Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 15:52

General

  • Target

    b84686bbb85a6930979f05bb111cff93234a2824073a79514b89b2860368c3c1.exe

  • Size

    789KB

  • MD5

    9c8a7459d12e49bbdc43f9ef09293865

  • SHA1

    a906f90aabf7e86676f6c5ae5d81d387504c2fa0

  • SHA256

    b84686bbb85a6930979f05bb111cff93234a2824073a79514b89b2860368c3c1

  • SHA512

    5aa6e4ee72c7088756f294c039d158b0bd01d25d4d92778c0d304440a485d4242e30535421c32bccd9ddddbd3373791079b996d1330c9939f4023244d4bc2819

  • SSDEEP

    12288:zMrAy901fbkiBOHqsaVr073ORhEBgVBTLAOviejmqPsMzQ56mHdI:vyrHqkyRhEurPXUwadI

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b84686bbb85a6930979f05bb111cff93234a2824073a79514b89b2860368c3c1.exe
    "C:\Users\Admin\AppData\Local\Temp\b84686bbb85a6930979f05bb111cff93234a2824073a79514b89b2860368c3c1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759301.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759301.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2626.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1080
          4⤵
          • Program crash
          PID:2924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3008.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3008.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 1452
          4⤵
          • Program crash
          PID:2352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si230811.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si230811.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1952 -ip 1952
    1⤵
      PID:244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2440 -ip 2440
      1⤵
        PID:2452

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si230811.exe

        Filesize

        169KB

        MD5

        027fdcd4e6122e0d4209a34b958cfdb2

        SHA1

        b3e93f9f542a9331aa6f889653f534d88e0593c4

        SHA256

        43ea08565e2f6fa593a0fe6e3476d0039f799566f6b26a27bed68854dbe691d4

        SHA512

        f93fafdf5c7492c39b875f0d911da49186f20a22453e3c89df2bdaed3681d6dc4b1266fa973db6f4dda9c297c9b909f736edaaa801ad18dda306668f8fddda1a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759301.exe

        Filesize

        635KB

        MD5

        99f6bf0f395e9510d95b7aff8f3d206f

        SHA1

        401dd599b1d5ce03678a1281c67f3b8edf1ebe3a

        SHA256

        b814f7478481933bb48827f1c41e12dc11c882f39efb0eb37c613327daee37ac

        SHA512

        9ae1a783ba3e28d8e1d4a85ede771c68c4c6b68ccf60f84c9e136dabb5ac8f3d2be4f1bbbf1e10a28afa1abc3cb0c75c8d8775eafe3095964bce14746e5a47fd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2626.exe

        Filesize

        233KB

        MD5

        731143f6f3cd1d6b1285fb833c736208

        SHA1

        2f8f26aebfa3add8d95a199f24aace88e2608626

        SHA256

        ae4fa50da3d9d6e6fa160dd92c59a4d7109ab86e41d50eb102c42611bb6b9052

        SHA512

        ff9cd93653bcb5930502c4a3e2fef44261083f7198dd6c1a3f268e77938d572a67bfcb69daeaf3d91d2220c5a50ee595ae96dcd28b45f7df6246c135a95feb0b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3008.exe

        Filesize

        417KB

        MD5

        384f347f091ac5073db1cf7b81e29725

        SHA1

        0f324be49a6b0bc42b25408cddb3d0c4f86c2fbe

        SHA256

        9690f4cbe679320d49139eac0a9515067c730f37eab92481a45f3ef343a5e02c

        SHA512

        32cad79ed72d89f8720dfa690d845718ffb0a53a5d295443c55e6f20c7a84571993e789c5e6b297d133799b05977bd1f097e844c13a3050b8159680577bc2786

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1404-2156-0x00000000001C0000-0x00000000001F0000-memory.dmp

        Filesize

        192KB

      • memory/1404-2157-0x00000000049E0000-0x00000000049E6000-memory.dmp

        Filesize

        24KB

      • memory/1404-2158-0x00000000051A0000-0x00000000057B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1404-2167-0x0000000004C00000-0x0000000004C4C000-memory.dmp

        Filesize

        304KB

      • memory/1404-2162-0x0000000004BC0000-0x0000000004BFC000-memory.dmp

        Filesize

        240KB

      • memory/1404-2160-0x0000000004A30000-0x0000000004A42000-memory.dmp

        Filesize

        72KB

      • memory/1404-2159-0x0000000004C90000-0x0000000004D9A000-memory.dmp

        Filesize

        1.0MB

      • memory/1952-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/1952-29-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-22-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-47-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-45-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-44-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-41-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-49-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-39-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-37-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-35-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-33-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-32-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-19-0x00000000025B0000-0x00000000025CA000-memory.dmp

        Filesize

        104KB

      • memory/1952-27-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-25-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-23-0x0000000002630000-0x0000000002642000-memory.dmp

        Filesize

        72KB

      • memory/1952-50-0x0000000000710000-0x0000000000810000-memory.dmp

        Filesize

        1024KB

      • memory/1952-20-0x0000000004D30000-0x00000000052D4000-memory.dmp

        Filesize

        5.6MB

      • memory/1952-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1952-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/1952-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1952-15-0x0000000000710000-0x0000000000810000-memory.dmp

        Filesize

        1024KB

      • memory/1952-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/1952-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1952-21-0x0000000002630000-0x0000000002648000-memory.dmp

        Filesize

        96KB

      • memory/1952-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2440-84-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-68-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-90-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-89-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-86-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-82-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-80-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-78-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-74-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-72-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-71-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-93-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-94-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-96-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-76-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-62-0x00000000051C0000-0x0000000005226000-memory.dmp

        Filesize

        408KB

      • memory/2440-66-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-64-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-63-0x00000000051C0000-0x000000000521F000-memory.dmp

        Filesize

        380KB

      • memory/2440-2143-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2440-61-0x0000000004B60000-0x0000000004BC6000-memory.dmp

        Filesize

        408KB

      • memory/5232-2166-0x0000000000AB0000-0x0000000000ADE000-memory.dmp

        Filesize

        184KB

      • memory/5232-2168-0x0000000001270000-0x0000000001276000-memory.dmp

        Filesize

        24KB