Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 04:07

General

  • Target

    f6b6bb9ad7c4087b8b4685413ca55ea427b0875d4ebf1e4c8aa1bbfdb4af756d.exe

  • Size

    787KB

  • MD5

    dd4e856497b06f37c7fff9c0440a0417

  • SHA1

    a357f703117c72a18c8389f9e4f21762235b4905

  • SHA256

    f6b6bb9ad7c4087b8b4685413ca55ea427b0875d4ebf1e4c8aa1bbfdb4af756d

  • SHA512

    23c7b5fc20b3e5d45fb728fafc6ee9174d4005d80327c87ed6fc797d05c7bfc49b44d5be9a006dbd7cbb2eafb85bd225cd22afa40cafdb4779f02b5d6cabcd16

  • SSDEEP

    24576:LyIqcA4RQqubrrhjQoiGml5mtqJUsCxF:+DHqubrFjQ66mtql

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b6bb9ad7c4087b8b4685413ca55ea427b0875d4ebf1e4c8aa1bbfdb4af756d.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b6bb9ad7c4087b8b4685413ca55ea427b0875d4ebf1e4c8aa1bbfdb4af756d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260286.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2166.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1080
          4⤵
          • Program crash
          PID:1104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0460.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3428
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:6116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1380
          4⤵
          • Program crash
          PID:5976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930610.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2672 -ip 2672
    1⤵
      PID:1108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3428 -ip 3428
      1⤵
        PID:6064
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:5964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930610.exe

        Filesize

        168KB

        MD5

        eba91197f81397b8538189369c5c8c13

        SHA1

        7a625529cea34e2ccb4c45f216e5a4e465877be4

        SHA256

        341de150191592a47bbdd88da695fce9dfbda8f11b6f688cab352f7035af23a7

        SHA512

        6123d4cff0f33d9758eaef175009e0931f9db64e7e749fdba23661a0b4c3ce18e5f82050a8fdf125e0412d27ccf6e6287bd76a7112079b576befc8e2ceb799d3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260286.exe

        Filesize

        633KB

        MD5

        56f46941684bc906905a3897db46b2b5

        SHA1

        0d7ee7f97e0973cb9f3519f6e444d250b23fb34b

        SHA256

        6b8455e899acabc0885f6a7d1c7fd8a1ed976d52fec60ade95367219c6c8eea6

        SHA512

        0c782a96b7264b89179dfcab805bc02e8b3545e434ae0e81c216cb7e173bda2db65e4e7d5c30c16dd6841e801f063284b91f5c2225c9a1f60616d59d833d1aec

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2166.exe

        Filesize

        231KB

        MD5

        fbc57695624da06412dbab6820d9c775

        SHA1

        98bcdd3d9a5bd5f408ae0a3b694fbb0beba3c82e

        SHA256

        962fc04ae29a7443371b051ba999c08212fc7d279025701cb12663a5d043b1c2

        SHA512

        6f4feb8dee6b4d44e8d5e5d3c5d36594f328b8cb20b7ed999b65569e0e19c475109e0406e84d8617e49ba56eefcaa392fdd79089fa01b8e3e3affd1a4d9aed71

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0460.exe

        Filesize

        414KB

        MD5

        71324b863a9bf0754d87db9a663543d4

        SHA1

        7108b099e19f0f42fd6ff3b03e235cad85bd0fdf

        SHA256

        465bd59ff7cc9a56fc5e09954326ade5bfa3935927f679b224db2079fba62b43

        SHA512

        a651b442b2c1a6d3e82a916c5de58a104df4b2bdf54e18c3439915410fc108f8225a003f985a654a2d7602f601712d3da5c6be8814b72d644b3c6eb47c0b00ac

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2672-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2672-23-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2672-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2672-19-0x0000000002170000-0x000000000218A000-memory.dmp

        Filesize

        104KB

      • memory/2672-20-0x0000000004C20000-0x00000000051C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2672-15-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/2672-33-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-49-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-47-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-45-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-43-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-41-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-39-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-37-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-35-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-31-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-27-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-25-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-21-0x0000000004A40000-0x0000000004A58000-memory.dmp

        Filesize

        96KB

      • memory/2672-22-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-29-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2672-50-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/2672-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/2672-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2672-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/2672-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3428-78-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-96-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-70-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-74-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-76-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-94-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-88-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-86-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-84-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-80-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-90-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-72-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-92-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-62-0x00000000051B0000-0x0000000005216000-memory.dmp

        Filesize

        408KB

      • memory/3428-82-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-61-0x0000000004B80000-0x0000000004BE6000-memory.dmp

        Filesize

        408KB

      • memory/3428-68-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-66-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-64-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-63-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3428-2143-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/5880-2167-0x0000000000350000-0x000000000037E000-memory.dmp

        Filesize

        184KB

      • memory/5880-2168-0x0000000002520000-0x0000000002526000-memory.dmp

        Filesize

        24KB

      • memory/6116-2156-0x0000000000250000-0x0000000000280000-memory.dmp

        Filesize

        192KB

      • memory/6116-2157-0x00000000009A0000-0x00000000009A6000-memory.dmp

        Filesize

        24KB

      • memory/6116-2158-0x0000000005230000-0x0000000005848000-memory.dmp

        Filesize

        6.1MB

      • memory/6116-2159-0x0000000004D20000-0x0000000004E2A000-memory.dmp

        Filesize

        1.0MB

      • memory/6116-2160-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

        Filesize

        72KB

      • memory/6116-2161-0x0000000004C50000-0x0000000004C8C000-memory.dmp

        Filesize

        240KB

      • memory/6116-2165-0x0000000004C90000-0x0000000004CDC000-memory.dmp

        Filesize

        304KB