Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 06:15

General

  • Target

    08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe

  • Size

    789KB

  • MD5

    064d81f7b1c80e9ed0fbbc066e291163

  • SHA1

    f6eac869b07a41c8db1a5157d92683e39e258245

  • SHA256

    08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d

  • SHA512

    d0e3867899d42b26a27beecef4b2b536fe3e4297897ca3615245363cc340efc70320f810564a5c29085b35d5fd40f1c31441393355913984a999ae78f6727ff1

  • SSDEEP

    12288:PMriy90etOaqLgxr9SLF7lnDpMy5a4/7ffDTNATzieRd6Ps3TV2Z79Wc1l:tyJ7qLzRlDpz/7nPnP8E79W4

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe
    "C:\Users\Admin\AppData\Local\Temp\08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229110.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1038.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1038.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 1016
          4⤵
          • Program crash
          PID:4836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6113.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6113.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 1520
          4⤵
          • Program crash
          PID:1416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2380
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1240 -ip 1240
    1⤵
      PID:4796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2768 -ip 2768
      1⤵
        PID:1576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exe

        Filesize

        169KB

        MD5

        f2a75c90fdc16db69f48d1c0cff1757a

        SHA1

        74ef5d3530570b12feb28f77f18539595a798a8e

        SHA256

        74a0f0180ed51ee27b0c105a6e7275db04f53414fa7154e790f97eb1a213f119

        SHA512

        a476dcb5c0f325ad85a0bf84d47a7da48a4718e5ed9da5fbe1c7afa58f6b71d9719fca3073bb5ec5937145475585c7e785d975d2fd31986765a9a5cc74149577

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229110.exe

        Filesize

        635KB

        MD5

        fff3b10c964ec9bdbad804e46844b6da

        SHA1

        5baf4ea3acf11920c531f9d279916015cda142aa

        SHA256

        c65e2f7eebd0ee36582bf24fde0c9e39e596884b1cc8f5541d7d7f0f4f9d8a9a

        SHA512

        92125c92d737299e2e041ceeab8a1370a4595d6f0ed70cc7d77a2ef777a6da03edacce72cb80392c72a12be14b14b81c571313707118f72facc2384ff3cae855

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1038.exe

        Filesize

        233KB

        MD5

        2db72a880c24080973c3c38db2b86030

        SHA1

        cc0625f9132a6625571774bdaaa19868eb41095c

        SHA256

        34ec0c396a0eb6af157be8be480503c2872c48b5c2e563b6402da44968e3a867

        SHA512

        86a1c59ee09779a4afc1ad21773610d3e69de1671e82bbd66d081af33f7f8a99816d5ac7db9aae1e1549f933f6c61e670fe826ba0211886e1f40fe1029999cd9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6113.exe

        Filesize

        417KB

        MD5

        90c4666c8ae116850eca55c35f36cbab

        SHA1

        6a3ebf2159d01b577aeefee8feab3c4816daa928

        SHA256

        2d99461a6b2842daea1c8b334e7563b6b9956118607257829caa8e5976a77be8

        SHA512

        267ce9a0bf4bf67b356ed1bf7ba5bf00ef794035128d8d35ac2e7431560ec74cd6b3e8213da8c392d6f27a3f7a547a7946ee66c74330d3c46c142dd39ec09ae6

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1240-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1240-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1240-15-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/1240-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1240-19-0x0000000002380000-0x000000000239A000-memory.dmp

        Filesize

        104KB

      • memory/1240-20-0x0000000004D90000-0x0000000005334000-memory.dmp

        Filesize

        5.6MB

      • memory/1240-21-0x0000000002830000-0x0000000002848000-memory.dmp

        Filesize

        96KB

      • memory/1240-47-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-45-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-43-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-41-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-39-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-49-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-37-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-35-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-33-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-31-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-29-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-27-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-25-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-23-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-22-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1240-50-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/1240-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1240-54-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1240-17-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2380-2166-0x0000000000150000-0x000000000017E000-memory.dmp

        Filesize

        184KB

      • memory/2380-2167-0x0000000002420000-0x0000000002426000-memory.dmp

        Filesize

        24KB

      • memory/2768-77-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-71-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-75-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-73-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-95-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-93-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-60-0x0000000004BE0000-0x0000000004C46000-memory.dmp

        Filesize

        408KB

      • memory/2768-87-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-85-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-83-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-81-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-80-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-91-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-61-0x0000000005200000-0x0000000005266000-memory.dmp

        Filesize

        408KB

      • memory/2768-69-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-68-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-65-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-89-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-63-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-62-0x0000000005200000-0x000000000525F000-memory.dmp

        Filesize

        380KB

      • memory/2768-2142-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/5060-2155-0x0000000000200000-0x0000000000230000-memory.dmp

        Filesize

        192KB

      • memory/5060-2156-0x0000000002350000-0x0000000002356000-memory.dmp

        Filesize

        24KB

      • memory/5060-2157-0x00000000051D0000-0x00000000057E8000-memory.dmp

        Filesize

        6.1MB

      • memory/5060-2158-0x0000000004CC0000-0x0000000004DCA000-memory.dmp

        Filesize

        1.0MB

      • memory/5060-2159-0x0000000004B70000-0x0000000004B82000-memory.dmp

        Filesize

        72KB

      • memory/5060-2160-0x0000000004BF0000-0x0000000004C2C000-memory.dmp

        Filesize

        240KB

      • memory/5060-2165-0x0000000004C30000-0x0000000004C7C000-memory.dmp

        Filesize

        304KB