Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 08:44

General

  • Target

    3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe

  • Size

    652KB

  • MD5

    2015658e2c14f39fecdda32b59925c51

  • SHA1

    262795609ba6b226435e68500b7630a1d6bc3c29

  • SHA256

    3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a

  • SHA512

    c693a4309f4a1636aae50c097d15259372516ab22a9ed11ee441819408a1aa625e32959135bfb06b71ed4167f4fa9c0cea14da409507b3e41d0508600ef11728

  • SSDEEP

    12288:6Mrhy90xmFC3ubkSIga2KotTBNJiornNP7nNV7eK6vah:bymubGglZLPrCK6vah

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe
    "C:\Users\Admin\AppData\Local\Temp\3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimo2763.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimo2763.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku855033.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku855033.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 1216
          4⤵
          • Program crash
          PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4304
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1248 -ip 1248
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exe

      Filesize

      169KB

      MD5

      a7f03da2ea3edd4a3f5069b76c5aa18a

      SHA1

      5f7708954d7c76a4f51baf3974e25d46196b3b6a

      SHA256

      63b4e5b522a71813d21a5cf9abfd17f0e79683f37e64e1c09cb77487b1430718

      SHA512

      67b76643755d9ab4f9b08ef162d8d45734ce9f420f12271a6f72a40c1e849ff3fcd2fbb04b5447ad5033c75c07fa64821bc844329c988ace12befc977edefb84

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimo2763.exe

      Filesize

      498KB

      MD5

      b696f74e005ac5f982a5b1c36bb69f67

      SHA1

      2e056ee14b4944a0117995bad10ffcedfe1e2f09

      SHA256

      be9ab75290eb5e62fcbe9b2d654c671e57d06b19ac36ed6a0cf4f30bd35157a1

      SHA512

      3706c888a19c78a0abd7c22cd3f96f21e2e3d28a19aa720a41304c39ab1a764f222bbee9060c5ab8fb2cce50c9c041aa50fd38ddc42af4137c8dea2162b01b79

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exe

      Filesize

      12KB

      MD5

      380cf683b6ce839b6007431668e8842d

      SHA1

      666e989816462e16b6171e1ab8e6a746503a1501

      SHA256

      247bf21a7312bb2f96150bf5cbc296aad794dff6d647a0aabe0e3b9c7146880d

      SHA512

      1c2e68f7a193f15907d21bf4187c6be041134211d96ca067a80a4c8ec008c0cd6315459ca59f0eaa1062f3ebcc71eeb98e7bedf06d576c79b4f537ee3f45b2dc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku855033.exe

      Filesize

      417KB

      MD5

      6009ebec2b63136edfd5cbf1d87e0ca3

      SHA1

      987d6bb7b979e1d42506ba58813416b0319cac86

      SHA256

      1cecd3579ddbbec9a6b2cf202f78a6f650ec777af32bacdfd18f944baf36fbf5

      SHA512

      7fb2131e07dffacf0ff6b15e8f2c24948d36883840d9c1f4501a5913190a654d7320ba0ac67ced964b7f8bceee82db4c062909f3baafd82af9602a61d82c42ec

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/184-14-0x00007FF908C93000-0x00007FF908C95000-memory.dmp

      Filesize

      8KB

    • memory/184-15-0x0000000000390000-0x000000000039A000-memory.dmp

      Filesize

      40KB

    • memory/184-16-0x00007FF908C93000-0x00007FF908C95000-memory.dmp

      Filesize

      8KB

    • memory/1248-22-0x0000000004C00000-0x0000000004C66000-memory.dmp

      Filesize

      408KB

    • memory/1248-23-0x0000000004DF0000-0x0000000005394000-memory.dmp

      Filesize

      5.6MB

    • memory/1248-24-0x00000000053A0000-0x0000000005406000-memory.dmp

      Filesize

      408KB

    • memory/1248-44-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-66-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-88-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-86-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-82-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-80-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-78-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-76-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-70-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-68-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-64-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-62-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-60-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-58-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-56-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-54-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-52-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-51-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-48-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-47-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-42-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-40-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-38-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-36-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-34-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-32-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-30-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-84-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-74-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-72-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-28-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-26-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-25-0x00000000053A0000-0x00000000053FF000-memory.dmp

      Filesize

      380KB

    • memory/1248-2105-0x0000000004CB0000-0x0000000004CE2000-memory.dmp

      Filesize

      200KB

    • memory/3180-2118-0x0000000000010000-0x0000000000040000-memory.dmp

      Filesize

      192KB

    • memory/3180-2119-0x0000000000B50000-0x0000000000B56000-memory.dmp

      Filesize

      24KB

    • memory/3180-2120-0x0000000004FC0000-0x00000000055D8000-memory.dmp

      Filesize

      6.1MB

    • memory/3180-2121-0x0000000004AB0000-0x0000000004BBA000-memory.dmp

      Filesize

      1.0MB

    • memory/3180-2122-0x00000000049A0000-0x00000000049B2000-memory.dmp

      Filesize

      72KB

    • memory/3180-2123-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/3180-2124-0x0000000004A40000-0x0000000004A8C000-memory.dmp

      Filesize

      304KB

    • memory/4304-2129-0x0000000000660000-0x000000000068E000-memory.dmp

      Filesize

      184KB

    • memory/4304-2130-0x0000000000E00000-0x0000000000E06000-memory.dmp

      Filesize

      24KB