Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 08:26

General

  • Target

    59bbc8f9f96c429e4c32b0b595d88a82ff3a85d8ae726b723e8a767ca4489680.exe

  • Size

    1.1MB

  • MD5

    c0cb6cc054185577806bdc02305abe00

  • SHA1

    dc093984c0ee2456dbeca1a2a831a7718e956c43

  • SHA256

    59bbc8f9f96c429e4c32b0b595d88a82ff3a85d8ae726b723e8a767ca4489680

  • SHA512

    1177f9d9556242ce026e99f7861eb2f95aa6b3fd17e58dd533a4c74448db0de3d1e8dd39043bb707d99a0b5eddab95b70bc5fed662a262f91ac4be063f9d10fa

  • SSDEEP

    24576:UyOZGw0N/1AaFkZZ8ZQF31/7n19udyMav+6p/XzgkC:jFbyb8ZW3p719ufaWSvzgk

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59bbc8f9f96c429e4c32b0b595d88a82ff3a85d8ae726b723e8a767ca4489680.exe
    "C:\Users\Admin\AppData\Local\Temp\59bbc8f9f96c429e4c32b0b595d88a82ff3a85d8ae726b723e8a767ca4489680.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un007049.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un007049.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un892799.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un892799.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr194095.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr194095.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4576
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 1084
            5⤵
            • Program crash
            PID:3308
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu943905.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu943905.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:516
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 1496
            5⤵
            • Program crash
            PID:3704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk954095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk954095.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5200
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4576 -ip 4576
    1⤵
      PID:4324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2356 -ip 2356
      1⤵
        PID:540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un007049.exe

        Filesize

        809KB

        MD5

        54c1e112755e5b0e1aa4eb1e967d19f5

        SHA1

        6313de7f7412f64a530b505eb2df91a0f06b6395

        SHA256

        462b9ba12064020d4d13d02b6ae21cc61b4810ae32d2f163c87c0e4763b3a56d

        SHA512

        0bf67b5eda2d5277a47a7d95772add63067fe98f0113411dcf960dde776fa11da26d714ffdf18c90014a6bef6012e66dec10afcffdebb7fa4f7326927892b4c6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk954095.exe

        Filesize

        168KB

        MD5

        c52ebada00a59ec1f651a0e9fbcef2eb

        SHA1

        e1941278df76616f1ca3202ef2a9f99d2592d52f

        SHA256

        35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

        SHA512

        6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un892799.exe

        Filesize

        655KB

        MD5

        00f61f3477deff33d35b02affdf6255c

        SHA1

        06c3cc94fdfbfcffa88ade49df2ce575bacaa58e

        SHA256

        604bbc4f9030d519f92d6f656d4167565609f6a56b8775b09a2134f9b883d69a

        SHA512

        85d2fd1cc2bb02654a92945c7e908263ffe159dfd973ef49d2fc5939efd1dff0b5d19c14710d747cf4403f7e4d45feab57ec5ac43479001ce82362c240cc34c9

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr194095.exe

        Filesize

        254KB

        MD5

        95e6c39b0a48065756fd7bbe5d8a7168

        SHA1

        233faa5ee3bc7603ba09350d3cbc0226c69aa510

        SHA256

        ccc727c92d3c6f9a46229c3e30f4bba63cf3f9eabf6c08a69174e21aa21dce2a

        SHA512

        b5c5dc5c2ab5ef61c93dae03f3422fb89421e316811cf4abe8db769a10da7eaf60c2a69d55a75a0cc6b5a690da253c3d24401a1b2bfc14190d1df9fc08c26f24

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu943905.exe

        Filesize

        438KB

        MD5

        38378440401179d9e277ad494a4f4eeb

        SHA1

        144eb4a952172596bf7c72fa97ce8871078bf660

        SHA256

        0eeb3422962f4117f296317d4bf18e916483d2ce546f6a3ac0200b0da1de1e9d

        SHA512

        67f76e50f9848eb3950439a4bd05dad780eb0c406476af7001953e6354a5cb7699f89bb08acea401ef5df4734d15a36401013c4cfd295c8ffdcb5d746c067405

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        03728fed675bcde5256342183b1d6f27

        SHA1

        d13eace7d3d92f93756504b274777cc269b222a2

        SHA256

        f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

        SHA512

        6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

      • memory/516-2228-0x0000000005840000-0x0000000005852000-memory.dmp

        Filesize

        72KB

      • memory/516-2227-0x0000000005910000-0x0000000005A1A000-memory.dmp

        Filesize

        1.0MB

      • memory/516-2226-0x0000000005DE0000-0x00000000063F8000-memory.dmp

        Filesize

        6.1MB

      • memory/516-2225-0x0000000007B40000-0x0000000007B46000-memory.dmp

        Filesize

        24KB

      • memory/516-2224-0x0000000000ED0000-0x0000000000EFE000-memory.dmp

        Filesize

        184KB

      • memory/516-2229-0x00000000058A0000-0x00000000058DC000-memory.dmp

        Filesize

        240KB

      • memory/516-2230-0x0000000005A20000-0x0000000005A6C000-memory.dmp

        Filesize

        304KB

      • memory/2356-80-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-70-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-2211-0x0000000005410000-0x0000000005442000-memory.dmp

        Filesize

        200KB

      • memory/2356-72-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-74-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-84-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-78-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-82-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-86-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-88-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-90-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-92-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-94-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-96-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-98-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-100-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-102-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-76-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/2356-67-0x00000000022A0000-0x0000000002308000-memory.dmp

        Filesize

        416KB

      • memory/2356-68-0x00000000025B0000-0x0000000002616000-memory.dmp

        Filesize

        408KB

      • memory/2356-69-0x00000000025B0000-0x0000000002610000-memory.dmp

        Filesize

        384KB

      • memory/4576-39-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-58-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4576-47-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-59-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4576-41-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-57-0x00000000005E0000-0x000000000060D000-memory.dmp

        Filesize

        180KB

      • memory/4576-56-0x00000000006C0000-0x00000000007C0000-memory.dmp

        Filesize

        1024KB

      • memory/4576-28-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-30-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-31-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-33-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-45-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-35-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-38-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-61-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/4576-62-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4576-49-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-44-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-52-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-53-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-55-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/4576-27-0x0000000004A40000-0x0000000004A58000-memory.dmp

        Filesize

        96KB

      • memory/4576-26-0x0000000004A90000-0x0000000005034000-memory.dmp

        Filesize

        5.6MB

      • memory/4576-25-0x0000000002560000-0x000000000257A000-memory.dmp

        Filesize

        104KB

      • memory/4576-24-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4576-23-0x00000000005E0000-0x000000000060D000-memory.dmp

        Filesize

        180KB

      • memory/4576-22-0x00000000006C0000-0x00000000007C0000-memory.dmp

        Filesize

        1024KB

      • memory/5200-2235-0x0000000000C70000-0x0000000000CA0000-memory.dmp

        Filesize

        192KB

      • memory/5200-2236-0x00000000013B0000-0x00000000013B6000-memory.dmp

        Filesize

        24KB