Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 15:32

General

  • Target

    9f08c3c802412a5206f90b4f1c6424819119c264a8959858cf2ddb628aae8996.exe

  • Size

    802KB

  • MD5

    2942451b484c78cac3dfa8efa64c2432

  • SHA1

    725458fd7a00ef1bc7228800dc9043105731abb1

  • SHA256

    9f08c3c802412a5206f90b4f1c6424819119c264a8959858cf2ddb628aae8996

  • SHA512

    7531aa5606c07ec1ce08176db8d3f5b306ee6b05e41a0b7f16cf92fe9f5376b4c8dd088171b582cd7323a2caeeb62c081bab7f2eac5191dfbe9a7e283bf8ed88

  • SSDEEP

    24576:YyEdsxSR/bvc1ECSDHjHshf4ZbjBcFf2iketsp1r:f8sxSRzc1YHQ4VjBAFts

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f08c3c802412a5206f90b4f1c6424819119c264a8959858cf2ddb628aae8996.exe
    "C:\Users\Admin\AppData\Local\Temp\9f08c3c802412a5206f90b4f1c6424819119c264a8959858cf2ddb628aae8996.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un558545.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un558545.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0949.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 1040
          4⤵
          • Program crash
          PID:4584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7759.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7759.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 1384
          4⤵
          • Program crash
          PID:784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716861.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716861.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3844 -ip 3844
    1⤵
      PID:3348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2220 -ip 2220
      1⤵
        PID:4540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716861.exe

        Filesize

        168KB

        MD5

        79ea75e657c048b3c60b7a1f8058f9d2

        SHA1

        de4030089b2bbe9d5a2a69d6f5866965c0d30607

        SHA256

        bd0315e71e81842b92fed3f628b8d780f1eaaa3553c9f71f9067777cfdd2736f

        SHA512

        e5bfa20682d259a885953434260448163535f74d14e740cc86c41b78375d529a8b6e3786bac8a8cb4704f7b7ca418d6cfd78bf91c6a3a42d6e67fd611f114eec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un558545.exe

        Filesize

        648KB

        MD5

        4bfd2ee97ca51d365d84c19b01782047

        SHA1

        5159b6b964d2f58ddee9645ea4135b68b91615ec

        SHA256

        e7889047bb1d3376e2de72ff5e285128f7caaf9af3cc70042de8d1f83fa01204

        SHA512

        750a5e540a411f6da7baa9b57b97bf24e6bb8132e4180624630ad6d8c9d0175513996f53d208e05009617fb18b20d9e57b85a023d29ef2704b71da145793b562

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0949.exe

        Filesize

        252KB

        MD5

        ecce3479d715716b5b0acc01018d571e

        SHA1

        888fc831c1009e5ab9848197c567b1438113fca8

        SHA256

        7d3b9ff043d64b479e3668a34837ddefd05d3b747a76a6dff47f35c889ae6f19

        SHA512

        f1f1905408f65f5a25c61cc06844e7d5aede39b1fa6dac590021f4c93fd9e178283b6e595cb67f0d7d80dce70430378ee0171c8edcee8185eaf2a87512b88065

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7759.exe

        Filesize

        435KB

        MD5

        4b222d171d692a93bbd5d95af0841ae6

        SHA1

        6e9cd41fe8aa181eb3bdc7889b4898c67379c787

        SHA256

        98ecbceee2d40135950fe36082982aeda8ceb8434dd4d961a5e8c032ed1bbaf8

        SHA512

        b93b5d4c432378923654d581a04f0ce74c4565f3f0b186440df1633276933fc8340ad5e79ade9cf9029b4ccf5a65688a28bbc48de4017b68c576f2ef8bceb75e

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1800-2168-0x0000000004FD0000-0x000000000501C000-memory.dmp

        Filesize

        304KB

      • memory/1800-2165-0x0000000004E30000-0x0000000004E6C000-memory.dmp

        Filesize

        240KB

      • memory/1800-2160-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

        Filesize

        72KB

      • memory/1800-2159-0x0000000004EC0000-0x0000000004FCA000-memory.dmp

        Filesize

        1.0MB

      • memory/1800-2158-0x00000000053D0000-0x00000000059E8000-memory.dmp

        Filesize

        6.1MB

      • memory/1800-2157-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

        Filesize

        24KB

      • memory/1800-2156-0x0000000000460000-0x0000000000490000-memory.dmp

        Filesize

        192KB

      • memory/2220-68-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-63-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-2143-0x00000000053F0000-0x0000000005422000-memory.dmp

        Filesize

        200KB

      • memory/2220-64-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-74-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-66-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-70-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-72-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-77-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-82-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-84-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-86-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-88-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-90-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-92-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-94-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-96-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-78-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/2220-61-0x00000000025E0000-0x0000000002646000-memory.dmp

        Filesize

        408KB

      • memory/2220-62-0x0000000004C40000-0x0000000004CA6000-memory.dmp

        Filesize

        408KB

      • memory/2220-80-0x0000000004C40000-0x0000000004C9F000-memory.dmp

        Filesize

        380KB

      • memory/3844-36-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-51-0x0000000000530000-0x000000000055D000-memory.dmp

        Filesize

        180KB

      • memory/3844-45-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3844-37-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-50-0x0000000000730000-0x0000000000830000-memory.dmp

        Filesize

        1024KB

      • memory/3844-22-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-23-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-25-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-27-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-29-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-43-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-47-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-33-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-55-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/3844-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3844-31-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-39-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-49-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-41-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/3844-21-0x00000000024E0000-0x00000000024F8000-memory.dmp

        Filesize

        96KB

      • memory/3844-20-0x0000000004C20000-0x00000000051C4000-memory.dmp

        Filesize

        5.6MB

      • memory/3844-19-0x0000000002380000-0x000000000239A000-memory.dmp

        Filesize

        104KB

      • memory/3844-18-0x0000000000400000-0x00000000004AD000-memory.dmp

        Filesize

        692KB

      • memory/3844-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3844-16-0x0000000000530000-0x000000000055D000-memory.dmp

        Filesize

        180KB

      • memory/3844-15-0x0000000000730000-0x0000000000830000-memory.dmp

        Filesize

        1024KB

      • memory/5212-2167-0x0000000002BC0000-0x0000000002BC6000-memory.dmp

        Filesize

        24KB

      • memory/5212-2166-0x0000000000920000-0x000000000094E000-memory.dmp

        Filesize

        184KB