Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 09:44

General

  • Target

    5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe

  • Size

    788KB

  • MD5

    1c0fc3e976a66c2d79267870eed85973

  • SHA1

    b52f3cc0830721f5d67e904e29524aa601fcde58

  • SHA256

    5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5

  • SHA512

    864ed2dd1331a3de6ffd623b0f4e0b3127ec3ec293ea1d258b6b216a379b33f809720a51835d4841d39decd28b64072e299ed0c92271c17a1b67f13e3450d556

  • SSDEEP

    12288:gMrpy90R3a/DnN5wFIY2Rig2D3hkK1Nko37pgGVqFx8vkQIb1P2nfvH:5yM34HQFqLsqK1HOGokTIt2nH

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe
    "C:\Users\Admin\AppData\Local\Temp\5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805936.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805936.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1910.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1910.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1080
          4⤵
          • Program crash
          PID:3148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9932.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9932.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 1492
          4⤵
          • Program crash
          PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1304
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4424 -ip 4424
    1⤵
      PID:2596
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2856 -ip 2856
      1⤵
        PID:1664
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:5396

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exe

        Filesize

        168KB

        MD5

        ccd18a95c884bcdc5e0885d59ec71be1

        SHA1

        a6c2eedf1c5758f8432015c989824fe8d3a8f937

        SHA256

        55d670d4abfd8d9df5389b2ae0dba0abba7236703083723a5ec22a0fb79687f3

        SHA512

        f3eea5269b6e6e1d43d89e23e2e91f75a6b57b832cbde6634f3c6490354710df135f5541dd4a3a77872aad37ef3b6163d6dc9c775b07139f78662ee6dff749bd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805936.exe

        Filesize

        634KB

        MD5

        7d0346146ae521611e70222d249d341a

        SHA1

        39fdbb953971c9ff492740242cbef10fec5e1e00

        SHA256

        2622e8fc2b720a9e34ba30994d8ffc60e8d87b78581f9dd124a43b28b6a9ebb7

        SHA512

        abe06e4697cac72e1ebd054d5f20696383c1c8bad0736a9f73883f4f12fca167ecaf83de6b6beca967161c14cfb0f785d606e661f86d13def1cfea5c60db2d28

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1910.exe

        Filesize

        231KB

        MD5

        f2bda3b2143dc563d8d00c6365f04560

        SHA1

        547756cd0798bfabc11d112498ed2ae327b7f7aa

        SHA256

        c369b65c2fd7a2f313643cd9171e041092d9f2ee77b759746534db59d7e0b78c

        SHA512

        5ebb53df4c3dae6d9a92b1af37c154ac678e0b90e4ddfdabcec32d674588dcd916a75db4314b3c52d494bc778aad2a3dcc72b7055c2c8ce8750390064b4935f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9932.exe

        Filesize

        415KB

        MD5

        51740ec4674c85285cdc13be4c1df0d8

        SHA1

        2ab440fa0a10fc38337a79191bc7566120a5abed

        SHA256

        575c93db1cf96aa30cef2c14d31f55142325af579ad124b72874d7c79786f0f5

        SHA512

        797493cd9c41d559eb0bda4caa804abb773565d31726b5e35799882face8e1e9c0a5d221abf5cbeb004266821b6da756700eb25287bbbefd1a07bdaf674ba0d6

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1304-2168-0x0000000002320000-0x0000000002326000-memory.dmp

        Filesize

        24KB

      • memory/1304-2167-0x0000000000030000-0x000000000005E000-memory.dmp

        Filesize

        184KB

      • memory/2856-68-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-80-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-2143-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2856-63-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-64-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-95-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-70-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-72-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-74-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-76-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-82-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-84-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-86-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-88-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-90-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-92-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-96-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-78-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-66-0x0000000004AF0000-0x0000000004B4F000-memory.dmp

        Filesize

        380KB

      • memory/2856-62-0x0000000004AF0000-0x0000000004B56000-memory.dmp

        Filesize

        408KB

      • memory/2856-61-0x0000000002450000-0x00000000024B6000-memory.dmp

        Filesize

        408KB

      • memory/4424-43-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-23-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4424-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4424-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4424-50-0x00000000007D0000-0x00000000008D0000-memory.dmp

        Filesize

        1024KB

      • memory/4424-22-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-19-0x0000000004AF0000-0x0000000004B0A000-memory.dmp

        Filesize

        104KB

      • memory/4424-25-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-45-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-29-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-31-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-33-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-35-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-39-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-41-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4424-20-0x0000000004BA0000-0x0000000005144000-memory.dmp

        Filesize

        5.6MB

      • memory/4424-27-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-21-0x0000000005150000-0x0000000005168000-memory.dmp

        Filesize

        96KB

      • memory/4424-47-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-49-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-37-0x0000000005150000-0x0000000005162000-memory.dmp

        Filesize

        72KB

      • memory/4424-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4424-15-0x00000000007D0000-0x00000000008D0000-memory.dmp

        Filesize

        1024KB

      • memory/4424-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4424-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4692-2160-0x0000000005010000-0x0000000005022000-memory.dmp

        Filesize

        72KB

      • memory/4692-2159-0x00000000052D0000-0x00000000053DA000-memory.dmp

        Filesize

        1.0MB

      • memory/4692-2161-0x0000000005070000-0x00000000050AC000-memory.dmp

        Filesize

        240KB

      • memory/4692-2162-0x00000000051D0000-0x000000000521C000-memory.dmp

        Filesize

        304KB

      • memory/4692-2158-0x00000000057E0000-0x0000000005DF8000-memory.dmp

        Filesize

        6.1MB

      • memory/4692-2157-0x00000000028D0000-0x00000000028D6000-memory.dmp

        Filesize

        24KB

      • memory/4692-2156-0x00000000007A0000-0x00000000007D0000-memory.dmp

        Filesize

        192KB