Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 17:24

General

  • Target

    e4a1aa26ba7d5eee618b283fcd4a102992d5c050908ec9a9cbd6841e74c8a6eb.exe

  • Size

    814KB

  • MD5

    7e606a3b3a472f360b952648c794e565

  • SHA1

    8e1b444d6f6c05dc60077a094f9d01ee8bc932d3

  • SHA256

    e4a1aa26ba7d5eee618b283fcd4a102992d5c050908ec9a9cbd6841e74c8a6eb

  • SHA512

    86992edc5a47e65937fa1d0417476a37ef3c0b46e533be81d8480e9e7d4b37eb85ad0c4c181d02855df058821949874dc1042fbb22d03cc1c8c75052253489ae

  • SSDEEP

    12288:mMr8y90RnFKSbiaPcpFjV2i4l5CJfkjWH8m7FJxu+ahL3+3QMetXiLOuxtt5wAm:mysFKSrcgCJcj9m73yLSQ7RbYn5wAm

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a1aa26ba7d5eee618b283fcd4a102992d5c050908ec9a9cbd6841e74c8a6eb.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a1aa26ba7d5eee618b283fcd4a102992d5c050908ec9a9cbd6841e74c8a6eb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657458.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657458.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4547.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 1084
          4⤵
          • Program crash
          PID:4308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5393.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5393.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 1368
          4⤵
          • Program crash
          PID:5268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940029.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940029.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2772
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3324 -ip 3324
    1⤵
      PID:1928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4972 -ip 4972
      1⤵
        PID:3624

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si940029.exe

        Filesize

        169KB

        MD5

        7a0e49dc79dfb9af234aac505427ca76

        SHA1

        022a1a283a95a5c29b6c222b5e0780830291bb58

        SHA256

        f51ed89225a014c4545fcd30fb3a31fd3449af8df96b1e5f1b684bd12a575b53

        SHA512

        794bcab75dd496628d964a39f5d5a50fdb4f314dfc190f35682e93d9bc6e2f593df127f9fbbbe814e9e5bcd827b34387bec35bd2a355615c4b7357f648f62a2e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657458.exe

        Filesize

        660KB

        MD5

        5491249c3dd72bed1dd6ad9650b2124a

        SHA1

        fa2dae88618af97f1f72ba4433d73627c9b6e04c

        SHA256

        0ae59943bf6ac908346df4a31193418a17b8d631f18c5631ea2f97f358cf06d1

        SHA512

        271a028f8c9930a00944e13458d25ce8c0a77c5153bde38545422ae170dfff1a013e6e5d0ee5dcff051789d05688d78ce933fae6f85e26bec4172251ed3a4b9d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4547.exe

        Filesize

        312KB

        MD5

        a8eccb5ddd6eaa3af6c050a916f70387

        SHA1

        7aa378d533367aa8b1240685398603e0e4e3804d

        SHA256

        e7cadc0c8910aec46dab7db6a3ff8ba9d80ea9cda71520fc1cf90948c5d687b3

        SHA512

        50abe76e292bbb8a5068a0ab346e4a077bd83663ea607a4a28ccc15581a0dc19154e06cca046e3186fb4f8d2a4e8c3864f093e2ad08c529b5b9268b3cf57ab93

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5393.exe

        Filesize

        495KB

        MD5

        c8f6014b21c212f5372163a5153aefcb

        SHA1

        16ae1a129078d8a4c32cbfb51991c845a551f8b8

        SHA256

        4fd2f4743bc5d5f0cb4d5d439dc257ac80d39e01663d65612c7387da959d27b8

        SHA512

        5b21c55a8cf02f0d40ac10af4e59877ad5f51114f6b0f3461ab9839aa763c60d522a684a531beb9c20e43702ade07f186a0ebab351a853d3aa4b0fdb034ad9f3

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2772-2168-0x0000000002760000-0x0000000002766000-memory.dmp

        Filesize

        24KB

      • memory/2772-2167-0x00000000005B0000-0x00000000005DE000-memory.dmp

        Filesize

        184KB

      • memory/3324-55-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/3324-23-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-20-0x0000000004EB0000-0x0000000005454000-memory.dmp

        Filesize

        5.6MB

      • memory/3324-21-0x0000000004DA0000-0x0000000004DB8000-memory.dmp

        Filesize

        96KB

      • memory/3324-43-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-49-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-47-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-45-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-41-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-39-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-37-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-35-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-33-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-31-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-29-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-27-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-25-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-15-0x0000000000820000-0x0000000000920000-memory.dmp

        Filesize

        1024KB

      • memory/3324-22-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/3324-50-0x0000000000820000-0x0000000000920000-memory.dmp

        Filesize

        1024KB

      • memory/3324-51-0x0000000002450000-0x000000000247D000-memory.dmp

        Filesize

        180KB

      • memory/3324-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3324-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3324-18-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/3324-16-0x0000000002450000-0x000000000247D000-memory.dmp

        Filesize

        180KB

      • memory/3324-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3324-19-0x0000000004CF0000-0x0000000004D0A000-memory.dmp

        Filesize

        104KB

      • memory/3512-2158-0x0000000005A90000-0x00000000060A8000-memory.dmp

        Filesize

        6.1MB

      • memory/3512-2157-0x0000000002DA0000-0x0000000002DA6000-memory.dmp

        Filesize

        24KB

      • memory/3512-2156-0x0000000000B50000-0x0000000000B80000-memory.dmp

        Filesize

        192KB

      • memory/3512-2159-0x00000000055A0000-0x00000000056AA000-memory.dmp

        Filesize

        1.0MB

      • memory/3512-2163-0x00000000056B0000-0x00000000056FC000-memory.dmp

        Filesize

        304KB

      • memory/3512-2161-0x0000000005530000-0x000000000556C000-memory.dmp

        Filesize

        240KB

      • memory/3512-2160-0x00000000054D0000-0x00000000054E2000-memory.dmp

        Filesize

        72KB

      • memory/4972-61-0x0000000002990000-0x00000000029F6000-memory.dmp

        Filesize

        408KB

      • memory/4972-90-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-88-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-84-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-82-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-80-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-78-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-76-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-72-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-68-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-92-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-94-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-96-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-70-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-74-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-64-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-62-0x0000000004EC0000-0x0000000004F26000-memory.dmp

        Filesize

        408KB

      • memory/4972-66-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-86-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-63-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

        Filesize

        380KB

      • memory/4972-2143-0x0000000005770000-0x00000000057A2000-memory.dmp

        Filesize

        200KB