Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 04:52

General

  • Target

    8daf533274ff4e2292dee2683b139ea1e71ceb72955d50180d5b601b94cc2224.exe

  • Size

    809KB

  • MD5

    72c2e8dc9f31ba261c6b30bbe1bef86a

  • SHA1

    09d982e2fa2ac0455e1dd4972de2d95bab482141

  • SHA256

    8daf533274ff4e2292dee2683b139ea1e71ceb72955d50180d5b601b94cc2224

  • SHA512

    85045924eb5486030419aa6d2e9769159bee79c8558ed23280f8066ae36c300ed938ff2a16f255d1ad10f0265c138975ab7d270f6676b2c1a4d1544869909033

  • SSDEEP

    12288:tMrPy90AmjidIXx2OJeeRdiyypzsvIAr2cJ3+wQjUQ0MTspL:2yfdIB2UeeWyZD5rQP0MopL

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8daf533274ff4e2292dee2683b139ea1e71ceb72955d50180d5b601b94cc2224.exe
    "C:\Users\Admin\AppData\Local\Temp\8daf533274ff4e2292dee2683b139ea1e71ceb72955d50180d5b601b94cc2224.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731281.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731281.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr790996.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr790996.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 1080
          4⤵
          • Program crash
          PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu924640.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu924640.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 1372
          4⤵
          • Program crash
          PID:3568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si463432.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si463432.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2300
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 228 -ip 228
    1⤵
      PID:2100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1108 -ip 1108
      1⤵
        PID:6080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si463432.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731281.exe

        Filesize

        655KB

        MD5

        02c3e39a5303106c4e05b704b82f9edd

        SHA1

        54c83a8866ac0f864443d7a92310284a76d57c84

        SHA256

        0e1bfdff591f5127815cc1877753bc50a663e89131a672e7e2fd3068df60679d

        SHA512

        6d1f3d9babcfdccb0d53bb11837321caf14d8ad85e0175ea0f5f34c1b46527034dd2dab98fb15c7ce9d2bc0c27b136d11d01d0ea2e24e438fbf4cb2782d4e17e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr790996.exe

        Filesize

        254KB

        MD5

        074fa52c501940c10eac3a96b53eaa1b

        SHA1

        5635d115485fe1b0c119d78cbb544e59dbeef4e2

        SHA256

        74b335e5367218642550c5c78d67a1c8b094dbd8fcd0669594ffec7565be59c2

        SHA512

        752856df5c364a12035f1a43359d9658593603be1661cb0665d7f6c95395881c8d6658e91fd441fda7ad8545393913f20025db5ffc5abc27cabf1901d743c609

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu924640.exe

        Filesize

        438KB

        MD5

        ee1fdef262dcf11fd5347fdd16437438

        SHA1

        96833184e1e9d13d6e2522f78c2e5eec7987ad7e

        SHA256

        02277ecba74c2fc6da00702c6e583dc4fb32e13e9ace98206e422674bfc84bbd

        SHA512

        5bede92d153d5b457e6b655fa7bc2514e45354230ac1999d8cdd17c245a9b2e645a22eaade7aa05fea9f4860a55511663e1e290dc5c62c8b05222cf359e5d2bd

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/228-55-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/228-23-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/228-18-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/228-19-0x0000000002140000-0x000000000215A000-memory.dmp

        Filesize

        104KB

      • memory/228-20-0x0000000004CD0000-0x0000000005274000-memory.dmp

        Filesize

        5.6MB

      • memory/228-15-0x0000000000760000-0x0000000000860000-memory.dmp

        Filesize

        1024KB

      • memory/228-49-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-47-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-45-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-43-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-41-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-39-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-37-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-35-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-33-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-31-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-27-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-25-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-21-0x0000000002330000-0x0000000002348000-memory.dmp

        Filesize

        96KB

      • memory/228-29-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-22-0x0000000002330000-0x0000000002342000-memory.dmp

        Filesize

        72KB

      • memory/228-50-0x0000000000760000-0x0000000000860000-memory.dmp

        Filesize

        1024KB

      • memory/228-51-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/228-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/228-16-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/228-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1108-82-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-96-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-70-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-76-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-78-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-94-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-92-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-90-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-88-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-86-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-80-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-74-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-68-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-62-0x0000000005200000-0x0000000005266000-memory.dmp

        Filesize

        408KB

      • memory/1108-72-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-61-0x0000000002590000-0x00000000025F8000-memory.dmp

        Filesize

        416KB

      • memory/1108-66-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-84-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-64-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-63-0x0000000005200000-0x0000000005260000-memory.dmp

        Filesize

        384KB

      • memory/1108-2205-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/2300-2229-0x0000000000E70000-0x0000000000EA0000-memory.dmp

        Filesize

        192KB

      • memory/2300-2230-0x0000000003080000-0x0000000003086000-memory.dmp

        Filesize

        24KB

      • memory/5928-2218-0x0000000000130000-0x000000000015E000-memory.dmp

        Filesize

        184KB

      • memory/5928-2219-0x00000000024C0000-0x00000000024C6000-memory.dmp

        Filesize

        24KB

      • memory/5928-2220-0x00000000050D0000-0x00000000056E8000-memory.dmp

        Filesize

        6.1MB

      • memory/5928-2221-0x0000000004BC0000-0x0000000004CCA000-memory.dmp

        Filesize

        1.0MB

      • memory/5928-2222-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

        Filesize

        72KB

      • memory/5928-2223-0x0000000004B10000-0x0000000004B4C000-memory.dmp

        Filesize

        240KB

      • memory/5928-2224-0x0000000004B60000-0x0000000004BAC000-memory.dmp

        Filesize

        304KB