Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 20:34

General

  • Target

    d1a85c152bc52430229277637630461a3f756910769ade36ea7eedaeacd5eb4d.exe

  • Size

    652KB

  • MD5

    a20989f61b6248e828897ca80060d29e

  • SHA1

    48e6d1dcf0c72bd2b3cf87986a9283b8e4d1dea2

  • SHA256

    d1a85c152bc52430229277637630461a3f756910769ade36ea7eedaeacd5eb4d

  • SHA512

    90759d4fb082541d0f8df3fcf233e9cdc68855abb3ed751a25a8ea5aa1e707fc0e5042cbcc94d5a22b6653abdb385f237056df183ea6903f73c9b5857e09cba4

  • SSDEEP

    12288:CMrby90Z9vqeOxcbuyrFRD9neppJgL+mK7+87QHmrZmlNl4cX:By+JqLmb7rFgJgL+mKRIm9li

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1a85c152bc52430229277637630461a3f756910769ade36ea7eedaeacd5eb4d.exe
    "C:\Users\Admin\AppData\Local\Temp\d1a85c152bc52430229277637630461a3f756910769ade36ea7eedaeacd5eb4d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixw8405.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixw8405.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr981161.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr981161.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku736751.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku736751.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1368
          4⤵
          • Program crash
          PID:2012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr726768.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr726768.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2120
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2796 -ip 2796
    1⤵
      PID:3656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr726768.exe

      Filesize

      168KB

      MD5

      ea76874adcb5670707ea6bd19bd9e18e

      SHA1

      eeb111cded8c0f0a5d74cccbb82201b8161dbe8d

      SHA256

      bfd5a71e0dac2c1212573819cf7848db8cfbcf33bab86c0f569bc2011da12104

      SHA512

      a8217973894bc0aa70ccb4756a9be3ea78940d92a37589db7259961bbdf0298acb1128b3884ef1b98d7a01722a36d1868308bd101e1d475ee5da9482a4291a55

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixw8405.exe

      Filesize

      496KB

      MD5

      f02f23ead81f9d4cc0d2bbe527db3ff8

      SHA1

      38aeb7b5c50501223fa62c6ce0bb387e2050ba5e

      SHA256

      b23a1c401813a9404a3342f30d313e62d75e8a907ccccd5abdb0f427a8dadb3f

      SHA512

      4a4c73c7b3fc46c5517e620aefc62aca27e5ccc8082855f4512364ff04938c02c95a13337b821f0bc29604c74931f159264979652eded7ccb19547ab1e69853d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr981161.exe

      Filesize

      11KB

      MD5

      e2276a909f3ae7acc4fe5e3e3125e552

      SHA1

      feda5598ec454c19a9ab82b80ff507167d76518f

      SHA256

      c50619efc48f622f667bee8f6427234f6ac092140b7b92e9354b9fb37854abd6

      SHA512

      b1368836f72b0f956e2d7e65ff495ca000410896423499a4678b49297a932a128b4fc26bb68ab11baabb2edc3cb7df47946d6976198a62ec347f69a87361061a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku736751.exe

      Filesize

      414KB

      MD5

      8d9d675baa0e43d1ad9e59beede61293

      SHA1

      a0514dd95d0e885b230ec8aedba26f158b7b3f4f

      SHA256

      7823a59708ca1eabc4a24b86b9175c319e6623d7240066056451b18b93d7a124

      SHA512

      20aae7a23412db6be1c44d875a1a11358d56260a0c36a1433d12419da08dca6d75efa20393bd48ac64db5d8d5053875da537d48e5d9eb6934708a7b4caa32a37

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1068-14-0x00007FFF76553000-0x00007FFF76555000-memory.dmp

      Filesize

      8KB

    • memory/1068-16-0x00007FFF76553000-0x00007FFF76555000-memory.dmp

      Filesize

      8KB

    • memory/1068-15-0x0000000000F30000-0x0000000000F3A000-memory.dmp

      Filesize

      40KB

    • memory/1560-2118-0x0000000000DF0000-0x0000000000E20000-memory.dmp

      Filesize

      192KB

    • memory/1560-2119-0x00000000055D0000-0x00000000055D6000-memory.dmp

      Filesize

      24KB

    • memory/1560-2120-0x0000000005DF0000-0x0000000006408000-memory.dmp

      Filesize

      6.1MB

    • memory/1560-2124-0x0000000005820000-0x000000000586C000-memory.dmp

      Filesize

      304KB

    • memory/1560-2123-0x00000000057D0000-0x000000000580C000-memory.dmp

      Filesize

      240KB

    • memory/1560-2122-0x0000000005660000-0x0000000005672000-memory.dmp

      Filesize

      72KB

    • memory/1560-2121-0x00000000058E0000-0x00000000059EA000-memory.dmp

      Filesize

      1.0MB

    • memory/2120-2130-0x0000000002F70000-0x0000000002F76000-memory.dmp

      Filesize

      24KB

    • memory/2120-2129-0x0000000000E60000-0x0000000000E8E000-memory.dmp

      Filesize

      184KB

    • memory/2796-64-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-42-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-80-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-78-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-76-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-72-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-70-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-68-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-66-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-84-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-62-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-60-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-56-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-54-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-52-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-51-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-48-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-46-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-44-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-82-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-38-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-36-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-32-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-30-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-28-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-74-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-86-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-88-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-40-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-34-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-24-0x00000000051B0000-0x0000000005216000-memory.dmp

      Filesize

      408KB

    • memory/2796-23-0x0000000004BB0000-0x0000000005154000-memory.dmp

      Filesize

      5.6MB

    • memory/2796-22-0x0000000004A30000-0x0000000004A96000-memory.dmp

      Filesize

      408KB

    • memory/2796-58-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-26-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-25-0x00000000051B0000-0x000000000520F000-memory.dmp

      Filesize

      380KB

    • memory/2796-2105-0x0000000005400000-0x0000000005432000-memory.dmp

      Filesize

      200KB