Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 17:40

General

  • Target

    2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591.exe

  • Size

    1.1MB

  • MD5

    22eb4ca20e10841e75e4d33fa36f47f2

  • SHA1

    98571031ea23d4b9cf2a231fb06184e12adb8fde

  • SHA256

    2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591

  • SHA512

    c237a869e62ec076d740f06b18ad0310520a24d653c35b1c3018a0afd0195f1de034fde981647995be0f200aed8730d4449243aceb4cc7afc0ec6fea48c12783

  • SSDEEP

    24576:syw+j3FfqYAcBwx3s/d4XEh0/NOyKW0mX2T:bw+DdTAcBHdyv1Z04

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591.exe
    "C:\Users\Admin\AppData\Local\Temp\2cf5bdb2dd3a108e81c30043426ea8162f814a06ef86122f75034197a1b3e591.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511754.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511754.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un356166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un356166.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr670830.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr670830.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4136
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 1084
            5⤵
            • Program crash
            PID:2168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu399038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu399038.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2164
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3420
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1212
            5⤵
            • Program crash
            PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk130425.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk130425.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4136 -ip 4136
    1⤵
      PID:4900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2164 -ip 2164
      1⤵
        PID:4200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511754.exe

        Filesize

        809KB

        MD5

        231c0ad2ebe4e2af0c38c5f14ee096d5

        SHA1

        f6532acdb2a1aa055dd6c0c95ba31ad37089f259

        SHA256

        f3ba2fb292fba7dc10dbc299afda1ca1709d0ebbc44088845c9351e5b28c9497

        SHA512

        9deeb472d204eba2b3ee3b85ffa0e2e1a0fc02e069c35c328176f3b01dd6a14a9adaf216de892f17540d016388f91596e429524c4f1f8b7de8de7ce822ef16a2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk130425.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un356166.exe

        Filesize

        656KB

        MD5

        dfb9172449c70500d96e69bd7e800745

        SHA1

        709d6e034a1539db80420de0ea7264265fc4fef0

        SHA256

        cbd9b530a22bc94c006da686bafb23efc04b66232ed9b0fa86ed52e7340e65c6

        SHA512

        80e848e07f35b01f27fb24ad3365b64c7e29f25f3a797ab5299c1a015acb45880092e504aafcb431592d67c44f8384991f778b1abc5225b42f0da93aae1b3612

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr670830.exe

        Filesize

        254KB

        MD5

        63e74d5a46a45fa8ab39202d9ec0a9b6

        SHA1

        0a9824d0b7189aaa6059a9ddda7d797654868ff7

        SHA256

        bfaec3c0d3dbf355b7f6acb061ceba33e7ac2a5c15490baa2fb927577fe95a6f

        SHA512

        d91bb2166a80fdf44310607d45e72b22f4c8e08c6978a2dc37a9516e11597510ef6bd3aa2b98a545d16f0c97e40bef57635cfc54099b67737217c9faac4340c6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu399038.exe

        Filesize

        438KB

        MD5

        2c1dcb6c01e70d5e247db780f39f286d

        SHA1

        2ae999abbdd53bfb60dc479eed3912e9da267410

        SHA256

        72eaf02be145146ed56b0510e2276318585e1409d418e95be65454a9971fc222

        SHA512

        b02571cb0e4821ab6790b971de2b8a8e94edc331c87773dc3690107da6f1c9b7322cf16a851b3364af3e305b62340cc1243c892e06be5b4ea3ce0a0b0fbd3e7e

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/2164-78-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-98-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-90-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-68-0x00000000051E0000-0x0000000005246000-memory.dmp

        Filesize

        408KB

      • memory/2164-67-0x0000000004BC0000-0x0000000004C28000-memory.dmp

        Filesize

        416KB

      • memory/2164-96-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-100-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-94-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-92-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-88-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-2211-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2164-69-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-70-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-72-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-74-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-76-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-80-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-82-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-84-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-102-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/2164-86-0x00000000051E0000-0x0000000005240000-memory.dmp

        Filesize

        384KB

      • memory/3420-2224-0x0000000000E40000-0x0000000000E6E000-memory.dmp

        Filesize

        184KB

      • memory/3420-2225-0x00000000031D0000-0x00000000031D6000-memory.dmp

        Filesize

        24KB

      • memory/3420-2226-0x0000000005E50000-0x0000000006468000-memory.dmp

        Filesize

        6.1MB

      • memory/3420-2227-0x0000000005940000-0x0000000005A4A000-memory.dmp

        Filesize

        1.0MB

      • memory/3420-2228-0x00000000057B0000-0x00000000057C2000-memory.dmp

        Filesize

        72KB

      • memory/3420-2229-0x0000000005830000-0x000000000586C000-memory.dmp

        Filesize

        240KB

      • memory/3420-2230-0x0000000005870000-0x00000000058BC000-memory.dmp

        Filesize

        304KB

      • memory/4136-33-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-39-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-57-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/4136-25-0x0000000002340000-0x000000000235A000-memory.dmp

        Filesize

        104KB

      • memory/4136-62-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4136-61-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4136-59-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4136-58-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4136-56-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/4136-28-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-32-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-24-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4136-26-0x0000000004B50000-0x00000000050F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4136-29-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-37-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-51-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-41-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-43-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-23-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/4136-45-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-47-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-49-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-53-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-55-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-35-0x00000000024F0000-0x0000000002502000-memory.dmp

        Filesize

        72KB

      • memory/4136-27-0x00000000024F0000-0x0000000002508000-memory.dmp

        Filesize

        96KB

      • memory/4136-22-0x00000000004E0000-0x00000000005E0000-memory.dmp

        Filesize

        1024KB

      • memory/5176-2235-0x0000000000270000-0x00000000002A0000-memory.dmp

        Filesize

        192KB

      • memory/5176-2236-0x0000000000B30000-0x0000000000B36000-memory.dmp

        Filesize

        24KB