Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 06:12

General

  • Target

    80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe

  • Size

    684KB

  • MD5

    d065c06a9fa94b444bcd92d2fdb7e47a

  • SHA1

    5d7ca4a5c262363054563d81f85564609a972770

  • SHA256

    80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050

  • SHA512

    a5432eb8a00c5817ca4dea5211fffc0bf240a41ca9a15a8d3ab398006f9c790a161f0e6f8fbc6dc4c697711fbe50ceb4ab773629a8914d4b1a5c77deb925030f

  • SSDEEP

    12288:lMrwy90Av8/tlQasqS+QuW5ikBg2ziNS5WtprSdYadytzdB8fdbRA:dytvQlu+Y5ikG2+eWOXytJBidbq

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe
    "C:\Users\Admin\AppData\Local\Temp\80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihQ4123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihQ4123.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498136.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4772
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1380
          4⤵
          • Program crash
          PID:5460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5536
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4772 -ip 4772
    1⤵
      PID:5416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exe

      Filesize

      169KB

      MD5

      79403bba257a7d87498be2afb74382d9

      SHA1

      1fa4467f135f0fe6d46a9b0684e802d557d96817

      SHA256

      8fd8bf21ca335ea884781216794db57e33ec537fb7954db738c9042d1fd7538a

      SHA512

      f02a0feecc5186f3a40511ee2d39fca6725015585ebe31e4fd2ea432a76111962f5feb610e78ed93e16f74a87962662ac7cdaec16c45419a74747cefbd76100e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihQ4123.exe

      Filesize

      530KB

      MD5

      651b2a2a2052e90e9045c2542fa4a36b

      SHA1

      6ad403b94173ee085dc3be57f4db2187162d82af

      SHA256

      50ba72cb945753c47a98b8b415906590181357aa74f25a812980eb08691679c3

      SHA512

      8cdbc2fb01529b97b587c2942f09bd919c5552561bb7fbc12e7fc72f9b071cc076c323c5dfda1a45d17efda8f52774b7e53812f9712d88a3b6aca08716470029

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exe

      Filesize

      12KB

      MD5

      60d91f3eac0c7a3d42e4783bdeb025ed

      SHA1

      7ce972b5852094603535d485b2c1c21a61700e7b

      SHA256

      b0bcee6d4c099d77b69d0729d6992d7fd1b6c849e5dba53c8aaffda8d937401f

      SHA512

      5394fde664092500635193d92740d8df445b2d76eedba1c0ca5d322596cc8ffe1249ecf9e7e229a317d13eff74f9e821136d84300ab8d57c88d7db2c26bd87bf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498136.exe

      Filesize

      495KB

      MD5

      5e5599fb9900de1157c3613d85484671

      SHA1

      4f8264d62f92d6d760e2ba4e07d6e2268a9f13bc

      SHA256

      0dbfe5f0a3b2e26b91a1e502db9eabaf8a4f8dc29a6186aa528b34f33f7eff66

      SHA512

      972e0af949c7652a8f7991b0b8f8996db3aa0175f31d8b9d963468ffc506b57316abab1276b660934ea58380bb1bcd43e176872bec98dc2ed75ce05d91f4c621

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1996-14-0x00007FFEFAA83000-0x00007FFEFAA85000-memory.dmp

      Filesize

      8KB

    • memory/1996-15-0x0000000000DC0000-0x0000000000DCA000-memory.dmp

      Filesize

      40KB

    • memory/4772-21-0x0000000002840000-0x00000000028A6000-memory.dmp

      Filesize

      408KB

    • memory/4772-22-0x0000000004FC0000-0x0000000005564000-memory.dmp

      Filesize

      5.6MB

    • memory/4772-23-0x00000000055B0000-0x0000000005616000-memory.dmp

      Filesize

      408KB

    • memory/4772-25-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-24-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-41-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-87-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-85-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-81-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-79-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-77-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-75-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-73-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-71-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-69-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-67-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-65-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-61-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-57-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-55-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-53-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-51-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-49-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-47-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-45-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-39-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-37-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-35-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-33-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-31-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-29-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-27-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-83-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-63-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-59-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-43-0x00000000055B0000-0x000000000560F000-memory.dmp

      Filesize

      380KB

    • memory/4772-2104-0x0000000005780000-0x00000000057B2000-memory.dmp

      Filesize

      200KB

    • memory/5316-2117-0x0000000000930000-0x0000000000960000-memory.dmp

      Filesize

      192KB

    • memory/5316-2118-0x0000000005110000-0x0000000005116000-memory.dmp

      Filesize

      24KB

    • memory/5316-2119-0x00000000058A0000-0x0000000005EB8000-memory.dmp

      Filesize

      6.1MB

    • memory/5316-2120-0x0000000005390000-0x000000000549A000-memory.dmp

      Filesize

      1.0MB

    • memory/5316-2121-0x00000000052B0000-0x00000000052C2000-memory.dmp

      Filesize

      72KB

    • memory/5316-2122-0x0000000005310000-0x000000000534C000-memory.dmp

      Filesize

      240KB

    • memory/5316-2123-0x00000000054A0000-0x00000000054EC000-memory.dmp

      Filesize

      304KB

    • memory/5536-2128-0x0000000000D30000-0x0000000000D5E000-memory.dmp

      Filesize

      184KB

    • memory/5536-2129-0x0000000005550000-0x0000000005556000-memory.dmp

      Filesize

      24KB