Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 06:02

General

  • Target

    c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe

  • Size

    815KB

  • MD5

    f599cf1bcfe4f72de8d0fbde1aa2bf41

  • SHA1

    ec64012b9884762c50ebb72079d7b4850e9e73c3

  • SHA256

    c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401

  • SHA512

    58d8f811c3200f6f59cb4bbee6902b64a6af2950e7bcae869a1cc26882e3872c46cdc2699f048a95941fd7c21156445fd4fd40251d2bf98d949da30bb3794720

  • SSDEEP

    12288:8Mr4y90PKrcDZN93f+7eUN7xWU2tpPJYkBw2qhe2hvUHz9SirSFUIhiIqAhH1zH:Myn4FPm7e+MDtpRBzqU2GTbYU9IqAzH

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe
    "C:\Users\Admin\AppData\Local\Temp\c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936671.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936671.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4010.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4010.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 1080
          4⤵
          • Program crash
          PID:2200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1750.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 1384
          4⤵
          • Program crash
          PID:6080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3004 -ip 3004
    1⤵
      PID:2800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2716 -ip 2716
      1⤵
        PID:3276

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exe

        Filesize

        169KB

        MD5

        f3ccd1388f34347f084c363f3a095517

        SHA1

        a5f71f4bc524a07da60b8d5279b18e80c260eefc

        SHA256

        732c81c09109b4fd8e28a7b66bec9345bd6e5f5a603a60dc981d6cf44eb03446

        SHA512

        1fcd23f175d8678e02b596179cd2daf4ce223b64b3e6663a0221b95d0a580d8a44448bf6d6b1cc5abd2d307338457ffb3f9dd4cbaec12533d154e709ec48aed6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936671.exe

        Filesize

        661KB

        MD5

        acdd5e4bb79b448e61d69e50691e4d69

        SHA1

        5526297c65eb3c18b6b261aacae9647b47489241

        SHA256

        0f9678dcb0b30d70080b421ba6ae493455f40dc113ac63261952a0fa249c870d

        SHA512

        f134b734a019859dc34725b273e38503cdebce665c2b5214d7dcd3e3a44c5a61375cf0c8b5a3b0b27e11cd36873273ae378ffda2cc8a9e3a7a4eb811521a20d3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4010.exe

        Filesize

        312KB

        MD5

        f838da92ac8d32065140be25bec464b1

        SHA1

        536cb2e037680e50f02d7c7ed676cc734a1cd2fa

        SHA256

        c5f9adfd4e6831ad7f350e8d4d83a6583c6d7addc0a2182fa60f01bbb75c9540

        SHA512

        830e44918a48e4838926330d1abe2d0d04e2d2bf176f3dd8c2dda06b4b5675e85568287b5841871cb6f9fa9b5c505166b72008e79069fea2b175f3a8ddfc4670

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1750.exe

        Filesize

        495KB

        MD5

        a4da9e3ecb6b96db4662a9f0e0706ccd

        SHA1

        de98b0e903791ea40acde5f518a1fc7ceaf3c3f8

        SHA256

        a762bd58670de264130e1b616a3089055e44979deab3be24b392a6bf0ada3b81

        SHA512

        b7a04922dedf3f774b64ba26b2ed27969787aa85932b3e942a1ca74e9ae0b100b7f2d32bc94951e99a20ea6f7d708f2e08b4b3711720c5040b2f1937df9d2a02

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1212-2168-0x0000000002530000-0x0000000002536000-memory.dmp

        Filesize

        24KB

      • memory/1212-2167-0x00000000002B0000-0x00000000002DE000-memory.dmp

        Filesize

        184KB

      • memory/2716-68-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-88-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-2143-0x0000000005740000-0x0000000005772000-memory.dmp

        Filesize

        200KB

      • memory/2716-63-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-64-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-66-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-70-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-74-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-76-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-80-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-82-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-84-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-86-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-90-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-92-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-94-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-96-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-78-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-72-0x0000000005520000-0x000000000557F000-memory.dmp

        Filesize

        380KB

      • memory/2716-62-0x0000000005520000-0x0000000005586000-memory.dmp

        Filesize

        408KB

      • memory/2716-61-0x0000000004E90000-0x0000000004EF6000-memory.dmp

        Filesize

        408KB

      • memory/3004-41-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-23-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3004-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3004-55-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/3004-50-0x0000000000A00000-0x0000000000B00000-memory.dmp

        Filesize

        1024KB

      • memory/3004-22-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-19-0x0000000002590000-0x00000000025AA000-memory.dmp

        Filesize

        104KB

      • memory/3004-25-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-43-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-29-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-31-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-33-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-35-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-37-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-39-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-51-0x0000000000980000-0x00000000009AD000-memory.dmp

        Filesize

        180KB

      • memory/3004-20-0x0000000004E70000-0x0000000005414000-memory.dmp

        Filesize

        5.6MB

      • memory/3004-27-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-21-0x0000000004DC0000-0x0000000004DD8000-memory.dmp

        Filesize

        96KB

      • memory/3004-45-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-47-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-49-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3004-18-0x0000000000400000-0x0000000000802000-memory.dmp

        Filesize

        4.0MB

      • memory/3004-15-0x0000000000A00000-0x0000000000B00000-memory.dmp

        Filesize

        1024KB

      • memory/3004-16-0x0000000000980000-0x00000000009AD000-memory.dmp

        Filesize

        180KB

      • memory/3004-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5680-2159-0x0000000004A90000-0x0000000004B9A000-memory.dmp

        Filesize

        1.0MB

      • memory/5680-2160-0x00000000049C0000-0x00000000049D2000-memory.dmp

        Filesize

        72KB

      • memory/5680-2161-0x0000000004A20000-0x0000000004A5C000-memory.dmp

        Filesize

        240KB

      • memory/5680-2158-0x0000000004FA0000-0x00000000055B8000-memory.dmp

        Filesize

        6.1MB

      • memory/5680-2166-0x0000000004BA0000-0x0000000004BEC000-memory.dmp

        Filesize

        304KB

      • memory/5680-2157-0x0000000006D00000-0x0000000006D06000-memory.dmp

        Filesize

        24KB

      • memory/5680-2156-0x0000000000060000-0x0000000000090000-memory.dmp

        Filesize

        192KB