Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 08:13

General

  • Target

    b84098cabddb01950329172bce15f5727060d0053d5251c23b2f664dac09aa3c.exe

  • Size

    787KB

  • MD5

    77c85f289d6fd7985b05c8f2a6fd2fae

  • SHA1

    96fe8dab29904d440cb3f200e6cdbdd0447b32ed

  • SHA256

    b84098cabddb01950329172bce15f5727060d0053d5251c23b2f664dac09aa3c

  • SHA512

    31e0899556b29e96f55989538ead6637e5c02c05591241d2cd7bed7162b832ead2f70d89bbc1a2082fb18e7a8420ef4549110e7c2b61d5d669342802cb1fdf22

  • SSDEEP

    12288:JMrQy905F/UK3H4+DlBd36fQ9Jvk4SzZg6X+17sQ5HsVg3EP1MdQuNOBHX455p:RyZK3Y+BeQ9J1G+H5H6g3ENWNPZ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b84098cabddb01950329172bce15f5727060d0053d5251c23b2f664dac09aa3c.exe
    "C:\Users\Admin\AppData\Local\Temp\b84098cabddb01950329172bce15f5727060d0053d5251c23b2f664dac09aa3c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095218.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095218.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9804.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9804.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 1028
          4⤵
          • Program crash
          PID:3660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5793.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5793.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 1376
          4⤵
          • Program crash
          PID:5488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596163.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596163.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5600
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1848 -ip 1848
    1⤵
      PID:2912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4388 -ip 4388
      1⤵
        PID:5432

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si596163.exe

        Filesize

        168KB

        MD5

        202f348a7b880a633a85c5cf7ed17cf0

        SHA1

        539ad0fa93185b66402b7762461075d05dee848d

        SHA256

        0c6363d8347b68ecc31dcd75a39dcd30d71f91c2644178cef8a76f07483aede1

        SHA512

        b131097d6da30563b92b6525493586efbc07be1fe8f18a83cb32193cb11b85fed941a38ddf4c9e050dee7af7a270a3db7f6191d1dbef83c3c53c35dd5fa86d5a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095218.exe

        Filesize

        633KB

        MD5

        0167c2f0b0fda0123496772a8a0ac717

        SHA1

        35ae9cb30913e263fadb80d44a52638f39265809

        SHA256

        6e47d5b143b080feffdbb6888cf0c575709446a116d132de22b17adbc433e186

        SHA512

        d687c820f3edfe5fceddb90c785f95e0a36d3faba6e9d7afa5b1d33556158386a88f69862877d20429d4f3f90a720d7be362859c5319e5542e9cab6b43d8831d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9804.exe

        Filesize

        230KB

        MD5

        bcb8977901cf22d32ef9beabbc47eee5

        SHA1

        3b9281026b33162202d70295683c066b691cfbd3

        SHA256

        fed164b9ad40cc2b4228becace2989496978df3200624a3ea3b33b94d4bd2c5e

        SHA512

        31a63a57c5401288346cd7ba30d39379e516ffcccaaebbad57126c2fdb33b520fabd0bc86bbaebb16ba67dcf070588988c34cb4fbbbb9de18557a760ec6c038d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5793.exe

        Filesize

        414KB

        MD5

        b9cf0fdea3326ff418a5ed1255ae86ed

        SHA1

        9420a707bda4fe73daa979fa96a5de549e9b9394

        SHA256

        5615f321607fb80f78ce648cad1a5747ddb21e4956a5b0d2034de3f6ddf44b2f

        SHA512

        fb8c9621b29928bb556026fa8a9360e09ce739a52cd55f65deee86d68c05eee175640b2bc7fa90ba4be75086cdb8bbbcdcdd8c76f3e70e87fb1dc1c7e346c21a

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1848-15-0x00000000004F0000-0x00000000005F0000-memory.dmp

        Filesize

        1024KB

      • memory/1848-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1848-17-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1848-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1848-19-0x0000000002290000-0x00000000022AA000-memory.dmp

        Filesize

        104KB

      • memory/1848-20-0x0000000004BA0000-0x0000000005144000-memory.dmp

        Filesize

        5.6MB

      • memory/1848-21-0x00000000025F0000-0x0000000002608000-memory.dmp

        Filesize

        96KB

      • memory/1848-22-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-49-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-47-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-45-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-43-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-41-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-39-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-37-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-36-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-33-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-31-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-29-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-27-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-25-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-23-0x00000000025F0000-0x0000000002602000-memory.dmp

        Filesize

        72KB

      • memory/1848-50-0x00000000004F0000-0x00000000005F0000-memory.dmp

        Filesize

        1024KB

      • memory/1848-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1848-54-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1848-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4388-60-0x0000000004C40000-0x0000000004CA6000-memory.dmp

        Filesize

        408KB

      • memory/4388-61-0x0000000005260000-0x00000000052C6000-memory.dmp

        Filesize

        408KB

      • memory/4388-65-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-63-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-62-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-77-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-95-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-93-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-91-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-89-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-87-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-85-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-83-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-81-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-75-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-73-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-71-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-69-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-67-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-79-0x0000000005260000-0x00000000052BF000-memory.dmp

        Filesize

        380KB

      • memory/4388-2142-0x0000000005430000-0x0000000005462000-memory.dmp

        Filesize

        200KB

      • memory/5288-2155-0x0000000000F00000-0x0000000000F30000-memory.dmp

        Filesize

        192KB

      • memory/5288-2156-0x0000000001670000-0x0000000001676000-memory.dmp

        Filesize

        24KB

      • memory/5288-2157-0x0000000005F30000-0x0000000006548000-memory.dmp

        Filesize

        6.1MB

      • memory/5288-2158-0x0000000005A20000-0x0000000005B2A000-memory.dmp

        Filesize

        1.0MB

      • memory/5288-2159-0x0000000005770000-0x0000000005782000-memory.dmp

        Filesize

        72KB

      • memory/5288-2161-0x0000000005910000-0x000000000594C000-memory.dmp

        Filesize

        240KB

      • memory/5288-2165-0x0000000005950000-0x000000000599C000-memory.dmp

        Filesize

        304KB

      • memory/5600-2166-0x0000000000860000-0x000000000088E000-memory.dmp

        Filesize

        184KB

      • memory/5600-2167-0x0000000005080000-0x0000000005086000-memory.dmp

        Filesize

        24KB