Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 06:39

General

  • Target

    98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe

  • Size

    789KB

  • MD5

    43e43b86b7a8a4075e15a374c7ef298b

  • SHA1

    e46190efb99387bc20c1ff9386ec055ba61a1ca7

  • SHA256

    98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7

  • SHA512

    7bd63e39db4d7573d852f80cca8cbe8678defa8407c8f8405d4e90bef2c00d6e993b12e3181e4c00c16203ae34a10f39762fd0b8bcd6b991a681c9ceb0142347

  • SSDEEP

    12288:hMrXy90C7wgZsdpUlI+aLENzJY1AiRkT7fTvA2EiegHXPsrxIwq3Vfo:KyBdZ4cDaGFY1BkT7b9P0xIwqlw

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe
    "C:\Users\Admin\AppData\Local\Temp\98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un802791.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un802791.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0514.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1080
          4⤵
          • Program crash
          PID:1400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9113.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9113.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:508
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1384
          4⤵
          • Program crash
          PID:4184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3160
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5020 -ip 5020
    1⤵
      PID:4996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 508 -ip 508
      1⤵
        PID:3884

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exe

        Filesize

        169KB

        MD5

        c53509b87e6fcd36446d675643b2e1ec

        SHA1

        2fccffd4a828277427b4b9a67f2ee164b23e87e1

        SHA256

        2c01db534ee59a66ec20bda1f263c6f4efe877e1e87e4cb8d5165ef822006ea3

        SHA512

        c9a176e067b022219ed56097f48b31bbccfd2d9ddbc971c80dcd39cdfb62f00c1cc7fd8cd33c320564ac981df4dc56ff25b4533e781c2364d465fcfa2a3d1328

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un802791.exe

        Filesize

        635KB

        MD5

        fd564afcce0a47ea8bb176ada3b1b9af

        SHA1

        f8fb42df0c3e24adbf93bad8e9ef902966b2bfb7

        SHA256

        b7d6fab05daaeeb3c1d6076c27333ceac1eaf51f755fe381b176e15e5f1b06cf

        SHA512

        6219854b89f9721dc8783e308da27dfb6e5ef560281a07e95cf274e643a112d2ff7e1e9a2fb45fb989e6c714f34d7bb1aa139e3b7a6a8687131d373e97399e81

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0514.exe

        Filesize

        233KB

        MD5

        ab975c7749feeda8e2689936bcca4c5d

        SHA1

        9dbc8a362b6c0f37f021373636a2df3088325f8e

        SHA256

        bd0e05fd31d94b97d65a04de0dbfd13449842e0cc11c2cf4ab8d3d30bd48b446

        SHA512

        7afa41cfe41eb0ea47ec1b18206afa3e3cf9016de7744bfb3709d037ccc0dce34618e3aa691e83237905f11eda21f6b8fbcff3498b18c6aa2f36d18aa4f4eace

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9113.exe

        Filesize

        417KB

        MD5

        19939edad5c78d201ecc2d463b68db43

        SHA1

        40361255a7c54351fa914c78ef62e30985b80970

        SHA256

        401fb8129b250d868997d6508a4f1881ad344a454b50d423896612304504111a

        SHA512

        073fa714fa0d640c51ff9219a710124b7f01c3a443d2c1cf016f7f6cf21548534a4fd233d0af6d5ad46c0ac57411dd37286d69159123d00aacd7f14433499d67

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/508-70-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-84-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-90-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-72-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-63-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-62-0x0000000005240000-0x00000000052A6000-memory.dmp

        Filesize

        408KB

      • memory/508-96-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-61-0x0000000004BA0000-0x0000000004C06000-memory.dmp

        Filesize

        408KB

      • memory/508-88-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-86-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-92-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-82-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-2143-0x0000000005410000-0x0000000005442000-memory.dmp

        Filesize

        200KB

      • memory/508-74-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-64-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-66-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-68-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-76-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-78-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-94-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/508-80-0x0000000005240000-0x000000000529F000-memory.dmp

        Filesize

        380KB

      • memory/3160-2167-0x0000000000740000-0x000000000076E000-memory.dmp

        Filesize

        184KB

      • memory/3160-2168-0x0000000002840000-0x0000000002846000-memory.dmp

        Filesize

        24KB

      • memory/3688-2156-0x00000000002A0000-0x00000000002D0000-memory.dmp

        Filesize

        192KB

      • memory/3688-2157-0x0000000002430000-0x0000000002436000-memory.dmp

        Filesize

        24KB

      • memory/3688-2158-0x0000000005240000-0x0000000005858000-memory.dmp

        Filesize

        6.1MB

      • memory/3688-2159-0x0000000004D30000-0x0000000004E3A000-memory.dmp

        Filesize

        1.0MB

      • memory/3688-2160-0x0000000004C20000-0x0000000004C32000-memory.dmp

        Filesize

        72KB

      • memory/3688-2161-0x0000000004C80000-0x0000000004CBC000-memory.dmp

        Filesize

        240KB

      • memory/3688-2162-0x0000000004CD0000-0x0000000004D1C000-memory.dmp

        Filesize

        304KB

      • memory/5020-23-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-50-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/5020-43-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/5020-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5020-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/5020-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5020-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/5020-25-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-47-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5020-22-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-19-0x0000000002190000-0x00000000021AA000-memory.dmp

        Filesize

        104KB

      • memory/5020-27-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-29-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-31-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/5020-33-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-35-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-37-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-39-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-41-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-49-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-45-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/5020-15-0x0000000000640000-0x0000000000740000-memory.dmp

        Filesize

        1024KB

      • memory/5020-21-0x0000000002620000-0x0000000002638000-memory.dmp

        Filesize

        96KB

      • memory/5020-20-0x0000000004E70000-0x0000000005414000-memory.dmp

        Filesize

        5.6MB