Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 06:52

General

  • Target

    1a18fea06ad8c7a396060106e1704caa25776e5119da3763899527b7a8cfa10e.exe

  • Size

    670KB

  • MD5

    1c58a6c7eba26ef4766739f774978525

  • SHA1

    0ecee42609cb5f3bfd8f418f03444fd0388a3d65

  • SHA256

    1a18fea06ad8c7a396060106e1704caa25776e5119da3763899527b7a8cfa10e

  • SHA512

    bcc8079c42c468a4e06edcce67771be627c0e9340f544eb362dd4132ed27d52bf96914a8461747c6338a7ee8291eed368ea4f59e88f3bf26c2a672e0b5fe9448

  • SSDEEP

    12288:JMrGy90FDMlYyA2poW3RDRCk1rrU9M5vFNaizzsVkadwjI72B2ay1mMg:7y2yA2oqxRY9M5vFNaG6ka2c2Fy1Xg

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a18fea06ad8c7a396060106e1704caa25776e5119da3763899527b7a8cfa10e.exe
    "C:\Users\Admin\AppData\Local\Temp\1a18fea06ad8c7a396060106e1704caa25776e5119da3763899527b7a8cfa10e.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimG5089.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimG5089.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it844224.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it844224.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435192.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435192.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1384
          4⤵
          • Program crash
          PID:3344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr884017.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr884017.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4736 -ip 4736
    1⤵
      PID:3892
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:6516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr884017.exe

      Filesize

      168KB

      MD5

      c52ebada00a59ec1f651a0e9fbcef2eb

      SHA1

      e1941278df76616f1ca3202ef2a9f99d2592d52f

      SHA256

      35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

      SHA512

      6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimG5089.exe

      Filesize

      516KB

      MD5

      f473075fb9955d99caba64335fc875f2

      SHA1

      7422e60de3f3ce42d2d396fbf87269613d36c897

      SHA256

      2c3cd95e5df694b7d0b76f88e538612896577125acb38a8e0180fe55e618102f

      SHA512

      3927c578659a32a02aa9ab0f2e9c873075b37aeaa1d650b179003a40ec096d34bc9fb78024b0b8234fdd9cb2b763ba3d1e277614b0b7dd153512afee734338fe

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it844224.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435192.exe

      Filesize

      438KB

      MD5

      da245d95f2dd2cc36c46469f291670d4

      SHA1

      3b358d68eb716f32138fbbf5b43cb2a257b862b0

      SHA256

      f0b067d5b9915e79e02cd29beb86a8c3592f18a78816862608a0b192df1d9cde

      SHA512

      45521677837f744f957b5d44013083b405cf8e73c55cda9761214853475260cfc549459335e6e26b261b6ec58e78407217687958fcad5f427f2ff5fdb585f552

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      03728fed675bcde5256342183b1d6f27

      SHA1

      d13eace7d3d92f93756504b274777cc269b222a2

      SHA256

      f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

      SHA512

      6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

    • memory/3032-14-0x00007FFC0D803000-0x00007FFC0D805000-memory.dmp

      Filesize

      8KB

    • memory/3032-15-0x00000000000B0000-0x00000000000BA000-memory.dmp

      Filesize

      40KB

    • memory/3032-16-0x00007FFC0D803000-0x00007FFC0D805000-memory.dmp

      Filesize

      8KB

    • memory/3456-2191-0x0000000000700000-0x0000000000730000-memory.dmp

      Filesize

      192KB

    • memory/3456-2192-0x00000000028E0000-0x00000000028E6000-memory.dmp

      Filesize

      24KB

    • memory/4736-64-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-54-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-24-0x00000000052F0000-0x0000000005356000-memory.dmp

      Filesize

      408KB

    • memory/4736-26-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-38-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-88-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-86-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-84-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-82-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-80-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-78-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-76-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-72-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-70-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-68-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-66-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-22-0x0000000002730000-0x0000000002798000-memory.dmp

      Filesize

      416KB

    • memory/4736-62-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-60-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-58-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-56-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-23-0x0000000004D40000-0x00000000052E4000-memory.dmp

      Filesize

      5.6MB

    • memory/4736-52-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-50-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-46-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-44-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-42-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-40-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-36-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-34-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-32-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-30-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-28-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-74-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-48-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-25-0x00000000052F0000-0x0000000005350000-memory.dmp

      Filesize

      384KB

    • memory/4736-2167-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/5248-2180-0x0000000000880000-0x00000000008AE000-memory.dmp

      Filesize

      184KB

    • memory/5248-2181-0x0000000000EE0000-0x0000000000EE6000-memory.dmp

      Filesize

      24KB

    • memory/5248-2182-0x00000000058E0000-0x0000000005EF8000-memory.dmp

      Filesize

      6.1MB

    • memory/5248-2183-0x00000000053D0000-0x00000000054DA000-memory.dmp

      Filesize

      1.0MB

    • memory/5248-2184-0x00000000050F0000-0x0000000005102000-memory.dmp

      Filesize

      72KB

    • memory/5248-2185-0x0000000005150000-0x000000000518C000-memory.dmp

      Filesize

      240KB

    • memory/5248-2186-0x00000000052C0000-0x000000000530C000-memory.dmp

      Filesize

      304KB