Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 09:13

General

  • Target

    70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe

  • Size

    794KB

  • MD5

    af6d898e7849264a90ae214ae77d5ca8

  • SHA1

    3a68f0bd0d6cf63a4c7c9cd66fc5213397a6c69b

  • SHA256

    70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068

  • SHA512

    620ad1c1ef2a0d867dfe728b021dcbe424b047242e01973adc1c6189ae1598390a7effd05dd0db5d6bf0f891b5a15dc606905cd926893e1e76e9ad06fbb67359

  • SSDEEP

    12288:cMrOy90pwtX6jm5ZkQ6oxgT6oQaigqPon9d0Curwd7wTyReBwQo52suU6M:CyowPQhSgTvXWwnLKwd76yRQwQi2M

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe
    "C:\Users\Admin\AppData\Local\Temp\70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974058.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974058.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2235.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:60
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 1064
          4⤵
          • Program crash
          PID:3180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7580.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7580.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 1384
          4⤵
          • Program crash
          PID:5216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 60 -ip 60
    1⤵
      PID:2840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2444 -ip 2444
      1⤵
        PID:5144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exe

        Filesize

        168KB

        MD5

        2e778162d90b5e445cf1778aea2962f5

        SHA1

        871c6a8ecff02687f78b039ac554b7633f1f2b9f

        SHA256

        202fcc00a6f0b3c2254cdac93ba7cfd4c79149a371a7c91564c5664bc6653ec3

        SHA512

        8132581718c75291bbc23079440ea165af7c11f0a92a60368a98232a912ccbd60d3a07dc29fe112cefb74146bb4da562a352b23806fc2fec584193ad2cf4ec92

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974058.exe

        Filesize

        641KB

        MD5

        758ae258207a9f611ced4fdb6a324ea6

        SHA1

        a9e262bb2d92ca540be672e6e2ccf62300b3c5bf

        SHA256

        bc67994560b1e06479dc37cad26263af940f871425954867b0c72c335d39ef16

        SHA512

        f9a931461f84339f86b985af550da65408017ebde45505cfde7198ede733b004a5ab0fad97de24dbc1b4e27ada9d552bcb2163c89cc577801b413fa3f7791d90

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2235.exe

        Filesize

        241KB

        MD5

        6941c1b859f7aa4e1a316a698598a864

        SHA1

        eb6fb359ae5b2e2ed6a1b5ac638cbb4afac220c2

        SHA256

        5d73d7856b63b3538076af523725e311ffc11d03ec4574902f3fed9168b1ae95

        SHA512

        c077857d4d13eaf08c216e3f0243b2b77723725cf5e7a95909b79ce477f44aec7eedd7786d548574839e27b9995b036b2e74d2a8b51327d2f17990a08cece4e8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7580.exe

        Filesize

        424KB

        MD5

        4229882a925b920eaabe010a5a7c0729

        SHA1

        5bbddc31211d591d81ece2ecf46d49a92e9be88a

        SHA256

        260f352f39000f3b5ca255d88c4f0d61cad4955ef4ffd81b5db7b4f5f5226638

        SHA512

        12a8928f64827ae1d134c1c7c5f73fac9bbaf07c4233838bec5be94005198a73b2a6c723002f0ef6d52ecae63f9a02a3b2dcf29a9079cd2d5a297343c6c2d066

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/60-42-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-38-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-18-0x0000000002690000-0x00000000026AA000-memory.dmp

        Filesize

        104KB

      • memory/60-19-0x0000000004DA0000-0x0000000005344000-memory.dmp

        Filesize

        5.6MB

      • memory/60-20-0x0000000002720000-0x0000000002738000-memory.dmp

        Filesize

        96KB

      • memory/60-21-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-48-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-46-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-44-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-16-0x00007FFEE78F0000-0x00007FFEE7AE5000-memory.dmp

        Filesize

        2.0MB

      • memory/60-40-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-17-0x00007FFEE78F0000-0x00007FFEE7AE5000-memory.dmp

        Filesize

        2.0MB

      • memory/60-36-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-34-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-32-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-30-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-28-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-26-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-24-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-22-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/60-49-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/60-51-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/60-15-0x00007FFEE78F0000-0x00007FFEE7AE5000-memory.dmp

        Filesize

        2.0MB

      • memory/1092-2152-0x0000000005580000-0x0000000005586000-memory.dmp

        Filesize

        24KB

      • memory/1092-2153-0x0000000005C50000-0x0000000006268000-memory.dmp

        Filesize

        6.1MB

      • memory/1092-2151-0x0000000000C60000-0x0000000000C90000-memory.dmp

        Filesize

        192KB

      • memory/1092-2158-0x00000000056B0000-0x00000000056FC000-memory.dmp

        Filesize

        304KB

      • memory/1092-2156-0x0000000005670000-0x00000000056AC000-memory.dmp

        Filesize

        240KB

      • memory/1092-2155-0x00000000055D0000-0x00000000055E2000-memory.dmp

        Filesize

        72KB

      • memory/1092-2154-0x0000000005740000-0x000000000584A000-memory.dmp

        Filesize

        1.0MB

      • memory/2444-85-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-75-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-83-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-81-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-80-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-77-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-73-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-69-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-67-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-65-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-91-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-87-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-89-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-71-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-63-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-57-0x00000000051D0000-0x0000000005236000-memory.dmp

        Filesize

        408KB

      • memory/2444-56-0x0000000004B20000-0x0000000004B86000-memory.dmp

        Filesize

        408KB

      • memory/2444-61-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-59-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-58-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/2444-2138-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/5308-2162-0x0000000000D40000-0x0000000000D6E000-memory.dmp

        Filesize

        184KB

      • memory/5308-2163-0x0000000002E10000-0x0000000002E16000-memory.dmp

        Filesize

        24KB