Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 11:13

General

  • Target

    a19ce732fd099ed0d9f47de7c4c437da6f3a5e0acfdf1ac0cd13f32805aa2e11.exe

  • Size

    661KB

  • MD5

    7810df5b9a4ffb2f2f7eac1f35d7cc92

  • SHA1

    96415a8a48e15c3dc85846fd0a80a83c6150e637

  • SHA256

    a19ce732fd099ed0d9f47de7c4c437da6f3a5e0acfdf1ac0cd13f32805aa2e11

  • SHA512

    7a87032032725f102c28c9f7b8e6694a4ed2432c1bc59a682155f0b09dfd3638bfdf59f022facd1ac3cbd762bd37a67596ed207e744e74e07bcc0a2201354004

  • SSDEEP

    12288:jMr3y90q9aBm6JsRtHOYe0xZvjBf6Dy6FYz+2LvSzcw38cWGSm:syY2de0xZvjBA2C2LvEVM8Sm

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19ce732fd099ed0d9f47de7c4c437da6f3a5e0acfdf1ac0cd13f32805aa2e11.exe
    "C:\Users\Admin\AppData\Local\Temp\a19ce732fd099ed0d9f47de7c4c437da6f3a5e0acfdf1ac0cd13f32805aa2e11.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihE7986.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihE7986.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154215.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154215.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku677160.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku677160.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 1484
          4⤵
          • Program crash
          PID:4180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr924867.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr924867.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3400 -ip 3400
    1⤵
      PID:5392
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:5872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr924867.exe

      Filesize

      168KB

      MD5

      473911ffe0a7faaf9292b7b2b8d7cd32

      SHA1

      9e874ba081ac07d6fe34cba499a1d8d829b079e9

      SHA256

      905dcf52971993727b02839f15a712c5045e07a51cf52ac28c0da35545cb7341

      SHA512

      182bd922fa9309080188008c0505069e6b8051067c7d09de0c2d03b71ee6e9c2832607402a162ddb5837849dff93b10a132b59a9e9b77ca5919c38274da268a0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihE7986.exe

      Filesize

      507KB

      MD5

      f1ce7b1b91e05cfec02ef172c121aa0b

      SHA1

      ec5bd7879c57ea6ababbda94253531adf619ea01

      SHA256

      718b8808caa21eb25906ff70abba9a3ae03d54474a861bca0cedaac8aaba6e56

      SHA512

      455fdab218f1ff2cdc302e58eb2eefae94abc75190253197949c13de235279ad268e6f14e78e55ac14f8f4ce7eef9dd846cee852363e459ab28dd1f42e2a2cd4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154215.exe

      Filesize

      11KB

      MD5

      1aca405aa21d6b3c99f1361251230486

      SHA1

      f45d2ba1a2c15f3ba2891cc4d592f92cb2c23946

      SHA256

      8340df43306c56f726628d32ccea82595e457c0139e3c58e958c15d4a808a23a

      SHA512

      292192f71940ee64a608ff4d2c47266344da421fbd84dfda12693725a88594cd1cc9149c4190963c6ef2cd91c9d7438bbb2f7752c1c97344ed057c78b0469534

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku677160.exe

      Filesize

      435KB

      MD5

      f74879cb93c6eeab9802e67c48ed9f57

      SHA1

      b70a625a661cf377d1dfe699d85c1359dcdd83d4

      SHA256

      6a5b3e35df594a991f6643a495ced46aa1d5076cd77c663bd92e2fc92a66d8ba

      SHA512

      bc3ba69003e7f6168a449a1d48ca1daeb00aa8aec20bf5761abee72a2bd743103ff358c1c14cff00a2acc997a05cb4a4ebd202330d7afc2d4155f553d4dc110f

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/112-2123-0x0000000005820000-0x000000000586C000-memory.dmp

      Filesize

      304KB

    • memory/112-2118-0x0000000002E00000-0x0000000002E06000-memory.dmp

      Filesize

      24KB

    • memory/112-2117-0x0000000000DD0000-0x0000000000E00000-memory.dmp

      Filesize

      192KB

    • memory/112-2122-0x00000000057E0000-0x000000000581C000-memory.dmp

      Filesize

      240KB

    • memory/112-2121-0x0000000005640000-0x0000000005652000-memory.dmp

      Filesize

      72KB

    • memory/112-2120-0x00000000058F0000-0x00000000059FA000-memory.dmp

      Filesize

      1.0MB

    • memory/112-2119-0x0000000005E00000-0x0000000006418000-memory.dmp

      Filesize

      6.1MB

    • memory/2836-2129-0x00000000014D0000-0x00000000014D6000-memory.dmp

      Filesize

      24KB

    • memory/2836-2128-0x0000000000BD0000-0x0000000000BFE000-memory.dmp

      Filesize

      184KB

    • memory/3400-57-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-39-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-79-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-77-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-75-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-73-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-71-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-69-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-67-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-63-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-61-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-59-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-83-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-55-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-53-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-51-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-47-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-45-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-41-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-81-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-38-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-35-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-33-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-31-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-29-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-27-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-85-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-87-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-43-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-24-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-25-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-23-0x00000000026C0000-0x0000000002726000-memory.dmp

      Filesize

      408KB

    • memory/3400-22-0x0000000004CB0000-0x0000000005254000-memory.dmp

      Filesize

      5.6MB

    • memory/3400-21-0x0000000002650000-0x00000000026B6000-memory.dmp

      Filesize

      408KB

    • memory/3400-65-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-49-0x00000000026C0000-0x000000000271F000-memory.dmp

      Filesize

      380KB

    • memory/3400-2104-0x0000000005400000-0x0000000005432000-memory.dmp

      Filesize

      200KB

    • memory/4336-14-0x00007FF873533000-0x00007FF873535000-memory.dmp

      Filesize

      8KB

    • memory/4336-15-0x00000000003B0000-0x00000000003BA000-memory.dmp

      Filesize

      40KB