Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 01:15

General

  • Target

    bd5009e466442a70861bb587a70a3cfb9648a4ff2787fc971529507d959dcedb.exe

  • Size

    789KB

  • MD5

    9b41a8e9543337991032b844ac714fc4

  • SHA1

    64407634e8cf0113f37374d014652e9e6d0e7f7e

  • SHA256

    bd5009e466442a70861bb587a70a3cfb9648a4ff2787fc971529507d959dcedb

  • SHA512

    46f85022c0b44734d4ab6e6fc860eb2268199e52c038b1ddeda20acbbe7f1bfc241e33de58f9d6d1af1d15d6783a1265f393aee88b3105f54e53cfadac8eeea3

  • SSDEEP

    12288:SMrYy90rV+s1/Yy5jLyHf2E8s7T1erHX6i0TTVA3jieV8VPsKDVOD3OuQzVSUqi:OydsOU/CuEDdsXb0fxPJkeKi

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd5009e466442a70861bb587a70a3cfb9648a4ff2787fc971529507d959dcedb.exe
    "C:\Users\Admin\AppData\Local\Temp\bd5009e466442a70861bb587a70a3cfb9648a4ff2787fc971529507d959dcedb.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652153.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652153.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9183.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 1028
          4⤵
          • Program crash
          PID:3532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1444
          4⤵
          • Program crash
          PID:5784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242432.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242432.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3956 -ip 3956
    1⤵
      PID:2928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 432 -ip 432
      1⤵
        PID:5600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242432.exe

        Filesize

        169KB

        MD5

        8b29110f05bae2a8f1e52f799c1e9633

        SHA1

        fbac6e01e86993634c098732225f8f864a26b84d

        SHA256

        e66955b97d2389510e71ceb4b1fe56058b99d4cb60bf57c7aa98c80437fdc861

        SHA512

        318b75c0d54170fabefee0161f07cfb8d90c5ca379d84973ad5c27e43d2b16bdc4bd8f6ef653709bb1bd682f9f09c0fde674692197b06cd4bedfa80ac3f5bfd4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un652153.exe

        Filesize

        635KB

        MD5

        9dcde499580a4708b1f6d02ead042e58

        SHA1

        c47161004cf11745615f4f7b48d4d0d86ddc52cb

        SHA256

        a25c4610102524ecea62a504c32b88516308b4bc2217a7b1beaf2faef2ffd361

        SHA512

        27009bb992ef1e02e865118ee497c1d76bada419ea80d81a0c54deead4c14ec7d74dccc9d6c05336424af583b896fbae0e7169deb75d22e3ec3a55941d5a0ce5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9183.exe

        Filesize

        233KB

        MD5

        50d25923100071f7ed30c40a13a5fecb

        SHA1

        6b1c923554480b3cd17a2c3f5a9651ea99514325

        SHA256

        a6f38dcf9e38b140619d552bea56eab4d8d67f6f5292edc7050a341432ad6ebb

        SHA512

        72f9a87af3e6400d52ac0facc57ad44af6f7b3de51e69b63a3a68092112d2552a00cd2cd88839d605f33c0948e1b853dd9be5be967d907c8a2650d0dd099fced

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe

        Filesize

        417KB

        MD5

        0de411ca16501c7b93dd33d04685b298

        SHA1

        5e0372b7dcd15e1bb9bf1ed30cdd3b87d931a7b4

        SHA256

        1a16eaff5a2f93c19d1386ab46c213bd4cd190f542ca6b9070c665e49ae8980d

        SHA512

        db2ec536844a4df5fd79171aabe5dbd3812bf235a526ba4d48f745134a950a0c9c1cefaf62e43953988bb361cfe2921bacf0c00e66715788ef78a804a018f959

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/432-68-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-61-0x00000000049B0000-0x0000000004A16000-memory.dmp

        Filesize

        408KB

      • memory/432-2143-0x0000000005410000-0x0000000005442000-memory.dmp

        Filesize

        200KB

      • memory/432-63-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-64-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-66-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-96-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-90-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-70-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-72-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-74-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-80-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-83-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-84-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-86-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-88-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-92-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-76-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-78-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-94-0x0000000005220000-0x000000000527F000-memory.dmp

        Filesize

        380KB

      • memory/432-62-0x0000000005220000-0x0000000005286000-memory.dmp

        Filesize

        408KB

      • memory/3956-27-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-39-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/3956-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3956-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3956-51-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/3956-22-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-23-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-45-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-50-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/3956-25-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-19-0x0000000002220000-0x000000000223A000-memory.dmp

        Filesize

        104KB

      • memory/3956-29-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-31-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-33-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-35-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-37-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/3956-41-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3956-43-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-47-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-49-0x0000000002300000-0x0000000002312000-memory.dmp

        Filesize

        72KB

      • memory/3956-21-0x0000000002300000-0x0000000002318000-memory.dmp

        Filesize

        96KB

      • memory/3956-20-0x0000000004EF0000-0x0000000005494000-memory.dmp

        Filesize

        5.6MB

      • memory/3956-16-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/3956-15-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/5488-2157-0x0000000002BF0000-0x0000000002BF6000-memory.dmp

        Filesize

        24KB

      • memory/5488-2158-0x0000000005A70000-0x0000000006088000-memory.dmp

        Filesize

        6.1MB

      • memory/5488-2159-0x0000000005560000-0x000000000566A000-memory.dmp

        Filesize

        1.0MB

      • memory/5488-2160-0x0000000005310000-0x0000000005322000-memory.dmp

        Filesize

        72KB

      • memory/5488-2161-0x0000000005490000-0x00000000054CC000-memory.dmp

        Filesize

        240KB

      • memory/5488-2156-0x0000000000AA0000-0x0000000000AD0000-memory.dmp

        Filesize

        192KB

      • memory/5488-2165-0x00000000054D0000-0x000000000551C000-memory.dmp

        Filesize

        304KB

      • memory/5992-2167-0x0000000000350000-0x000000000037E000-memory.dmp

        Filesize

        184KB

      • memory/5992-2168-0x0000000004B30000-0x0000000004B36000-memory.dmp

        Filesize

        24KB