Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 00:31

General

  • Target

    a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe

  • Size

    656KB

  • MD5

    b3cebaffc1f73ffdda1078e0efa9217a

  • SHA1

    9b278245d5c88fa267da3d72b6175cbeede07daa

  • SHA256

    a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4

  • SHA512

    cb801a5f47836e34ea9997d955cbbdc371bab5be1b1e10a53bc5a981344d8752dfadae0f9b7dabe87838b632d518dc765e3fb904a73d9e1e898946b6d36cbd83

  • SSDEEP

    12288:NMrqy90RdS6EYdyIvz/x0wGSn48Zt44F6PZ+iqR3eO/NPbSyA9d:jyTpYVTx0wDn4A/F6PZ4RDPbSyId

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe
    "C:\Users\Admin\AppData\Local\Temp\a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWz5217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWz5217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku380506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku380506.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 1368
          4⤵
          • Program crash
          PID:3440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2380 -ip 2380
    1⤵
      PID:3576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exe

      Filesize

      168KB

      MD5

      7d9a519bbb142afb1ddeaca85054c069

      SHA1

      865690d03021179ab95feccf1955064ed1e2fa2e

      SHA256

      d109f7caa91c79426baca9d32e6f14db5b429c70a10fa8e5709db0706512b157

      SHA512

      663cda2da185ac62eeb04d9004f46949d32229ff8daaced0740a53303d0139bd8a789fa0b8e74d3fe697666a558d0785ac7554cbf6c982422358ee5f2167950c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWz5217.exe

      Filesize

      502KB

      MD5

      d19841258e3aa334f996e5d4d5c6b854

      SHA1

      81d1dd24bf375dd7ce2457eee497699f5572b1e4

      SHA256

      d28cbaa57df819ed7db39dbf5a21ef69d7301749199954fc55bbd1a62e6bc848

      SHA512

      0581261180eb384b4ed148a872d6bcadbf5df1d549640457ed0c344a6741afec82ca2d5d23372d98a0fa72bbdbe52da8d61e4183529016d67a51748825568d96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exe

      Filesize

      11KB

      MD5

      44cec223ac4401073f6ed3b5215b71c1

      SHA1

      66178e73446d4132cbfae037418f7f046c901e31

      SHA256

      91ce5075b4ac3b6eacf73c42012161ab10b240c03e624f2433e7aa6f4dc5d55e

      SHA512

      cd0368f1f1398f260e80922a4f163fa6dda75beb2317753e896bcabdde46d33e4467d54918f15bc484ae488d034a1efb934b31ae1988b857de406bbbc043aefb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku380506.exe

      Filesize

      424KB

      MD5

      826dbd9678905b3773f5609a0c51a240

      SHA1

      185a02664839ff4f70b0d49500c2c944ef008e7a

      SHA256

      e92768496434fd38c23e0b3c581499ea8bca541e77f45179a04850abdc7f9d1b

      SHA512

      fe3f2296517c00b05b77f573028f3c38a33e66b3debeb9d33ebaec795c67a271ca467f0c205be4238e6959ca6e301b0b1163ea19200267d5e0c0d0e217312994

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/2380-53-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-33-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-23-0x0000000004C00000-0x0000000004C66000-memory.dmp

      Filesize

      408KB

    • memory/2380-40-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-45-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-61-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-87-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-85-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-83-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-81-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-79-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-77-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-75-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-73-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-49-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-69-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-67-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-65-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-64-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-57-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-56-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-21-0x0000000002240000-0x00000000022A6000-memory.dmp

      Filesize

      408KB

    • memory/2380-71-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-47-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-24-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-41-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-37-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-35-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-31-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-27-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-60-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-25-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-43-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-51-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-22-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/2380-29-0x0000000004C00000-0x0000000004C5F000-memory.dmp

      Filesize

      380KB

    • memory/2380-2104-0x0000000005400000-0x0000000005432000-memory.dmp

      Filesize

      200KB

    • memory/3860-2129-0x0000000000020000-0x000000000004E000-memory.dmp

      Filesize

      184KB

    • memory/3860-2130-0x0000000006CD0000-0x0000000006CD6000-memory.dmp

      Filesize

      24KB

    • memory/4780-14-0x00007FFBBC973000-0x00007FFBBC975000-memory.dmp

      Filesize

      8KB

    • memory/4780-15-0x0000000000410000-0x000000000041A000-memory.dmp

      Filesize

      40KB

    • memory/4896-2116-0x0000000000F70000-0x0000000000FA0000-memory.dmp

      Filesize

      192KB

    • memory/4896-2118-0x0000000003020000-0x0000000003026000-memory.dmp

      Filesize

      24KB

    • memory/4896-2120-0x0000000005F60000-0x0000000006578000-memory.dmp

      Filesize

      6.1MB

    • memory/4896-2121-0x0000000005A50000-0x0000000005B5A000-memory.dmp

      Filesize

      1.0MB

    • memory/4896-2122-0x00000000057E0000-0x00000000057F2000-memory.dmp

      Filesize

      72KB

    • memory/4896-2123-0x0000000005980000-0x00000000059BC000-memory.dmp

      Filesize

      240KB

    • memory/4896-2124-0x00000000059C0000-0x0000000005A0C000-memory.dmp

      Filesize

      304KB