Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 10:22

General

  • Target

    c69e1337078a9438265130b65892aee3d87bd555f7b4cc85b4280acac843cd7c.exe

  • Size

    814KB

  • MD5

    b998366a003d5b2dfd730d0c579378f8

  • SHA1

    2c2f298d8c3efdd0df34f31c460657efed73b67f

  • SHA256

    c69e1337078a9438265130b65892aee3d87bd555f7b4cc85b4280acac843cd7c

  • SHA512

    18f7e7191d20b5ef50d5def5c95979a882fab65ca3d3267a1df77685ffa9d9daa3817f121f91b9beae468935b30a20a512704707d8c0543ae439d5be86c268b8

  • SSDEEP

    12288:MMrgy90PB+zG6q8hEBAO3fR7CmFi5kq451KssmxhjWAcz5aVIRwxyPDQSnQxlHY2:MyOBOeE5dmFiSqIfsqhd0MmDFCizGF

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c69e1337078a9438265130b65892aee3d87bd555f7b4cc85b4280acac843cd7c.exe
    "C:\Users\Admin\AppData\Local\Temp\c69e1337078a9438265130b65892aee3d87bd555f7b4cc85b4280acac843cd7c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un817045.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un817045.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6423.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1096
          4⤵
          • Program crash
          PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2614.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2614.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1500
          4⤵
          • Program crash
          PID:5580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959180.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959180.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2300 -ip 2300
    1⤵
      PID:3696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4984 -ip 4984
      1⤵
        PID:4572
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:6924

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si959180.exe

        Filesize

        169KB

        MD5

        8818bc42c53723687e4310188862066e

        SHA1

        e8e3ae3ca8a4c5b35794ae8a461c8439afd6bbbe

        SHA256

        7ddc35a57332289b4d5a1db0a5bcd03e9d276ed4b45ef95c6688d7ad08f6cdf6

        SHA512

        4a7c159d9ada4b02b3ec448a9de9d6c2967bd9717600f7bf04f4f290e1b12bacfd7affe7bdb5cf16668c571a2e195c21e7243b6a0875768b7f1d12742d8fc75a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un817045.exe

        Filesize

        660KB

        MD5

        1b36cc8d420335337c4ba1b1db13b569

        SHA1

        b5cca736aa6c04d48e66c5a072277d970387e7a8

        SHA256

        b3b458fc874e5d0a60ea12cd78db0da80662d1b60df8d3c1f713ed9cb3aefade

        SHA512

        0544c9d2b8012dc4b061c5ed4040af1c037d9768e2f9245b8a2b85be3b19e7ff0f28275d2ab39721e86c60345f86bc56f06f5174e7aa82c74414de796137d107

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6423.exe

        Filesize

        312KB

        MD5

        8888e6434dbbc1ddec6fb7641d37a063

        SHA1

        758b3807a3e179206b5b155d99e9aa93c584d68f

        SHA256

        000018b604a0f1a6e62155b493f6c8ba607261ba1d5529d1a79097b050ac4eba

        SHA512

        4273dc5097899b9c9c461b8f096cba594b8fc55e88954ea55a9e3b9bf268042605ed2b53c12671bdf6d9be13ac6bcba1bb9d7c80f62d86477365f70749a9f9d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2614.exe

        Filesize

        495KB

        MD5

        b3b4f4f277b0508677a1d9446e87ce48

        SHA1

        c21e2522870f2729e4fd98f28384286ebce1db73

        SHA256

        d9bbd96c82a18c8644835d364e14259ca36b00fdb90402b46f1f32b9e4e77ccc

        SHA512

        6d82acaeb6a8b9e27ef92a00bfc8ce2925897c239f0cabe8968ecf24b73f1a8700a7b2962c42e86d674c532f9bfcbfeea26b7b577bdff42f4d633a6a853f2624

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1832-2155-0x00000000005E0000-0x0000000000610000-memory.dmp

        Filesize

        192KB

      • memory/1832-2156-0x0000000002780000-0x0000000002786000-memory.dmp

        Filesize

        24KB

      • memory/1832-2157-0x0000000005580000-0x0000000005B98000-memory.dmp

        Filesize

        6.1MB

      • memory/1832-2162-0x0000000005010000-0x000000000505C000-memory.dmp

        Filesize

        304KB

      • memory/1832-2160-0x0000000004FC0000-0x0000000004FFC000-memory.dmp

        Filesize

        240KB

      • memory/1832-2159-0x0000000004F60000-0x0000000004F72000-memory.dmp

        Filesize

        72KB

      • memory/1832-2158-0x0000000005070000-0x000000000517A000-memory.dmp

        Filesize

        1.0MB

      • memory/2300-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2300-31-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-22-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-27-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-49-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-47-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-45-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-43-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-41-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-39-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-37-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-35-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-33-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-19-0x0000000002590000-0x00000000025AA000-memory.dmp

        Filesize

        104KB

      • memory/2300-25-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-23-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-29-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/2300-50-0x0000000000960000-0x0000000000A60000-memory.dmp

        Filesize

        1024KB

      • memory/2300-21-0x00000000025F0000-0x0000000002608000-memory.dmp

        Filesize

        96KB

      • memory/2300-54-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/2300-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2300-15-0x0000000000960000-0x0000000000A60000-memory.dmp

        Filesize

        1024KB

      • memory/2300-17-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/2300-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2300-18-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/2300-20-0x0000000004F20000-0x00000000054C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4984-85-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-81-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-77-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-75-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-73-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-71-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-69-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-67-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-65-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-62-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-95-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-94-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-83-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-63-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-79-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-61-0x0000000005590000-0x00000000055F6000-memory.dmp

        Filesize

        408KB

      • memory/4984-60-0x0000000004EF0000-0x0000000004F56000-memory.dmp

        Filesize

        408KB

      • memory/4984-91-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-89-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-87-0x0000000005590000-0x00000000055EF000-memory.dmp

        Filesize

        380KB

      • memory/4984-2142-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/5412-2166-0x00000000002E0000-0x000000000030E000-memory.dmp

        Filesize

        184KB

      • memory/5412-2167-0x0000000002400000-0x0000000002406000-memory.dmp

        Filesize

        24KB