Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 15:42

General

  • Target

    098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe

  • Size

    651KB

  • MD5

    2fb613ae3b0f1036637e3e0086f276b4

  • SHA1

    b21acc75de412644c5b5b877bd9e8ca1e0b45e2e

  • SHA256

    098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f

  • SHA512

    addf59918dd85ae3f034f1828b9271fa46cba51b06d08b85a06c8bc1cc51e95d8182c574026ff9b57b4402c420caf1038a4c9751b0c7ddcc15d715cd29e13ecf

  • SSDEEP

    12288:NMrPy90ObulvkoFmGy3SpgG2qhr8XdTmESMs:yyFbOyXGRydTm3

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe
    "C:\Users\Admin\AppData\Local\Temp\098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivN5782.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivN5782.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382035.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382035.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1380
          4⤵
          • Program crash
          PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4936
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1596 -ip 1596
    1⤵
      PID:4808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exe

      Filesize

      168KB

      MD5

      da2a3930d92426272ff2df806a129c2f

      SHA1

      1b11ac3df03893811480d5746a57a7c03d9e8353

      SHA256

      b3c2c9bb981048ea8efade1f0c06f74c13361b25d8a18417b004fd45287ed437

      SHA512

      8e3bc4c13488449a25988b4209fb108aa7675b67d06053c4b6df9ae3210d9d24049d6c2f15c9dccc2ba448a3902524425d71610fa34e7ff225231c161d65fc6b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivN5782.exe

      Filesize

      497KB

      MD5

      2c639fafa5bfa815e10f0158a57dc45c

      SHA1

      d3096c0dc0d7e06ddd6ab8320211a5c2f808569a

      SHA256

      d1863703f536b48f52be21530016bca145c4756d1c6a942f9b611a7b6f1db8ac

      SHA512

      53cb192575d8290e5c16e3da705cbf574f339a93f474376159f53f658474b0287ea1bb2997f864d7ba57d1f1f543f48452a7e42063bf8b7b82b102b962f140de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exe

      Filesize

      11KB

      MD5

      0c3d377a0c6e48ada16a67496e1fae1a

      SHA1

      cd6e88b40eb74a61c3cc39f2aa571ce9a5dad422

      SHA256

      cfd5f8ce02d6d06bcaa69e1a325696c6e6b5febddfbfccfe58cf51c7d2615ec4

      SHA512

      b650fcc6fb98fa024b1f8a27904f8d1a65bff69e106e3cc48693ab653daa131c2e956933baf67b87f6edab0e50befbd40c3b3885a21d94c009e5ab4c51a75fb2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382035.exe

      Filesize

      415KB

      MD5

      e6a2ac5b26b1f92decdee62b1178b63f

      SHA1

      b019d47c34df5b8fe0fdbee0b91019d6fd23cc7c

      SHA256

      3a24fef643e954e23fde828fbde15dd91addbe6b03477078b4feaa797211ea3f

      SHA512

      89be9c48268bcef8e71d8d8f9bd2e54b0ea43ddb257eba942010c378481f47f3cd2be0b77695ba11c456c57c191f8e87c18e1ade49a651deaffad165615b18b1

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1596-50-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-86-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-24-0x0000000004D30000-0x0000000004D96000-memory.dmp

      Filesize

      408KB

    • memory/1596-32-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-40-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-88-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-42-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-82-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-80-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-78-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-76-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-38-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-70-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-68-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-66-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-64-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-62-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-60-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-58-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-54-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-44-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-22-0x0000000002720000-0x0000000002786000-memory.dmp

      Filesize

      408KB

    • memory/1596-48-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-46-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-52-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-23-0x0000000004DD0000-0x0000000005374000-memory.dmp

      Filesize

      5.6MB

    • memory/1596-74-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-36-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-34-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-30-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-28-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-84-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-72-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-56-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-26-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-25-0x0000000004D30000-0x0000000004D8F000-memory.dmp

      Filesize

      380KB

    • memory/1596-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/4760-14-0x00007FFFA5963000-0x00007FFFA5965000-memory.dmp

      Filesize

      8KB

    • memory/4760-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp

      Filesize

      40KB

    • memory/4760-16-0x00007FFFA5963000-0x00007FFFA5965000-memory.dmp

      Filesize

      8KB

    • memory/4804-2118-0x0000000000FC0000-0x0000000000FF0000-memory.dmp

      Filesize

      192KB

    • memory/4804-2119-0x00000000057E0000-0x00000000057E6000-memory.dmp

      Filesize

      24KB

    • memory/4804-2120-0x0000000005F20000-0x0000000006538000-memory.dmp

      Filesize

      6.1MB

    • memory/4804-2121-0x0000000005A10000-0x0000000005B1A000-memory.dmp

      Filesize

      1.0MB

    • memory/4804-2122-0x0000000005940000-0x0000000005952000-memory.dmp

      Filesize

      72KB

    • memory/4804-2123-0x00000000059A0000-0x00000000059DC000-memory.dmp

      Filesize

      240KB

    • memory/4804-2124-0x0000000005B20000-0x0000000005B6C000-memory.dmp

      Filesize

      304KB

    • memory/4936-2129-0x0000000000410000-0x000000000043E000-memory.dmp

      Filesize

      184KB

    • memory/4936-2130-0x0000000004BF0000-0x0000000004BF6000-memory.dmp

      Filesize

      24KB