Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 23:43

General

  • Target

    06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe

  • Size

    650KB

  • MD5

    c8133683f1d0795b420f3b296c226626

  • SHA1

    1e3c9a53b7392870b1e56f21abdaae4748d61ed2

  • SHA256

    06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1

  • SHA512

    1a2dd2915db03019d5d9ef95147bcc641c8d9ca6ac02db07f1ab03a50939223b7a7f7e7ff55c66fa1b6e570fbb25864dc44da27846e687eeb9eb905cb8f0b04f

  • SSDEEP

    12288:KMrXy90aFKV/fmsmHmn9psgzMs+WG7Nv7xFmbZoldv8CxLAZGT:dypMdfVmmnHs0Ms+WGxDmNaUC+0

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe
    "C:\Users\Admin\AppData\Local\Temp\06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuS3991.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuS3991.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku325481.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku325481.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1516
          4⤵
          • Program crash
          PID:5356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1964 -ip 1964
    1⤵
      PID:4544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exe

      Filesize

      168KB

      MD5

      61d9793c61e8b9dfa084d8053bdd97b3

      SHA1

      5ed697f1eaaccd4142060f4b457ac73fc08b3b5f

      SHA256

      f519b2a6a2216b74f3ae7abbccc0fecb0a2908d9fd6542e80523a352c424efe4

      SHA512

      0a141e6d9f6f2ea02832e411041cf1187b42f97efd9f848fa0a8e4ae1048ae206d5a66104604ff5dc14997d8d5a521d07f60b33bdb9539b7433250910c1e042f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuS3991.exe

      Filesize

      496KB

      MD5

      88a7a7ce3fc62c3015f1fc0d103fa278

      SHA1

      d1b65b4b960a730d4b7e4288d3d4cc8ff9c3670b

      SHA256

      e6230fb24f6998967ec9cba0acbf5e7870729c4084eaa92a0f233f5c7f432925

      SHA512

      24e719ca806a7a1f1fd73e06532034ee07d3ceeba86e01e8b8ca9eee3442f8e798364006a76e450a51801c8580544702e59cdf826f17b486cc0f2f8b623d59a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exe

      Filesize

      11KB

      MD5

      320b859c451a65d39cb84013e726cc10

      SHA1

      9c5cc544a8a2bcb0d86724bcc9e977fd9b204323

      SHA256

      9f613630374a9f458c7a1217a79dbb5edb59bb6e23d9d3586f8e89ec575e7179

      SHA512

      88949a070bb21cf0c3de9dbdf2f9f197ea101d1d37210819c0ab438d3453e794d1626aa21d97108a75f6d7ed0944939f81b1a5d9338bd8eb79caf0fba5846538

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku325481.exe

      Filesize

      414KB

      MD5

      e1d3a5d4560eadf1b1166da92b81a744

      SHA1

      c76d7ed5f577db9dc3ea767eb7734e394bdd1e1b

      SHA256

      39f206cc6bd43bf3a0bbf27b3d840f306bf58b70097963faffa82598eed5fbe9

      SHA512

      8998e85bfb8fcc63056a502edf51755b800a2af15f3d4952a15774130e642845c96f2977e474c3e49ab3e527a272668f7a0ae6d4ba0b50d9efffe81cb55c0f66

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1964-58-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-42-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-24-0x0000000005210000-0x0000000005276000-memory.dmp

      Filesize

      408KB

    • memory/1964-25-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-26-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-36-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-48-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-88-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-86-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-84-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-82-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-46-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-78-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-76-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-74-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-72-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-70-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-68-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-66-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-62-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-50-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-22-0x0000000004BB0000-0x0000000004C16000-memory.dmp

      Filesize

      408KB

    • memory/1964-54-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-52-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-60-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-23-0x0000000004C20000-0x00000000051C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1964-80-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-40-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-38-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-64-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-56-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-44-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-34-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-32-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-30-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-28-0x0000000005210000-0x000000000526F000-memory.dmp

      Filesize

      380KB

    • memory/1964-2105-0x0000000005400000-0x0000000005432000-memory.dmp

      Filesize

      200KB

    • memory/2180-2118-0x0000000000BA0000-0x0000000000BD0000-memory.dmp

      Filesize

      192KB

    • memory/2180-2119-0x0000000001530000-0x0000000001536000-memory.dmp

      Filesize

      24KB

    • memory/2180-2120-0x0000000005B70000-0x0000000006188000-memory.dmp

      Filesize

      6.1MB

    • memory/2180-2121-0x0000000005660000-0x000000000576A000-memory.dmp

      Filesize

      1.0MB

    • memory/2180-2122-0x0000000005510000-0x0000000005522000-memory.dmp

      Filesize

      72KB

    • memory/2180-2123-0x0000000005590000-0x00000000055CC000-memory.dmp

      Filesize

      240KB

    • memory/2180-2124-0x00000000055D0000-0x000000000561C000-memory.dmp

      Filesize

      304KB

    • memory/3516-14-0x0000000000850000-0x000000000085A000-memory.dmp

      Filesize

      40KB

    • memory/3516-15-0x00007FFB41460000-0x00007FFB41729000-memory.dmp

      Filesize

      2.8MB

    • memory/3516-17-0x00007FFB41460000-0x00007FFB41729000-memory.dmp

      Filesize

      2.8MB

    • memory/5228-2130-0x0000000000C30000-0x0000000000C36000-memory.dmp

      Filesize

      24KB

    • memory/5228-2129-0x00000000002B0000-0x00000000002DE000-memory.dmp

      Filesize

      184KB