Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 06:44

General

  • Target

    1356d3539fad9fee0cc92097bf5d7d7bc79afea9e95cf211ce1d8f2ef384be46.exe

  • Size

    787KB

  • MD5

    6eb2d5406956db3534f36fa04a3c3c24

  • SHA1

    dd2a33c9daf195b90dbde606379a4cf67a26f485

  • SHA256

    1356d3539fad9fee0cc92097bf5d7d7bc79afea9e95cf211ce1d8f2ef384be46

  • SHA512

    0cd1d036e396d66704499c1f4da02f38d3dd2a91a37752ff9cdbb752472b9effa97a240eabdd1aa26bfd9697d3c14fa918166d9b4fa96c9f07e22929b60784ec

  • SSDEEP

    12288:2Mr5y90CKT3vJESgK0nWXHnwfQqNiWla3YpSiZpSj77j1m6ZplNa8Z1ARA:DyyTBfXwQqN5aqSiZpi1mWtJZ19

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1356d3539fad9fee0cc92097bf5d7d7bc79afea9e95cf211ce1d8f2ef384be46.exe
    "C:\Users\Admin\AppData\Local\Temp\1356d3539fad9fee0cc92097bf5d7d7bc79afea9e95cf211ce1d8f2ef384be46.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6181.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6181.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4964
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 1084
          4⤵
          • Program crash
          PID:4868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1384
          4⤵
          • Program crash
          PID:5816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si944479.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si944479.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4964 -ip 4964
    1⤵
      PID:1860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2340 -ip 2340
      1⤵
        PID:5772

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si944479.exe

        Filesize

        168KB

        MD5

        dc929a22c6de5422adbcc00f40afc277

        SHA1

        d894a077faebce0286cdee5ca8193a6e06dd8763

        SHA256

        161612b542207cae4710ff0005eff61127fdaaf56040ad4e4414cc47af1d9a3c

        SHA512

        ea5a9ec5bdfb271b792290a7e188c2f6001ce39a756c2a0e692fbd23615b212fe1f86b0ff4752fa2bedff96cdb4d8b3014446702439a020e4ad322bdfa237ed4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136013.exe

        Filesize

        633KB

        MD5

        b2131aa2a97105942befccea8fe23cc2

        SHA1

        8283de10c9ddf458660725b096de3404cf7cd3ea

        SHA256

        0c2c5bf4883ecbdbb61934308576d75b1231527ca814857ff3659bc5db8bca42

        SHA512

        f7a4f864a496574037369f031ec84f620c00d7deb9fa15d81b7a35d3a6d5df1f27c2ba24fb416680047f9cbee5926296549994dc9aad347a4b1ee201c8c11587

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6181.exe

        Filesize

        231KB

        MD5

        83426486d8cb7386cd3274096388fdec

        SHA1

        1a8058ef20ef3207acf7e5b5a4ac81f6c1ea16d7

        SHA256

        dbaf6b44e4505861e65fc562df3f2c9c40cad2c7a793442c2834903ae1f4d539

        SHA512

        74f637b19eb9c4d320c0d170ab8270d14f349fea1f26efb3f13c283e3e0a850c5b13a8a95096b7bcd98272086a41021f51e8976ba71fe9323abf7aa62fab306c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe

        Filesize

        414KB

        MD5

        a0624ee24321cdd25b17f722c081ab8a

        SHA1

        1b8514788c91e95d950bc4c8517b440903efe8d4

        SHA256

        f767353f215fbd61fd0939f66f5805a8908bf9a5c787b3bbcc9bcb895b524760

        SHA512

        b68ff2166cc7ea1bf55cf89378682cbec192590099f65b486bb9d9f26a3356c8f3fc3579cc8d83878a2b118fd23d1d6c641de518e990d474ea9046504e7d54d6

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2340-67-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-60-0x0000000004B50000-0x0000000004BB6000-memory.dmp

        Filesize

        408KB

      • memory/2340-93-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-69-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-2142-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2340-62-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-63-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-65-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-71-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-73-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-75-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-77-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-79-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-95-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-83-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-85-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-87-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-89-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-91-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-81-0x0000000004AE0000-0x0000000004B3F000-memory.dmp

        Filesize

        380KB

      • memory/2340-61-0x0000000004AE0000-0x0000000004B46000-memory.dmp

        Filesize

        408KB

      • memory/4964-29-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-37-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4964-54-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4964-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4964-20-0x0000000004A50000-0x0000000004FF4000-memory.dmp

        Filesize

        5.6MB

      • memory/4964-15-0x0000000000610000-0x0000000000710000-memory.dmp

        Filesize

        1024KB

      • memory/4964-50-0x0000000000610000-0x0000000000710000-memory.dmp

        Filesize

        1024KB

      • memory/4964-22-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-23-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-25-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-27-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-19-0x00000000049B0000-0x00000000049CA000-memory.dmp

        Filesize

        104KB

      • memory/4964-31-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-33-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-49-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-35-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4964-39-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-17-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4964-41-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-44-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-46-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-47-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4964-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4964-21-0x0000000005000000-0x0000000005018000-memory.dmp

        Filesize

        96KB

      • memory/5740-2156-0x0000000002260000-0x0000000002266000-memory.dmp

        Filesize

        24KB

      • memory/5740-2157-0x0000000004F80000-0x0000000005598000-memory.dmp

        Filesize

        6.1MB

      • memory/5740-2158-0x0000000004A70000-0x0000000004B7A000-memory.dmp

        Filesize

        1.0MB

      • memory/5740-2159-0x0000000004990000-0x00000000049A2000-memory.dmp

        Filesize

        72KB

      • memory/5740-2155-0x0000000000010000-0x0000000000040000-memory.dmp

        Filesize

        192KB

      • memory/5740-2160-0x00000000049F0000-0x0000000004A2C000-memory.dmp

        Filesize

        240KB

      • memory/5740-2166-0x0000000004B80000-0x0000000004BCC000-memory.dmp

        Filesize

        304KB

      • memory/5872-2165-0x0000000000640000-0x000000000066E000-memory.dmp

        Filesize

        184KB

      • memory/5872-2167-0x0000000004E20000-0x0000000004E26000-memory.dmp

        Filesize

        24KB