Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 19:14

General

  • Target

    dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe

  • Size

    801KB

  • MD5

    1269e16a9c10d78a4991ff8409896beb

  • SHA1

    288a5045939d8710f0eb61c3b51534021921a4c6

  • SHA256

    dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c

  • SHA512

    69f400d067ef44a5d3bc14d6321ce69a3e6955fb82b9e2ddad48b471b1678ffdce5eedb75f025fa67808baf51a60a4feee41248782d9c0772a41596c7e9f2eb8

  • SSDEEP

    24576:Sy+PhrIM0K/Kes2ZIjBdKf2LX7vo7evS:5+5z/zOjB6ivo7

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe
    "C:\Users\Admin\AppData\Local\Temp\dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un488683.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un488683.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8343.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 1084
          4⤵
          • Program crash
          PID:444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7486.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7486.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1528
          4⤵
          • Program crash
          PID:2308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4896 -ip 4896
    1⤵
      PID:2580
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2608 -ip 2608
      1⤵
        PID:3172

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exe

        Filesize

        168KB

        MD5

        b639c03de77b1866a5a34c8649e8a67d

        SHA1

        3414ff2fcf92be731e99e21086781284ded70814

        SHA256

        081bf8d3cfddc090c959aa6bde3474050ee770c3428f01401c1a9628bf4e307e

        SHA512

        32e1d66d8f324c44c496537efe12d139bd91a17d1788cb741869c7e8e92b33cac695381795cc32d3e9d09c3cfefef78ac2bca6e5a52bbd2d4c099da4f31e3969

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un488683.exe

        Filesize

        648KB

        MD5

        61084affb98aed98e2f4bb9a16e1f092

        SHA1

        bec4984762a948a9536764d1f1ee541f07ce7668

        SHA256

        b7a85c511624fd221d2c8d4a7be2bc9bf1969cd99ea384378f62a5c51a609289

        SHA512

        68cdea5a3bc40e75094f9ea689f1b756a2054fbef078a7728d535a772ae7358c571a8d6ae584c4f86dedd28c6f555ed0ec049785e93641bf6b63d9607ad1b007

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8343.exe

        Filesize

        252KB

        MD5

        0e3642a3b2a7042ecb569aa58c999935

        SHA1

        473213f3eaf2609cc8b4b60419884ea7f5ba4438

        SHA256

        547cfb9cfe910340af897567f83ff3257476a7deb0f5369d505072ea30bdec5c

        SHA512

        743ec16a1b3c1be197e9a630a195a03ac0cfd5501c1bbb41844423ff1562c005cfc92623e27aa463967111da635f0a87c4b82632a31a9151af48bc253444d2f7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7486.exe

        Filesize

        435KB

        MD5

        08809534771fa34e28f6220f8dced211

        SHA1

        8c89399cbe2972c052b16b7e9c3a35859cfea83c

        SHA256

        6512ac8b9ade8be7a2da18c32488447302866b627493d074ec385d6670c94774

        SHA512

        39bd7260949382a986f709fd6fcf625ed1abb7f39321bf22d8b4783f80892f82aecaf4164dccdba430c4fe8d463d6100f188effbc5333ecbcf6cbc240a918ab6

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2608-90-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-76-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-88-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-82-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-80-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-62-0x00000000051B0000-0x0000000005216000-memory.dmp

        Filesize

        408KB

      • memory/2608-96-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-61-0x0000000004A30000-0x0000000004A96000-memory.dmp

        Filesize

        408KB

      • memory/2608-86-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-78-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-92-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-74-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-2143-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2608-63-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-64-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-68-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-84-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-66-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-70-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-94-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/2608-72-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/3016-2156-0x0000000000E20000-0x0000000000E50000-memory.dmp

        Filesize

        192KB

      • memory/3016-2157-0x0000000002F90000-0x0000000002F96000-memory.dmp

        Filesize

        24KB

      • memory/3016-2158-0x0000000005DF0000-0x0000000006408000-memory.dmp

        Filesize

        6.1MB

      • memory/3016-2159-0x00000000058E0000-0x00000000059EA000-memory.dmp

        Filesize

        1.0MB

      • memory/3016-2160-0x0000000005790000-0x00000000057A2000-memory.dmp

        Filesize

        72KB

      • memory/3016-2161-0x0000000005810000-0x000000000584C000-memory.dmp

        Filesize

        240KB

      • memory/3016-2162-0x0000000005850000-0x000000000589C000-memory.dmp

        Filesize

        304KB

      • memory/3260-2167-0x0000000000DB0000-0x0000000000DDE000-memory.dmp

        Filesize

        184KB

      • memory/3260-2168-0x0000000002EC0000-0x0000000002EC6000-memory.dmp

        Filesize

        24KB

      • memory/4896-27-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-50-0x00000000005D0000-0x00000000006D0000-memory.dmp

        Filesize

        1024KB

      • memory/4896-45-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-18-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/4896-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4896-55-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/4896-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4896-51-0x0000000000530000-0x000000000055D000-memory.dmp

        Filesize

        180KB

      • memory/4896-22-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-23-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4896-25-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-19-0x00000000023A0000-0x00000000023BA000-memory.dmp

        Filesize

        104KB

      • memory/4896-29-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-31-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-33-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-16-0x0000000000530000-0x000000000055D000-memory.dmp

        Filesize

        180KB

      • memory/4896-35-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-37-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-39-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-41-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-43-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-47-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-49-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4896-15-0x00000000005D0000-0x00000000006D0000-memory.dmp

        Filesize

        1024KB

      • memory/4896-21-0x0000000002620000-0x0000000002638000-memory.dmp

        Filesize

        96KB

      • memory/4896-20-0x0000000004AC0000-0x0000000005064000-memory.dmp

        Filesize

        5.6MB