Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 07:57

General

  • Target

    c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe

  • Size

    661KB

  • MD5

    793d1cd35ad047ff8a3f68a2881b9a10

  • SHA1

    a3dab5dec715dd2b3201329441b9bc22c82efdd0

  • SHA256

    c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50

  • SHA512

    0a165f761d5ad3dac54a4217cafba28d7de60ce9f832fb311b03d2a8f2677de7f5d3d212f7b1938539d4370e7fdac091f6ae6c6f9f68864d39d7116fbb80498e

  • SSDEEP

    12288:tMrOy90Vgj2J4eUvoAZfjBf4KyY4Yzy2y4SzcvaZyNU:TySqecLZfjBrv22y4EmNU

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe
    "C:\Users\Admin\AppData\Local\Temp\c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioJ2512.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioJ2512.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku388025.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku388025.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3888
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 1208
          4⤵
          • Program crash
          PID:4544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3888 -ip 3888
    1⤵
      PID:5228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exe

      Filesize

      168KB

      MD5

      37be4d0bf281d72f1391c3ed5bfd1c29

      SHA1

      3beb273bf3e923fe075c62895c36345793e36a6f

      SHA256

      846118cc79ca68eba7f275eff8e03c33e46290f8843e75c0fed1160937f773e7

      SHA512

      e757c3ddacda543391009434f751e57475f366b3ef6a8893abdb7f9b6fab32775589fc95c897197e534a4199770df237299bdfe4ac0b0fb10565b35c759ad684

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioJ2512.exe

      Filesize

      507KB

      MD5

      95b52a77fb43c6bc2e369b019fb90897

      SHA1

      f926a4415c4082169279ea2ae0fae707588cb218

      SHA256

      2c71b55b7a78af64455941943d7eba1bb21834e2ab89745e398dd69464daccda

      SHA512

      7474eda91f614e9ae3d8cc4d77279015ba5ff6ada655cfb7a9d3edc727bb16d78132dabe66785ddeb2f074216473c0faaf4c9d5e9007c20acc7b9bc170165b92

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exe

      Filesize

      11KB

      MD5

      1064c8e873b8ef7b683a5228cbc88b8b

      SHA1

      18fd3ab0f542ae640f158b5ac20615c4b1940699

      SHA256

      cad5902d256fd6e9f3a64166925193a0ffbe66db4ec317b38bb76050f3367787

      SHA512

      db04baf087525ab2c23221a977d970ea6c280975c94895d007f676af4ed66b9787c0ab23cf2282046504ef40cf7e936dbd6b57a777f4039ebaf6de17f0fd327d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku388025.exe

      Filesize

      435KB

      MD5

      914e0856ab5cdbf42ab9abdcc7fc26c7

      SHA1

      bc33762416b020f4d37c7af5c5c263a647a204e9

      SHA256

      311a07ba57d3e801f36502e417132a57b7e0f29f756cc2f6375f18dbfc0e77de

      SHA512

      be58aaaab8d987384786dad7c0f832adca2fe876072440f40f29282174f82af358b9770e6a2c32b125e5dd5aeb8b60d40c54471ce036d40dc7f94fbb450176b5

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/3284-2118-0x0000000000770000-0x00000000007A0000-memory.dmp

      Filesize

      192KB

    • memory/3284-2124-0x00000000052E0000-0x000000000532C000-memory.dmp

      Filesize

      304KB

    • memory/3284-2123-0x0000000005150000-0x000000000518C000-memory.dmp

      Filesize

      240KB

    • memory/3284-2122-0x00000000050F0000-0x0000000005102000-memory.dmp

      Filesize

      72KB

    • memory/3284-2121-0x00000000051D0000-0x00000000052DA000-memory.dmp

      Filesize

      1.0MB

    • memory/3284-2120-0x00000000056E0000-0x0000000005CF8000-memory.dmp

      Filesize

      6.1MB

    • memory/3284-2119-0x00000000027E0000-0x00000000027E6000-memory.dmp

      Filesize

      24KB

    • memory/3888-50-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-34-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-78-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-76-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-72-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-70-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-68-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-66-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-64-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-60-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-58-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-56-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-54-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-52-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-84-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-46-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-44-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-42-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-40-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-38-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-36-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-80-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-32-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-30-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-29-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-82-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-74-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-62-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-86-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-88-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-48-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-26-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-24-0x0000000004C00000-0x0000000004C66000-memory.dmp

      Filesize

      408KB

    • memory/3888-23-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/3888-22-0x00000000024C0000-0x0000000002526000-memory.dmp

      Filesize

      408KB

    • memory/3888-25-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/3888-2105-0x0000000005400000-0x0000000005432000-memory.dmp

      Filesize

      200KB

    • memory/4000-14-0x00007FFCBFD43000-0x00007FFCBFD45000-memory.dmp

      Filesize

      8KB

    • memory/4000-15-0x0000000000090000-0x000000000009A000-memory.dmp

      Filesize

      40KB

    • memory/4000-16-0x00007FFCBFD43000-0x00007FFCBFD45000-memory.dmp

      Filesize

      8KB

    • memory/5436-2129-0x00000000006A0000-0x00000000006CE000-memory.dmp

      Filesize

      184KB

    • memory/5436-2130-0x0000000004E40000-0x0000000004E46000-memory.dmp

      Filesize

      24KB