Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 10:54

General

  • Target

    5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe

  • Size

    652KB

  • MD5

    86e0e71b2d80d333e8219670deb2fe53

  • SHA1

    d51af8bc454ebcdadfd222238e44ad4bc5775289

  • SHA256

    5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1

  • SHA512

    c94c8fec4a15c36bf8374fd04a6d099184529f3cb8b330392458670cefe4c70ae67e07396fe90ee09dd85a367fa684e7116b500baf2b784bf2ee1450518a372b

  • SSDEEP

    12288:+Mrzy90iO7Y7vRfGsoTnAcxi8rw1Ps+DVXdAqRm/cJ7+P6Zg:tyVkWP/XAga6m

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe
    "C:\Users\Admin\AppData\Local\Temp\5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPp4948.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPp4948.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku190078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku190078.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:6688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 1384
          4⤵
          • Program crash
          PID:3352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3532 -ip 3532
    1⤵
      PID:5416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exe

      Filesize

      169KB

      MD5

      32da97a6fc14facc28340f58d81495d9

      SHA1

      629f778a33f2f972b565e7ea3ca1278d27aacd29

      SHA256

      07bebc6c71aaf320e2a886301842cc5aee4ee2de0a60e4c707f5571b07a49227

      SHA512

      306d0f25ee1621f292d7f834a4dd23f12e6be3bff2f8eddf10b1c616314653f860f97826d9ae18e4ba6d6cdfb6c9fe0fca7071932664dee5a098a7bb84f513a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPp4948.exe

      Filesize

      498KB

      MD5

      4ca6b7952ef2c0aa9f7fcc382948aa8c

      SHA1

      9b89d9b1812536ea6eabe5771638e2828ff49e62

      SHA256

      254c860d4e44791d0c0f406b603298589d6ffa1090d5c0c2ba2d9e181f11e313

      SHA512

      5d9151c6b5e7017a6c6c005a27e1a608829d2b985edce81341d48b2b55d4ea023610fecc48aef9cb30600c77f3077aee9d82a51a909a9e5ed4320fae38a0b9b4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exe

      Filesize

      12KB

      MD5

      f900b07411b5555ffc3775e25a423fcf

      SHA1

      d022123c255f527778efc9d92535e0630a87abd7

      SHA256

      8a38c2f849ad02064bf8e57e70a8e79331afad8d59f34f72466804491d0de4ef

      SHA512

      ead2fa3561e6bbac875a0f3ee70e4ab3046853e4787373fba7455c99ff00ca572e1c86bacea9b7c3b77ef902378ec453dbc4f38d4ba80df53a9ed0cc5710b6e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku190078.exe

      Filesize

      417KB

      MD5

      cfaa9a611a7e7ee75210ffe750fa6149

      SHA1

      c0844dd407042593cc9394b77cd478e2449de2f2

      SHA256

      016b24716e1e7aa52471862d3cebd31154bebf5d261995624b05b3f63565cd50

      SHA512

      8a84459a89c4d80e7c92ce4fd7ee5961ed1b44ba04b5e604ba196b9717bf1a189a157f24a83614a0127f4cf9984d173eb8a34cc48e25685cccbb1936469d8808

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/2680-2129-0x0000000000870000-0x000000000089E000-memory.dmp

      Filesize

      184KB

    • memory/2680-2130-0x0000000005150000-0x0000000005156000-memory.dmp

      Filesize

      24KB

    • memory/3460-15-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

      Filesize

      40KB

    • memory/3460-14-0x00007FFD0B083000-0x00007FFD0B085000-memory.dmp

      Filesize

      8KB

    • memory/3460-16-0x00007FFD0B083000-0x00007FFD0B085000-memory.dmp

      Filesize

      8KB

    • memory/3532-64-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-54-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-24-0x0000000002710000-0x0000000002776000-memory.dmp

      Filesize

      408KB

    • memory/3532-26-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-42-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-88-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-86-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-84-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-82-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-80-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-76-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-74-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-72-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-70-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-68-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-66-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-22-0x0000000002590000-0x00000000025F6000-memory.dmp

      Filesize

      408KB

    • memory/3532-62-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-60-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-58-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-56-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-23-0x0000000004D90000-0x0000000005334000-memory.dmp

      Filesize

      5.6MB

    • memory/3532-52-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-48-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-46-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-45-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-40-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-38-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-36-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-34-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-32-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-30-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-28-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-78-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-50-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-25-0x0000000002710000-0x000000000276F000-memory.dmp

      Filesize

      380KB

    • memory/3532-2105-0x0000000004D50000-0x0000000004D82000-memory.dmp

      Filesize

      200KB

    • memory/6688-2118-0x0000000000600000-0x0000000000630000-memory.dmp

      Filesize

      192KB

    • memory/6688-2119-0x0000000004EE0000-0x0000000004EE6000-memory.dmp

      Filesize

      24KB

    • memory/6688-2120-0x0000000005530000-0x0000000005B48000-memory.dmp

      Filesize

      6.1MB

    • memory/6688-2121-0x0000000005050000-0x000000000515A000-memory.dmp

      Filesize

      1.0MB

    • memory/6688-2122-0x0000000004F80000-0x0000000004F92000-memory.dmp

      Filesize

      72KB

    • memory/6688-2123-0x0000000004FE0000-0x000000000501C000-memory.dmp

      Filesize

      240KB

    • memory/6688-2124-0x0000000005160000-0x00000000051AC000-memory.dmp

      Filesize

      304KB