Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 08:16

General

  • Target

    4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe

  • Size

    651KB

  • MD5

    b4f5315a18d1130ba8f937225117796d

  • SHA1

    22282f3b258872a0d9ed8d00d3e2f328778f3536

  • SHA256

    4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48

  • SHA512

    760485721f242932c41f96334d1af0322011560c19b015d9eb99976339b1b1fa654a7a51e7ee7ffd35a58de989ca36661da2d9e799974a3c8485fd978c51936d

  • SSDEEP

    12288:GMrny906UBiU/MtRu3fpgG/qKr89q61eTzT4F:pyI0etiGjAqGyf4F

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe
    "C:\Users\Admin\AppData\Local\Temp\4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb9679.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb9679.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku523953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku523953.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1460
          4⤵
          • Program crash
          PID:536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3928
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4460 -ip 4460
    1⤵
      PID:4604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exe

      Filesize

      168KB

      MD5

      042ec369a7cacd1f76d53d69474094ee

      SHA1

      34868e8a424bd60c3279126c0ff47d0a68e9f88e

      SHA256

      865013bf121dc92d74dee9119b3bdbbc01414ef4702886a62610b8205f0cfc5c

      SHA512

      ecbe2805679de534812592d2f0614c2dd3c7fc20196aebb468a40adfda43f5fbf0743449ad62b59232d0092cfe6c4134e3072b039c7272b20d361754f9559282

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb9679.exe

      Filesize

      497KB

      MD5

      2a74752296fd8fc38cf426a344799d80

      SHA1

      d18a9a5b09eda85bc8af4865b4dbba56fad38fcc

      SHA256

      99f94d6ef2c61d0cf0f156072e24620d340c937ee34efe4da419fd3ea394111f

      SHA512

      beb5177a82ad97e3d3ffbf7427c3331c3810372db9e83ab7303bc42533b88794c7cc815b9de0687b39f49c7da45ce2d7b6176ea1c7fbc5a4011f9692065c8486

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exe

      Filesize

      11KB

      MD5

      5d32b9be063ad2f8be909fd2f0afd612

      SHA1

      9dd527759e797077f87d545e75f268143f9ab10d

      SHA256

      ef0dc9e17565777cc45d4cc38bfc6f2018fbec8ea41a611c6f92510e3b9336fe

      SHA512

      af802148afdc5b6339c07458913f46c507d0f4eebbcbf91ebbebf794c24e87932add325849ed54719d69920cc3021d948672efc8372a106fa0240c8e00a87d4f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku523953.exe

      Filesize

      415KB

      MD5

      30ad912e0e63b4041e6c0f096577907e

      SHA1

      c4e010f9ec2076b28fda4e46082d94e724b7b1b9

      SHA256

      0242c1766008435d2ef2a7e3d8399a0a74534a7d8624eb203a6ac0b2f51b8580

      SHA512

      71f87faacbddbfb9531698e09792c926695931fcfa7de98c9bb8a34ba4f3281cb02a6b7a09ee6528ffb3fb9a82d4510196224645393d4fbc03b2e716378f6ea3

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1932-14-0x00007FF80EEE3000-0x00007FF80EEE5000-memory.dmp

      Filesize

      8KB

    • memory/1932-15-0x0000000000FA0000-0x0000000000FAA000-memory.dmp

      Filesize

      40KB

    • memory/1932-16-0x00007FF80EEE3000-0x00007FF80EEE5000-memory.dmp

      Filesize

      8KB

    • memory/3928-2129-0x0000000000A80000-0x0000000000AAE000-memory.dmp

      Filesize

      184KB

    • memory/3928-2130-0x0000000001450000-0x0000000001456000-memory.dmp

      Filesize

      24KB

    • memory/4460-64-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-54-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-24-0x0000000005300000-0x0000000005366000-memory.dmp

      Filesize

      408KB

    • memory/4460-25-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-28-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-88-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-86-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-84-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-82-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-80-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-78-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-76-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-74-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-72-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-70-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-68-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-22-0x0000000004BC0000-0x0000000004C26000-memory.dmp

      Filesize

      408KB

    • memory/4460-62-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-60-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-58-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-56-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-23-0x0000000004D50000-0x00000000052F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4460-52-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-50-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-48-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-46-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-44-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-42-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-40-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-38-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-34-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-32-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-30-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-26-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-66-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-36-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/4460-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/4672-2118-0x0000000000490000-0x00000000004C0000-memory.dmp

      Filesize

      192KB

    • memory/4672-2119-0x0000000000E50000-0x0000000000E56000-memory.dmp

      Filesize

      24KB

    • memory/4672-2120-0x0000000005430000-0x0000000005A48000-memory.dmp

      Filesize

      6.1MB

    • memory/4672-2121-0x0000000004F20000-0x000000000502A000-memory.dmp

      Filesize

      1.0MB

    • memory/4672-2122-0x0000000004E10000-0x0000000004E22000-memory.dmp

      Filesize

      72KB

    • memory/4672-2123-0x0000000004E70000-0x0000000004EAC000-memory.dmp

      Filesize

      240KB

    • memory/4672-2124-0x0000000004EC0000-0x0000000004F0C000-memory.dmp

      Filesize

      304KB