Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 03:27

General

  • Target

    4c5bda3e7042c0d110c63ebcd3ee85ab79de5d2f0467ab1b779c6421725fbd53.exe

  • Size

    810KB

  • MD5

    44fc0eedb49ef054bf3fc579bfba43c4

  • SHA1

    2fbba06e7522fc21ee7d20f8cdc7bd3e29a3a2f7

  • SHA256

    4c5bda3e7042c0d110c63ebcd3ee85ab79de5d2f0467ab1b779c6421725fbd53

  • SHA512

    0e66a3c3095a5e97d035f2072b1530b4d9542ec95d48d384ca1f606faf9ec8105c89f15ce9311a9e35e3020809efacf72e9d1c7019bb606cab529eb31b4d47ce

  • SSDEEP

    12288:lMrwy90+OOQJ8hvyoX5jfBvmxhCwbcZGjJJfIzFunAJrcLbKWt/3PWyWQl7so3YL:1y6XJ8hvxbvChPckjrQ4KIu8PbQRL

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c5bda3e7042c0d110c63ebcd3ee85ab79de5d2f0467ab1b779c6421725fbd53.exe
    "C:\Users\Admin\AppData\Local\Temp\4c5bda3e7042c0d110c63ebcd3ee85ab79de5d2f0467ab1b779c6421725fbd53.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr866005.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr866005.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1084
          4⤵
          • Program crash
          PID:4848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu160210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu160210.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 1524
          4⤵
          • Program crash
          PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540185.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540185.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4804 -ip 4804
    1⤵
      PID:4876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 232 -ip 232
      1⤵
        PID:4408
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:456

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si540185.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131142.exe

        Filesize

        656KB

        MD5

        2e37fd12e41389001d8b2ccca6f82f36

        SHA1

        9c47550abeb089f341c64158ecf9fac6df69adbb

        SHA256

        69337a8c21dad3120f0c7870a200021e4c0c5c289fbcb57dd5c0e0ded1fe8fc0

        SHA512

        8c4feb0d2eca9201031079fc7421088b15d917e5a106be1122be5c57fa3904e82ab9c659cca22a349e3bb860fbd9269eb9bcaba0b5eaf488a515a54186ba6170

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr866005.exe

        Filesize

        254KB

        MD5

        a966c15e0894678b20d95d6208c8d478

        SHA1

        f32425f0f464148415de36faff9af3e8390920d4

        SHA256

        4ac7aec026a296370d6122fb8275bf62229c12824b858d8fac133bb256821789

        SHA512

        41c8971b6f8e831e06e94a7f37193492aaa14d376ace8f9a1728c7784831ce18ba6e0df8606b0678113b6338ca455ccb32a0bc76d8fa2771a00b55b3ed2734b4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu160210.exe

        Filesize

        438KB

        MD5

        e4c87132418f39ad708f50d70d57b6a9

        SHA1

        f99aa989f9e164fed11b5e8ea2a6e94b4033d241

        SHA256

        247c7ca445ba1a40c6c63482543f6d6b6cbbf56344178dd27e6aea8b871cd4c1

        SHA512

        ff311c868c0614cb82dd85f1c37f249c7dfad7bf492761da2210f66f6745d7fad3231510524c92d6f6cc2653725e3c3833d4372f9d84e0cef3a16342449d1ab1

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/232-70-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-86-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-88-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-96-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-80-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-62-0x0000000005210000-0x0000000005276000-memory.dmp

        Filesize

        408KB

      • memory/232-94-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-61-0x0000000004AD0000-0x0000000004B38000-memory.dmp

        Filesize

        416KB

      • memory/232-84-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-82-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-90-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-78-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-2205-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/232-63-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-64-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-66-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-68-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-72-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-74-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-92-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/232-76-0x0000000005210000-0x0000000005270000-memory.dmp

        Filesize

        384KB

      • memory/1280-2229-0x0000000000BC0000-0x0000000000BF0000-memory.dmp

        Filesize

        192KB

      • memory/1280-2230-0x0000000002D30000-0x0000000002D36000-memory.dmp

        Filesize

        24KB

      • memory/2880-2218-0x0000000000140000-0x000000000016E000-memory.dmp

        Filesize

        184KB

      • memory/2880-2219-0x0000000000A90000-0x0000000000A96000-memory.dmp

        Filesize

        24KB

      • memory/2880-2220-0x00000000050F0000-0x0000000005708000-memory.dmp

        Filesize

        6.1MB

      • memory/2880-2221-0x0000000004BE0000-0x0000000004CEA000-memory.dmp

        Filesize

        1.0MB

      • memory/2880-2222-0x0000000004AD0000-0x0000000004AE2000-memory.dmp

        Filesize

        72KB

      • memory/2880-2223-0x0000000004AF0000-0x0000000004B2C000-memory.dmp

        Filesize

        240KB

      • memory/2880-2228-0x0000000004B70000-0x0000000004BBC000-memory.dmp

        Filesize

        304KB

      • memory/4804-27-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-50-0x0000000000690000-0x0000000000790000-memory.dmp

        Filesize

        1024KB

      • memory/4804-45-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-18-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4804-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4804-55-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4804-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4804-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4804-22-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-23-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4804-25-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-19-0x0000000002530000-0x000000000254A000-memory.dmp

        Filesize

        104KB

      • memory/4804-29-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-31-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-34-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4804-36-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-37-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-39-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-41-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-44-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-48-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-15-0x0000000000690000-0x0000000000790000-memory.dmp

        Filesize

        1024KB

      • memory/4804-49-0x0000000005140000-0x0000000005152000-memory.dmp

        Filesize

        72KB

      • memory/4804-21-0x0000000005140000-0x0000000005158000-memory.dmp

        Filesize

        96KB

      • memory/4804-20-0x0000000004B40000-0x00000000050E4000-memory.dmp

        Filesize

        5.6MB