Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 19:12

General

  • Target

    349c8b2f1aa564b0c95f2749b54ce14d5239d25b375605d59f82bac1d84acfc2.exe

  • Size

    1.1MB

  • MD5

    39db4949514fca709b6ac15359cecd04

  • SHA1

    c6aababecbde72cac146dacac4af1df81649a0c8

  • SHA256

    349c8b2f1aa564b0c95f2749b54ce14d5239d25b375605d59f82bac1d84acfc2

  • SHA512

    7a6f41e02adc495bfc747a113cbee956951420d2110b5263a89c9731780b12804b8f19911dae4434bd13d0d8e71d2293bd762b4b7b618731bb2e83f6b844d201

  • SSDEEP

    24576:yyEF4+3t96tvhPOy4iTJVgiHXr6vNX+0IEEsK0KlsxjvXwu78:ZED3t96dhPOyTHreNX3rWlezAu7

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\349c8b2f1aa564b0c95f2749b54ce14d5239d25b375605d59f82bac1d84acfc2.exe
    "C:\Users\Admin\AppData\Local\Temp\349c8b2f1aa564b0c95f2749b54ce14d5239d25b375605d59f82bac1d84acfc2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758099.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758099.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un953068.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un953068.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr363912.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr363912.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3428
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1084
            5⤵
            • Program crash
            PID:3504
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu185526.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu185526.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3708
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2952
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 1468
            5⤵
            • Program crash
            PID:3108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk580105.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk580105.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3428 -ip 3428
    1⤵
      PID:1128
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3708 -ip 3708
      1⤵
        PID:8

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758099.exe

        Filesize

        852KB

        MD5

        1ec285c5f3e866fedea6948c8a237640

        SHA1

        5063e55412983e9b816e3951a09fb007120696f7

        SHA256

        b4f56bfd481b2fc9b036b2f5b8028b0a8f4d2ff1bda8f94e6aad922f6b163f1a

        SHA512

        306f4472aac8f3f8b871d5d85c08fb71dda62acaa0e5fb42d14e5eb99f9f4e6f473e84921aff7d4fc8b804546e9b4e85bb2a9d38090c55ab1bf9cecc8e7047b9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk580105.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un953068.exe

        Filesize

        698KB

        MD5

        734f5138dcd4324ee8f72326a518a6a1

        SHA1

        dacd2417892af9df66cd118152a6555d9187c30f

        SHA256

        9407580cbe72bb183df976454b84828f408125db0dfc69b9f884644b0a101650

        SHA512

        bf64a9bcffbefafe59fe7f9ded2065caff9f7b9eeb4799dae38367fe376c6ae809905ecc816eb82822d75983dc367848e502363eb0fa948f40c8b98818715579

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr363912.exe

        Filesize

        403KB

        MD5

        38b9de02ad9a6e60ac319dd6949a6478

        SHA1

        dbb88689e9062d8fcd5d63b05f62eb9af3c752c5

        SHA256

        e24fa8b8fe53f5af815bada8daed845f954a35b3213fcbe264580dd6162a22fd

        SHA512

        d500755763f74c276c6f753b7dbbbabee67bf258538937065d0cadbec29ff2407dfeb7b11ea85d06462f087124a188ad39b09ad81a31fdac3a869a9c6dcc46ba

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu185526.exe

        Filesize

        588KB

        MD5

        fe8cd3a231c0cedb1fc5e4d89b43b0e2

        SHA1

        7edb2e301b9f1ed3e1a9ebeb81222a7c3ac7de06

        SHA256

        5eb79f3582e51d5ca0c14fcbc35b86a2c87fa5895d3b17c7e60bef49183d7b13

        SHA512

        05fd1ec2f6a45e57ac94cbf549228cec2ee6b58deacad4b012b13039cce08e7ed0b2db2fe4beafa7b977c131d0c30e64abe94469409acfb547fe6defe3906a58

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/2952-2218-0x0000000001150000-0x0000000001156000-memory.dmp

        Filesize

        24KB

      • memory/2952-2219-0x0000000005850000-0x0000000005E68000-memory.dmp

        Filesize

        6.1MB

      • memory/2952-2220-0x0000000005340000-0x000000000544A000-memory.dmp

        Filesize

        1.0MB

      • memory/2952-2222-0x00000000052B0000-0x00000000052EC000-memory.dmp

        Filesize

        240KB

      • memory/2952-2223-0x0000000005450000-0x000000000549C000-memory.dmp

        Filesize

        304KB

      • memory/2952-2221-0x0000000005250000-0x0000000005262000-memory.dmp

        Filesize

        72KB

      • memory/2952-2217-0x00000000008D0000-0x00000000008FE000-memory.dmp

        Filesize

        184KB

      • memory/3428-42-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-30-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-44-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-48-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-40-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-38-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-36-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-34-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-32-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-46-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-28-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-26-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-25-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-53-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/3428-55-0x0000000000400000-0x000000000080A000-memory.dmp

        Filesize

        4.0MB

      • memory/3428-50-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-52-0x0000000002A50000-0x0000000002A62000-memory.dmp

        Filesize

        72KB

      • memory/3428-24-0x0000000002A50000-0x0000000002A68000-memory.dmp

        Filesize

        96KB

      • memory/3428-23-0x0000000004EB0000-0x0000000005454000-memory.dmp

        Filesize

        5.6MB

      • memory/3428-22-0x00000000029B0000-0x00000000029CA000-memory.dmp

        Filesize

        104KB

      • memory/3708-60-0x0000000004ED0000-0x0000000004F38000-memory.dmp

        Filesize

        416KB

      • memory/3708-89-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-87-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-85-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-83-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-81-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-79-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-75-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-73-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-71-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-69-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-67-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-91-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-93-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-95-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-77-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-61-0x0000000005520000-0x0000000005586000-memory.dmp

        Filesize

        408KB

      • memory/3708-65-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-63-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-62-0x0000000005520000-0x0000000005580000-memory.dmp

        Filesize

        384KB

      • memory/3708-2204-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/4932-2228-0x00000000006B0000-0x00000000006E0000-memory.dmp

        Filesize

        192KB

      • memory/4932-2229-0x0000000002820000-0x0000000002826000-memory.dmp

        Filesize

        24KB