9ba35ee06aec0be8a9789fd32da8023074d832edff3aa31077d2

        SHA512

        03ab2e6677ac3b2d46f01d96f9165bf4a1a87623f4fb7b95b7284202502429f03e44207c5c5e55ba3e6b9105cf2841bc0b7f705b4b95b9844480ff56651c5dd3

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/1480-22-0x0000000002720000-0x000000000273A000-memory.dmp

        Filesize

        104KB

      • memory/1480-23-0x0000000004EE0000-0x0000000005484000-memory.dmp

        Filesize

        5.6MB

      • memory/1480-24-0x0000000002850000-0x0000000002868000-memory.dmp

        Filesize

        96KB

      • memory/1480-34-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-52-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-50-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-48-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-46-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-44-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-42-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-40-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-38-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-37-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-32-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-30-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-28-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-26-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-25-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/1480-53-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/1480-55-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/3180-63-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-69-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-60-0x0000000004DB0000-0x0000000004E18000-memory.dmp

        Filesize

        416KB

      • memory/3180-76-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-95-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-93-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-89-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-87-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-85-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-83-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-82-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-79-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-77-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-73-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-71-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-61-0x0000000005550000-0x00000000055B6000-memory.dmp

        Filesize

        408KB

      • memory/3180-67-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-65-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-91-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-62-0x0000000005550000-0x00000000055B0000-memory.dmp

        Filesize

        384KB

      • memory/3180-2204-0x0000000005750000-0x0000000005782000-memory.dmp

        Filesize

        200KB

      • memory/5472-2228-0x0000000000B20000-0x0000000000B50000-memory.dmp

        Filesize

        192KB

      • memory/5472-2229-0x0000000005230000-0x0000000005236000-memory.dmp

        Filesize

        24KB

      • memory/5816-2217-0x00000000005C0000-0x00000000005EE000-memory.dmp

        Filesize

        184KB

      • memory/5816-2218-0x0000000004ED0000-0x0000000004ED6000-memory.dmp

        Filesize

        24KB

      • memory/5816-2219-0x0000000005570000-0x0000000005B88000-memory.dmp

        Filesize

        6.1MB

      • memory/5816-2220-0x0000000005060000-0x000000000516A000-memory.dmp

        Filesize

        1.0MB

      • memory/5816-2221-0x0000000004F20000-0x0000000004F32000-memory.dmp

        Filesize

        72KB

      • memory/5816-2222-0x0000000004F90000-0x0000000004FCC000-memory.dmp

        Filesize

        240KB

      • memory/5816-2224-0x0000000004FE0000-0x000000000502C000-memory.dmp

        Filesize

        304KB