Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 02:16

General

  • Target

    b9111378abf5d1a5e8bc6b042fd428705e32808e68f8cd867e9cafca4f27c23c.exe

  • Size

    925KB

  • MD5

    d75390e0a1e3a329e3c3b3a87a5a010f

  • SHA1

    7d1abf91ad6acc847e7c38a8a5361e2a34cf0d05

  • SHA256

    b9111378abf5d1a5e8bc6b042fd428705e32808e68f8cd867e9cafca4f27c23c

  • SHA512

    7dca543103dd03ad9b9356ffa1ce8e985e1b8311d0a647d76b2592ea94022c2cf00dc863e0deff2bfb4a2e5001dce17309541788f7d513a5fa25ae5311cabce3

  • SSDEEP

    24576:WyrlipPo7kWWw+AkTWGIJhbcZfJylMbuu:lxcWHWhrIfbcZWqu

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9111378abf5d1a5e8bc6b042fd428705e32808e68f8cd867e9cafca4f27c23c.exe
    "C:\Users\Admin\AppData\Local\Temp\b9111378abf5d1a5e8bc6b042fd428705e32808e68f8cd867e9cafca4f27c23c.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilN5217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilN5217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPB6047.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPB6047.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it038811.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it038811.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr716502.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr716502.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4432
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 1372
            5⤵
            • Program crash
            PID:5504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420450.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420450.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2716
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3988 -ip 3988
    1⤵
      PID:6060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilN5217.exe

      Filesize

      661KB

      MD5

      e34f1c6fed8076d84bb550762dea7a03

      SHA1

      ba497bd6837ac0dd6d4696d2810f888ce91a07bd

      SHA256

      d117d629f075853c7dc16269a2911dd1bf31638a85c1f77938b32853bc578a74

      SHA512

      9d24c87cb46f51ef760623b6fb3a336781e31d722e859dcb3d32c7d315481aeb5ed34585ab344157ab8933985f51ed8e54747615d43e04ac6f3814f306813843

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp420450.exe

      Filesize

      168KB

      MD5

      2ceb135340c28a05f8fe494a533ad58a

      SHA1

      dd3eed5c35a3cdeba06828cc30f66ab0d4aa01fe

      SHA256

      157b402225b58825bc93b4cbc02eea7b41679b8f608f156ed37a373803af8ba9

      SHA512

      38a280bd882927079bf746326fe872d8f9e7b0f8d0a3816c8b0b0522ea7ee780f3a958cbf61c9d82ec02aec650c9112c9eea1a8e75622eb7e24ba74afc992924

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziPB6047.exe

      Filesize

      507KB

      MD5

      216d3cda5963f0f6034b85180cfbe485

      SHA1

      96d535fc63235ece1e60b2ea16a53b85f4f3fc61

      SHA256

      40e356284ecc2ab0effbb7088b074b4166b14d92ee0e7fbff77d926d0cc813f0

      SHA512

      02de0bd52db630e0a51da0bb61b83c128dfcfcb809aec211b76bdc7f9ae4ba69f9f49d93999fee0e5456d9f71145bdb70a7305ac27f45b62af5a34b7344ba41f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it038811.exe

      Filesize

      15KB

      MD5

      af555d7264bd7e5650fa09606f3439ae

      SHA1

      9fff1442e79131b05ac1beb2ebb629db260e3d6c

      SHA256

      9282f5fe1844ccef6af89dfac4a7102000c495619399f09193d13dab7e3a63de

      SHA512

      e0f75bdc9e629f8e96d7c996236fb776c3cafc63868de91d6388a485cca682fa9cf25bf9bda480049a328ed23ccf1e2dda84a5e487c53e17f37c4acd524181e0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr716502.exe

      Filesize

      426KB

      MD5

      cce62b52ed95d8717c6d2886f4d813ba

      SHA1

      c36e1b7457b6fd0c357b3f4fceb6172b9e1a04f3

      SHA256

      8b6d29be32731ffb0e58d0ee2a21957e5a923578933b3f51f60f4c57afab64c3

      SHA512

      da1e022c4c336317f5e8bd36fd1d593de1bf227216afd8f9aef75f82a4a889f9a6ffc1c7cfa32aa3d2dd1d28f9e83514dfd9542699f99875ec18b8571087d068

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1408-21-0x00007FFB48CE3000-0x00007FFB48CE5000-memory.dmp

      Filesize

      8KB

    • memory/1408-22-0x0000000000990000-0x000000000099A000-memory.dmp

      Filesize

      40KB

    • memory/2716-2136-0x0000000002B70000-0x0000000002B76000-memory.dmp

      Filesize

      24KB

    • memory/2716-2135-0x0000000000920000-0x000000000094E000-memory.dmp

      Filesize

      184KB

    • memory/3988-50-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-94-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-86-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-82-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-80-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-78-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-76-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-74-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-70-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-68-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-2111-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/3988-66-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-64-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-90-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-29-0x0000000004D30000-0x00000000052D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3988-31-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-32-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-60-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-34-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-72-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-36-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-88-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-92-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-30-0x0000000005320000-0x0000000005386000-memory.dmp

      Filesize

      408KB

    • memory/3988-62-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-58-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-56-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-54-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-52-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-28-0x0000000004CC0000-0x0000000004D26000-memory.dmp

      Filesize

      408KB

    • memory/3988-48-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-46-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-44-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-42-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-40-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-38-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/3988-84-0x0000000005320000-0x000000000537F000-memory.dmp

      Filesize

      380KB

    • memory/4432-2130-0x00000000052F0000-0x000000000533C000-memory.dmp

      Filesize

      304KB

    • memory/4432-2129-0x00000000052B0000-0x00000000052EC000-memory.dmp

      Filesize

      240KB

    • memory/4432-2128-0x0000000005210000-0x0000000005222000-memory.dmp

      Filesize

      72KB

    • memory/4432-2127-0x0000000005380000-0x000000000548A000-memory.dmp

      Filesize

      1.0MB

    • memory/4432-2126-0x0000000005890000-0x0000000005EA8000-memory.dmp

      Filesize

      6.1MB

    • memory/4432-2125-0x00000000051C0000-0x00000000051C6000-memory.dmp

      Filesize

      24KB

    • memory/4432-2124-0x00000000008A0000-0x00000000008D0000-memory.dmp

      Filesize

      192KB