Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 11:59

General

  • Target

    065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe

  • Size

    652KB

  • MD5

    3c3cd50a82be18ae3a544f960926170a

  • SHA1

    4d1415c4a8a79545b6b3c7d08a62c0c7174ee3b1

  • SHA256

    065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d

  • SHA512

    55b07e143bd3a84ca5b20f511fa30671812f4b5fc53ac0605e8e63e3fe92a0ce2f881146f4e1c3943c772bde09b3daa4376c91564a52020c1beb524920339d09

  • SSDEEP

    12288:gMr1y90Zob+2SE1ZvXDViMxoMTrZHsikrJoPKi+V9QmjeeSi68r:lyL62Z3b7hZPp5mj7+8r

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe
    "C:\Users\Admin\AppData\Local\Temp\065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV8729.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV8729.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku013031.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku013031.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:6924
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 1504
          4⤵
          • Program crash
          PID:7084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2040 -ip 2040
    1⤵
      PID:7048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exe

      Filesize

      169KB

      MD5

      b21eb49af3bd673bda14238fe5769ed0

      SHA1

      3386a16c6529e89d2840a747b40783aa5cc71fcb

      SHA256

      a0fd9564b4f3d6ded931da553fcaa22f862fb92344643faf43922f1bdf647b71

      SHA512

      6a012a759a89699279e66c1b0a06a8b5483ec54530e0138d08af47ca01389b670dfb166cf1edf1acb3481124de55740e1ae27691e4854f7fa9d66960db192c02

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV8729.exe

      Filesize

      498KB

      MD5

      b278cd150f85988be4145ccbec159721

      SHA1

      6516a6bcad511e294a92ccd960bf01fc524f3347

      SHA256

      6c1b7161700d7a7084052df1d3342c0c7ab0517d1df0c8978badc2afeb36633f

      SHA512

      cbeaa3e9e4e83eb3b99cb6d833a40f961c4369e56db486c589a8315b4f3dfc03cae3f5773b9e5ceec82e949bfd19ec1ca4c725bd7c2a5f6e301a338b1c360624

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exe

      Filesize

      12KB

      MD5

      be11b6d4ba2aa0ca2b1f189b857563ba

      SHA1

      f9f0ea28a14656e61fd5894b514981f8c0b165c5

      SHA256

      e9212147e70c27c2d168ac3cbd1992a997d4d8b78c749aa774d49f285759db8e

      SHA512

      f5d5149e4f643de3298c6f69da91b9808b5aa6189674c4766a53ca616a92086dbbc7389ca7b340cfd04f4973fd603b3358f5ff5512c277f615b9e3fcc13a397e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku013031.exe

      Filesize

      417KB

      MD5

      996c7217e3c7a83ebdcd6cf5f788bd9b

      SHA1

      f61998277e77b731a1c71d42ce76d81fbfcec269

      SHA256

      3cf752afbb99b194b59691bfda092ccc1d6efc86e6805b1cd4b7ea3e60a1901d

      SHA512

      2e763c3deaecc86f16c29442982e4676797b5006bb050c1c7ce928a906027d57c7bb5f28e8f527d31a5d2537dcf17324003e99aa6b2c8d36905c9254ac856198

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/764-15-0x0000000000410000-0x000000000041A000-memory.dmp

      Filesize

      40KB

    • memory/764-14-0x00007FFDBC963000-0x00007FFDBC965000-memory.dmp

      Filesize

      8KB

    • memory/764-16-0x00007FFDBC963000-0x00007FFDBC965000-memory.dmp

      Filesize

      8KB

    • memory/2040-64-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-52-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-24-0x00000000052F0000-0x0000000005356000-memory.dmp

      Filesize

      408KB

    • memory/2040-28-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-26-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-25-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-44-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-88-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-86-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-84-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-80-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-78-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-77-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-74-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-72-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-70-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-68-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-66-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-22-0x0000000004C70000-0x0000000004CD6000-memory.dmp

      Filesize

      408KB

    • memory/2040-62-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-58-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-56-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-54-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-23-0x0000000004CE0000-0x0000000005284000-memory.dmp

      Filesize

      5.6MB

    • memory/2040-50-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-46-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-42-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-40-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-38-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-36-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-34-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-32-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-30-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-82-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-60-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-48-0x00000000052F0000-0x000000000534F000-memory.dmp

      Filesize

      380KB

    • memory/2040-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/2804-2129-0x00000000002F0000-0x000000000031E000-memory.dmp

      Filesize

      184KB

    • memory/2804-2130-0x0000000000A70000-0x0000000000A76000-memory.dmp

      Filesize

      24KB

    • memory/6924-2118-0x0000000000650000-0x0000000000680000-memory.dmp

      Filesize

      192KB

    • memory/6924-2119-0x0000000002780000-0x0000000002786000-memory.dmp

      Filesize

      24KB

    • memory/6924-2120-0x0000000005620000-0x0000000005C38000-memory.dmp

      Filesize

      6.1MB

    • memory/6924-2121-0x0000000005110000-0x000000000521A000-memory.dmp

      Filesize

      1.0MB

    • memory/6924-2122-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

      Filesize

      72KB

    • memory/6924-2123-0x0000000005040000-0x000000000507C000-memory.dmp

      Filesize

      240KB

    • memory/6924-2124-0x0000000005080000-0x00000000050CC000-memory.dmp

      Filesize

      304KB