Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 11:10

General

  • Target

    2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe

  • Size

    789KB

  • MD5

    4327812aac9190829522bd9cc8266224

  • SHA1

    7f25219633668fc8f4b1059ccaaa9fd4a08b6ea1

  • SHA256

    2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4

  • SHA512

    3112bb80639f47aa7ee9040bf6dfc7b5ff3cfb73e68b58264a2f95953b645447d0327392fe4af80b5811e73444ac4dd9ab815965df4326c2c9e37f9af41d932f

  • SSDEEP

    24576:1yktRJYogMkfMPdtaepgtOPyHIkTWO4P:QgnYZ5k8ztHA

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe
    "C:\Users\Admin\AppData\Local\Temp\2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136953.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136953.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7897.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 1080
          4⤵
          • Program crash
          PID:740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7173.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7173.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 1528
          4⤵
          • Program crash
          PID:2604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1632 -ip 1632
    1⤵
      PID:640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1664 -ip 1664
      1⤵
        PID:5152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exe

        Filesize

        169KB

        MD5

        b9f5cccd8a9c49e8df74f482697c50fd

        SHA1

        07360a70431cbb5b25b2a5d0421f23505ccbf120

        SHA256

        970a4845526a71573fb03092c778d1820dda4b5f4a40a595029197e2062616e2

        SHA512

        8cfe637248e9a7b5fdf34404b5a10dee649971246c4460ce2a939cd8e7ef9c3d62179e191f95a5e2b2e1849bcbcc7658a0949207a91344be8db5036a9abb16e4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136953.exe

        Filesize

        635KB

        MD5

        9fe19bbe67d76c59d91ae8ea59d46710

        SHA1

        7c53f6e09f8d5534deac56864d111be4ab780ba6

        SHA256

        86febf27992c1165b8d912239012f68662779940aeba580890a1f47cd854233c

        SHA512

        b9dfbf00bae7c06364277ecb0bf74c40ecf0450b8be05b1ad8e49f520c51d88beba7c69030ae9e59641f1f317261f69710c2e41be1ecc124598a962e04d162d8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7897.exe

        Filesize

        233KB

        MD5

        4ee57dc55bfd696cc6a693c3fab76e28

        SHA1

        f2bda54425e95a07dba8d0086d72f72cea57d0e9

        SHA256

        0b4791c9c1484d2f9ad55854e40f19dd5b4e81b91c8769a9fe9ab07317ad61f8

        SHA512

        09ebeeb5b27d4fce3177ec674350999a35198bbd1f1b418e6cbbe6ae44059279f99353f7b49604205e5e84e88232697243e07d3186764556ac7c90aa61cca56c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7173.exe

        Filesize

        417KB

        MD5

        87dc680842d066e24377da37cac7139a

        SHA1

        41a78ec0fc53d7b6c7389cbd111e229a5d71196d

        SHA256

        8299d3a27c097cc7bcc5e4d17895a07e657786989144cb25c601b1adefd4eb15

        SHA512

        20e9cb2d8cb698f6f14e87675da3721ed7bedacebb8b6d68bd9ede6c301802bf22ec2604c33043c085c51da55fc5b533588d8fded3c5ba49870f741eadd9ca1e

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1632-55-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1632-17-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1632-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1632-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1632-19-0x00000000024B0000-0x00000000024CA000-memory.dmp

        Filesize

        104KB

      • memory/1632-20-0x0000000004B90000-0x0000000005134000-memory.dmp

        Filesize

        5.6MB

      • memory/1632-21-0x0000000004A50000-0x0000000004A68000-memory.dmp

        Filesize

        96KB

      • memory/1632-49-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-47-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-45-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-43-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-41-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-39-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-37-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-36-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-33-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-31-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-29-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-27-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-25-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-23-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-22-0x0000000004A50000-0x0000000004A62000-memory.dmp

        Filesize

        72KB

      • memory/1632-50-0x0000000000770000-0x0000000000870000-memory.dmp

        Filesize

        1024KB

      • memory/1632-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1632-54-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1632-15-0x0000000000770000-0x0000000000870000-memory.dmp

        Filesize

        1024KB

      • memory/1664-75-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-74-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-91-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-79-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-65-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-63-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-62-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-93-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-87-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-89-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-85-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-83-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-81-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-77-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-60-0x0000000002300000-0x0000000002366000-memory.dmp

        Filesize

        408KB

      • memory/1664-61-0x00000000049F0000-0x0000000004A56000-memory.dmp

        Filesize

        408KB

      • memory/1664-71-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-69-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-67-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-95-0x00000000049F0000-0x0000000004A4F000-memory.dmp

        Filesize

        380KB

      • memory/1664-2142-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/4992-2166-0x00000000002C0000-0x00000000002EE000-memory.dmp

        Filesize

        184KB

      • memory/4992-2167-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

        Filesize

        24KB

      • memory/5284-2155-0x00000000005E0000-0x0000000000610000-memory.dmp

        Filesize

        192KB

      • memory/5284-2156-0x0000000004DC0000-0x0000000004DC6000-memory.dmp

        Filesize

        24KB

      • memory/5284-2157-0x00000000055B0000-0x0000000005BC8000-memory.dmp

        Filesize

        6.1MB

      • memory/5284-2158-0x00000000050A0000-0x00000000051AA000-memory.dmp

        Filesize

        1.0MB

      • memory/5284-2159-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/5284-2160-0x0000000004FD0000-0x000000000500C000-memory.dmp

        Filesize

        240KB

      • memory/5284-2165-0x0000000005010000-0x000000000505C000-memory.dmp

        Filesize

        304KB