Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 03:57

General

  • Target

    1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe

  • Size

    926KB

  • MD5

    af2b0093e91d0db81808c2f50ac16739

  • SHA1

    d741b98e79078516266d90b86c3489dc2a4f6dde

  • SHA256

    1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73

  • SHA512

    80133c603b37309dbdc2128d58fa5c07628ef7cde74acf5a01f6d22feb74a3aac13e377b07442d9af0acb7e43a61e3a14049b9f6522e112ef5fa959a6ba0bb90

  • SSDEEP

    24576:UyluDEeJM6RlUbO4IPNojyTqjVD9rkyZXUH:j4DEePuOjl6n5uyp

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe
    "C:\Users\Admin\AppData\Local\Temp\1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDn7902.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDn7902.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidq3200.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidq3200.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it388581.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it388581.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3868
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr175317.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr175317.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:216
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1528
            5⤵
            • Program crash
            PID:4716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp495632.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp495632.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4984 -ip 4984
    1⤵
      PID:4316
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:5320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDn7902.exe

      Filesize

      661KB

      MD5

      899e9120c658e7e3c7c2c7a9a9a21aab

      SHA1

      5fd2c3ffb8ce0d3c27a026ae5223bba45e1ec3b9

      SHA256

      cbf258d649c1f92b2f1eec9f66661daa294d222056719fb6752c408e9fcfd25c

      SHA512

      63c4ee6c2e65caf77399bd1f7d720f0c781bbd63908641627694c27950bd32760ea31f6c41d952c9505db10f8c520377a3f646b67a3f29a50c072c31d71b8fae

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp495632.exe

      Filesize

      168KB

      MD5

      a92b838486aaf2643db0e49a680ce9fc

      SHA1

      37498bbf5c651868fec1b669e39ba07819c7e4f5

      SHA256

      6b068b2cc1baa6e84a71172d77dc6a4aaa100e3116a2fcbc9b58162571b86121

      SHA512

      1521fdc8a8d17a935596154b9bb362ed00c5e2f5bc391486e08909f3c9195c63fff7d77f3162c5168da51f3abef3001f3e8bb5f27feb04c090cdeb4659c496b2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidq3200.exe

      Filesize

      507KB

      MD5

      a061a4c274525f0a9142bd6de2b41234

      SHA1

      f5aa622460a3d13185d1913c44e4c0729c723c17

      SHA256

      aa2383f1c4b6fe9010ba121361edd280f8f3a1cac7f9f8c9c18a4d6d05ba59c2

      SHA512

      884523e8c1a5e4aa83437c27723f1bd2036b6299922a12e889365dbbe2db36a70e64ff82448a74dd27b74bdadaac39a00e0bd47c4b7ab9317da3531198efec52

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it388581.exe

      Filesize

      15KB

      MD5

      2447e1e6ad9b17347a382e011eb251b7

      SHA1

      5668f8a65e26553a30cb39e8e579f3009d843541

      SHA256

      a0772f1c60f3f4373094eafedfa7353d9c64394218f18dca23229fe500d6d760

      SHA512

      ab050f5ba1cd615117929f14d20ba40c5ca6be6ae6b516644c7742e40ce579b8045832c2ffa776e025fdc4be55eaefd8121e8ad4370897b79d246d9e93adfb4d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr175317.exe

      Filesize

      426KB

      MD5

      da3dd22ce8608de812d4c12b72bcddf8

      SHA1

      33c3e905e669d111b78445099a4d6e9ee66b1133

      SHA256

      0ae3d29bcf4c3b9fb4abdb411aa2df76d9745dc00429b2cedd946dedb68e86f9

      SHA512

      02c85e1ae6a0ea01400f8a0dd85690cf26cf1d632c79589bb4d6833cd9cf4aeb3e48612285ef99e998b254c0f772f53cb6824b39afde18284e95a3aaf1503c02

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/216-2126-0x0000000002650000-0x0000000002656000-memory.dmp

      Filesize

      24KB

    • memory/216-2127-0x0000000005410000-0x0000000005A28000-memory.dmp

      Filesize

      6.1MB

    • memory/216-2128-0x0000000004F00000-0x000000000500A000-memory.dmp

      Filesize

      1.0MB

    • memory/216-2129-0x0000000004E20000-0x0000000004E32000-memory.dmp

      Filesize

      72KB

    • memory/216-2130-0x0000000004E80000-0x0000000004EBC000-memory.dmp

      Filesize

      240KB

    • memory/216-2131-0x0000000005010000-0x000000000505C000-memory.dmp

      Filesize

      304KB

    • memory/216-2125-0x00000000004A0000-0x00000000004D0000-memory.dmp

      Filesize

      192KB

    • memory/232-2136-0x00000000004C0000-0x00000000004EE000-memory.dmp

      Filesize

      184KB

    • memory/232-2137-0x0000000000D70000-0x0000000000D76000-memory.dmp

      Filesize

      24KB

    • memory/3868-23-0x00007FFC7B213000-0x00007FFC7B215000-memory.dmp

      Filesize

      8KB

    • memory/3868-22-0x0000000000A10000-0x0000000000A1A000-memory.dmp

      Filesize

      40KB

    • memory/3868-21-0x00007FFC7B213000-0x00007FFC7B215000-memory.dmp

      Filesize

      8KB

    • memory/4984-73-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-45-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-87-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-85-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-83-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-81-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-77-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-75-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-92-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-71-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-69-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-65-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-63-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-61-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-59-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-57-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-53-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-51-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-49-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-89-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-43-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-41-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-39-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-37-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-79-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-67-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-93-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-96-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-47-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-35-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-31-0x0000000005330000-0x0000000005396000-memory.dmp

      Filesize

      408KB

    • memory/4984-30-0x0000000004D80000-0x0000000005324000-memory.dmp

      Filesize

      5.6MB

    • memory/4984-29-0x0000000004D10000-0x0000000004D76000-memory.dmp

      Filesize

      408KB

    • memory/4984-55-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-33-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-32-0x0000000005330000-0x000000000538F000-memory.dmp

      Filesize

      380KB

    • memory/4984-2112-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB