Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 02:02

General

  • Target

    31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe

  • Size

    787KB

  • MD5

    943e547cca18bc0cb4900387fd019189

  • SHA1

    2c22d326ba40b052e900c7c20f451741ff8b80ba

  • SHA256

    31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544

  • SHA512

    e474a77095f4f9b5fa4f24d7adc00f565e7a91b4917fc3af6b0c759bdbba192e441da119de7e272146fb1bebc0085b9eda6eee2203b6319482c46e4ad5f9e2de

  • SSDEEP

    12288:3Mryy90uWnpgG4ykAdvjABkJWV7HPvJvY5dix3DN1TdNdP88XjjEH:xylWnMQJjABkJiPvy5wx3DblP88vk

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe
    "C:\Users\Admin\AppData\Local\Temp\31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447744.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447744.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0059.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 1084
          4⤵
          • Program crash
          PID:2216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8166.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:608
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 1384
          4⤵
          • Program crash
          PID:6056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2512 -ip 2512
    1⤵
      PID:3324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 608 -ip 608
      1⤵
        PID:5936

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exe

        Filesize

        168KB

        MD5

        66a14dd54550f9a445bddd71093f7925

        SHA1

        d7f6d91a71e562a8c60fc500e40eec6268d3ee34

        SHA256

        7b320ae4b0eb692ad359be576e9b3946f4e5b079624c74f9821a040649e09e32

        SHA512

        7efffd5673003534cbbec6acd7cc3f87d8ee471a653f67ee16728989ed60282361ec8ff1e9107d77fc276f2de4fc04a5ff3e4d4c9bead040e7093a7e5c5e3dda

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447744.exe

        Filesize

        633KB

        MD5

        b39c680aad47988319a53cadc45466d3

        SHA1

        c15d65c7c0443f59cd841f57f427065e1ba45632

        SHA256

        daaf609feb7bd61400e3b546f87d07dec235f7b94f4484de5163634b3e97f753

        SHA512

        32110524337601cbfbd8b59b0a8204618b126242805807efae0176779b786bdfe3ad95c0d353b5d75e8d665a29ec37ac43cc40bf2348933f24671940e83092f2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0059.exe

        Filesize

        230KB

        MD5

        2f716347e5d1ac9404375e44d2386f8c

        SHA1

        d8e682eec589b8fb776efcdc5194bba8df056b52

        SHA256

        e2210f7cda19c12bfe36aa2c1f0630b60f49f243683ebd5f78f662a7c331d23d

        SHA512

        d718fb15f56b2ab61d01977650e4578e8027f92fd05c57a540276315be4337e960a37d50006dd7156e60a5ba547b01ffad620ecd19ec2a1768522dd1cd611309

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8166.exe

        Filesize

        414KB

        MD5

        c82f0851c0d4ab73ee3eb2d73e9e82b6

        SHA1

        6dee173afb0a2e1da64e46c974e7e17e9978f139

        SHA256

        1f8ddc00204aa9dba4fbb9e3a67c36ad297325b95bd4339054fec79465e0d6c2

        SHA512

        f82c583f4e15dd819e45a607f3ec79ec96b5b170eef2ba2d26832f506ce8f2e15c7492de3b4599760333005282d9c29671a9c5cc4a083be54de2be2111dd05dc

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/608-65-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-60-0x00000000023D0000-0x0000000002436000-memory.dmp

        Filesize

        408KB

      • memory/608-67-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-81-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-2142-0x0000000005420000-0x0000000005452000-memory.dmp

        Filesize

        200KB

      • memory/608-62-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-63-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-83-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-69-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-71-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-73-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-75-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-77-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-95-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-85-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-87-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-89-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-91-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-93-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-79-0x0000000002600000-0x000000000265F000-memory.dmp

        Filesize

        380KB

      • memory/608-61-0x0000000002600000-0x0000000002666000-memory.dmp

        Filesize

        408KB

      • memory/2512-31-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-41-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2512-54-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2512-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/2512-20-0x0000000004CC0000-0x0000000005264000-memory.dmp

        Filesize

        5.6MB

      • memory/2512-15-0x0000000000610000-0x0000000000710000-memory.dmp

        Filesize

        1024KB

      • memory/2512-50-0x0000000000610000-0x0000000000710000-memory.dmp

        Filesize

        1024KB

      • memory/2512-23-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-25-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-27-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-29-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-19-0x00000000021E0000-0x00000000021FA000-memory.dmp

        Filesize

        104KB

      • memory/2512-33-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-35-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-37-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-39-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2512-43-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2512-45-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-47-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-49-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-22-0x0000000002210000-0x0000000002222000-memory.dmp

        Filesize

        72KB

      • memory/2512-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/2512-21-0x0000000002210000-0x0000000002228000-memory.dmp

        Filesize

        96KB

      • memory/2860-2165-0x0000000000720000-0x000000000074E000-memory.dmp

        Filesize

        184KB

      • memory/2860-2167-0x0000000002A60000-0x0000000002A66000-memory.dmp

        Filesize

        24KB

      • memory/5860-2156-0x0000000002180000-0x0000000002186000-memory.dmp

        Filesize

        24KB

      • memory/5860-2157-0x00000000050B0000-0x00000000056C8000-memory.dmp

        Filesize

        6.1MB

      • memory/5860-2159-0x00000000049F0000-0x0000000004A02000-memory.dmp

        Filesize

        72KB

      • memory/5860-2158-0x0000000004BA0000-0x0000000004CAA000-memory.dmp

        Filesize

        1.0MB

      • memory/5860-2155-0x0000000000090000-0x00000000000C0000-memory.dmp

        Filesize

        192KB

      • memory/5860-2160-0x0000000004A90000-0x0000000004ACC000-memory.dmp

        Filesize

        240KB

      • memory/5860-2166-0x0000000004AD0000-0x0000000004B1C000-memory.dmp

        Filesize

        304KB