Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 21:26

General

  • Target

    9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe

  • Size

    801KB

  • MD5

    0679823de31a7fdc769c56e8f02d7793

  • SHA1

    ecd0cb792a8fe019a567a808ceb223b257ef5d9f

  • SHA256

    9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f

  • SHA512

    2be1d8620d595556057c524d1bd67ca85d84c33a0a830b9385dfc3e6989d2cd936f8995db6cdc524f97d7e2c3af5bb80bc23c6357103939add1224182d72ee45

  • SSDEEP

    24576:gytr4O1nZlwKX/gl9k1EEQz+PZ4jBDkf2rjl8ViIkT:ntb/wKvG9k1pQMajBKU2iX

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe
    "C:\Users\Admin\AppData\Local\Temp\9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930754.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930754.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1165.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1165.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 1008
          4⤵
          • Program crash
          PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1075.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1075.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 1468
          4⤵
          • Program crash
          PID:5124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4500 -ip 4500
    1⤵
      PID:3812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2972 -ip 2972
      1⤵
        PID:6096

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exe

        Filesize

        168KB

        MD5

        b60215e5c43eec48a05a4f520f302763

        SHA1

        4f5e06a10bd758c65387b04ac10e14faedd64655

        SHA256

        67d078b109521e4fe0522ef84857623d28c9a7f44404456bf3e4517cb32a245c

        SHA512

        aa3a40cc83be29cd1fc9fa104095f11367ea424540013bb1733c60910f029c03a5e92231e24abfb8e085a3449929d04fe25ee1f9bda75c0ba2da7311a4da9abb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930754.exe

        Filesize

        647KB

        MD5

        8d3aa19bb910dc48dcfbc4ad11f0b47d

        SHA1

        150798dd301697846271a7dbd94aa6a570401576

        SHA256

        bce48ec4440fb76c71b7d7277524e747301e87ab633554ecf39825e6957b40d5

        SHA512

        515815191716e1687f02849c7b50729e6926d8b6bbe57252f99a8fb1358e4b3017d7a4757a9d27a5b07457532c74d969491a9c3ee195bb5e8ce3c746d013b57e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1165.exe

        Filesize

        252KB

        MD5

        c71dcfe3a68f9ca0b7e2c91b44854ad5

        SHA1

        f0de632dbd1267cc729fd786e6ed84ced77a10ed

        SHA256

        9e4ecb52e0ab3e2b584c5448d942a05a63e04e9a96e1ec7f46697dc40abe2778

        SHA512

        7072a64fab46bc63142df4cb6053997c7353e8cfc478dc2c7cea55dfc71569fa3b76b1746cb59b22082cf1714790c14bf6ef5fd6649deadc3f15c8697c87452c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1075.exe

        Filesize

        435KB

        MD5

        e2f376f70b8a3f3192a537f98b8e74f4

        SHA1

        993c1c9e425b77859c49762c2b00f86e7b9dfd1d

        SHA256

        df208db06a2c7d536dd6ebd9658a5952538ab00818ce5d93571d570e45719907

        SHA512

        671ab03c748cf8c684855033494dc05630b9b78275317f4de30f01fb1b2de706be9503e1cf6690f0e417dd0e5c696589f3bc55295ca5192410f5c797eea6ed82

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2092-2167-0x0000000000970000-0x0000000000976000-memory.dmp

        Filesize

        24KB

      • memory/2092-2166-0x0000000000110000-0x000000000013E000-memory.dmp

        Filesize

        184KB

      • memory/2108-2160-0x0000000005670000-0x00000000056AC000-memory.dmp

        Filesize

        240KB

      • memory/2108-2158-0x0000000005740000-0x000000000584A000-memory.dmp

        Filesize

        1.0MB

      • memory/2108-2157-0x0000000005C50000-0x0000000006268000-memory.dmp

        Filesize

        6.1MB

      • memory/2108-2156-0x0000000002F30000-0x0000000002F36000-memory.dmp

        Filesize

        24KB

      • memory/2108-2155-0x0000000000C70000-0x0000000000CA0000-memory.dmp

        Filesize

        192KB

      • memory/2108-2159-0x00000000055D0000-0x00000000055E2000-memory.dmp

        Filesize

        72KB

      • memory/2108-2161-0x00000000056B0000-0x00000000056FC000-memory.dmp

        Filesize

        304KB

      • memory/2972-69-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-63-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-2142-0x0000000004CC0000-0x0000000004CF2000-memory.dmp

        Filesize

        200KB

      • memory/2972-65-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-67-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-71-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-73-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-75-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-79-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-81-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-83-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-85-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-87-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-89-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-91-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-60-0x00000000022E0000-0x0000000002346000-memory.dmp

        Filesize

        408KB

      • memory/2972-61-0x0000000004C30000-0x0000000004C96000-memory.dmp

        Filesize

        408KB

      • memory/2972-62-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-77-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-95-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/2972-93-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/4500-33-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-54-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/4500-49-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-35-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-50-0x0000000000710000-0x0000000000810000-memory.dmp

        Filesize

        1024KB

      • memory/4500-22-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-23-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-25-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-27-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-29-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-39-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-31-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-15-0x0000000000710000-0x0000000000810000-memory.dmp

        Filesize

        1024KB

      • memory/4500-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4500-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4500-41-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-43-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-45-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-47-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4500-21-0x00000000025E0000-0x00000000025F8000-memory.dmp

        Filesize

        96KB

      • memory/4500-20-0x0000000004C90000-0x0000000005234000-memory.dmp

        Filesize

        5.6MB

      • memory/4500-19-0x0000000002350000-0x000000000236A000-memory.dmp

        Filesize

        104KB

      • memory/4500-18-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/4500-17-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/4500-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4500-37-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB