Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 05:43

General

  • Target

    4f50802649e624d7cb34e2f23074f3e096df2ca9518cd4b7203330e94a69e78b.exe

  • Size

    814KB

  • MD5

    aa05d09c00e06eebbcb9bf76a5b7f10f

  • SHA1

    8f9d9036071c33795a1819613be60c38e4d7f89e

  • SHA256

    4f50802649e624d7cb34e2f23074f3e096df2ca9518cd4b7203330e94a69e78b

  • SHA512

    d5eeed57512d24d1824647b13b39959a7fa8c417f62eb1fbeeecbcee432de51dbfcaa95bfc1785c63729c8d354affea82806d45ce5ac204f38f85bd7384d42c4

  • SSDEEP

    12288:MMriy90Rt0jVr13KbVL18aAQkLr+/sBr9EXlVt2MiPSXVHcrSZBHke1fpa1Yrl:OyW6j5RCL17bkGUBr9i12HwawRk2Tl

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f50802649e624d7cb34e2f23074f3e096df2ca9518cd4b7203330e94a69e78b.exe
    "C:\Users\Admin\AppData\Local\Temp\4f50802649e624d7cb34e2f23074f3e096df2ca9518cd4b7203330e94a69e78b.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463232.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463232.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3008.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3008.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 1004
          4⤵
          • Program crash
          PID:3164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6655.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6655.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:7128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 1208
          4⤵
          • Program crash
          PID:5480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655554.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655554.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5580
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4712 -ip 4712
    1⤵
      PID:900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2152 -ip 2152
      1⤵
        PID:7152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655554.exe

        Filesize

        169KB

        MD5

        faa01caf5dd941b4d1b652b5dc86bff4

        SHA1

        4f3613db33cec9053b6436b97f113a01a1797e7c

        SHA256

        9c1f815ebdf5e9b5e57f084ca319c2757785b28c22c7d0987a62d5eec6b103e9

        SHA512

        a2ebae394f7a3a4cff1ed378bb1414a90ef4ff60ff7e8fb04fc063ee09f4d82cef52c735149886f44347df6af37faa17bef8655f0ec9ead1db03be4dbca80278

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463232.exe

        Filesize

        661KB

        MD5

        534b55ad957bce580b7d7d5b69ddfc87

        SHA1

        e70fcdba894736d982de7537fe62c21455883f5b

        SHA256

        ea311a97c317314f5e5e56d0029e150eab40b977e450bb8dde13449c7bb274ae

        SHA512

        ca1f3f8cd13df60e4068193e315436aee64c06981d055720d2f91aa357473ed592d6e942093bbbe1da62d00debfdc08574376f9d57f54f80357d3efe0af12784

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3008.exe

        Filesize

        332KB

        MD5

        d2c6609198f2b144fb9f7ea5e87f999a

        SHA1

        4a6bf94bb31537568250ece9834a5360d381993c

        SHA256

        bff732d33438758c3654bc31c22ec1b6271f9a790cc154c96b5248179beecfe2

        SHA512

        2949223c75e93ab867ca7abb8e618945cb42c093b9d378be0c82adce63e70569043d943ce77d2447a8ec03bc59e7d75a5b9cf0ba5547427ac4852d8f253af0fd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6655.exe

        Filesize

        495KB

        MD5

        a3653a907f9e906a2d698d994bbed98b

        SHA1

        115235d7f98ebc33fb42682389153ef4b5f44887

        SHA256

        a045e7bebaad18581be7ff8a0e50f071d8871d47a021e44986269c1fdcc41e35

        SHA512

        c47f5ae5f4dbe39aac4080686eb7f2c1ab306951087ae47b9e5b1cd8ee85cbb13909071732072b3d94aa921979f90d82c984697416147e37b68687b6f0cb716b

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2152-67-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-60-0x00000000028C0000-0x0000000002926000-memory.dmp

        Filesize

        408KB

      • memory/2152-62-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-77-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-2142-0x0000000005760000-0x0000000005792000-memory.dmp

        Filesize

        200KB

      • memory/2152-85-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-63-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-65-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-69-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-71-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-73-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-75-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-79-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-95-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-83-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-87-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-89-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-91-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-93-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-81-0x0000000004F80000-0x0000000004FDF000-memory.dmp

        Filesize

        380KB

      • memory/2152-61-0x0000000004F80000-0x0000000004FE6000-memory.dmp

        Filesize

        408KB

      • memory/4712-30-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-39-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-18-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/4712-54-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/4712-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4712-20-0x0000000005060000-0x0000000005604000-memory.dmp

        Filesize

        5.6MB

      • memory/4712-17-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/4712-50-0x0000000000B40000-0x0000000000C40000-memory.dmp

        Filesize

        1024KB

      • memory/4712-22-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-23-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-25-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-27-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-19-0x00000000025F0000-0x000000000260A000-memory.dmp

        Filesize

        104KB

      • memory/4712-31-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-33-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-35-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-37-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4712-41-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-15-0x0000000000B40000-0x0000000000C40000-memory.dmp

        Filesize

        1024KB

      • memory/4712-43-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-45-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-47-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-49-0x0000000002920000-0x0000000002932000-memory.dmp

        Filesize

        72KB

      • memory/4712-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4712-21-0x0000000002920000-0x0000000002938000-memory.dmp

        Filesize

        96KB

      • memory/5580-2166-0x0000000000CF0000-0x0000000000D1E000-memory.dmp

        Filesize

        184KB

      • memory/5580-2167-0x0000000001700000-0x0000000001706000-memory.dmp

        Filesize

        24KB

      • memory/7128-2156-0x00000000030B0000-0x00000000030B6000-memory.dmp

        Filesize

        24KB

      • memory/7128-2157-0x0000000005F00000-0x0000000006518000-memory.dmp

        Filesize

        6.1MB

      • memory/7128-2158-0x00000000059F0000-0x0000000005AFA000-memory.dmp

        Filesize

        1.0MB

      • memory/7128-2159-0x0000000005890000-0x00000000058A2000-memory.dmp

        Filesize

        72KB

      • memory/7128-2155-0x0000000000F10000-0x0000000000F40000-memory.dmp

        Filesize

        192KB

      • memory/7128-2160-0x0000000005920000-0x000000000595C000-memory.dmp

        Filesize

        240KB

      • memory/7128-2165-0x0000000005960000-0x00000000059AC000-memory.dmp

        Filesize

        304KB