Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/11/2024, 16:10

General

  • Target

    4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe

  • Size

    661KB

  • MD5

    e9830cbd245f7699210f585703ab2a90

  • SHA1

    1a97c7228e7b90ea4c074fd642ead65ed65441e8

  • SHA256

    4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196

  • SHA512

    7b5c5837cf158ff16221ad5d585169768e0be5f126301496cbf774e0a2ed43ad12d449b976b1ff458077e47044be58374a85af605e3bff6c3ec01e2a47e440c1

  • SSDEEP

    12288:tMr3y90SH5XQo4oyvt9Igti2ulY/rkEhEHqnT8LcEyPyhZpk8o:myv5A4FLgWHHfy6hho

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe
    "C:\Users\Admin\AppData\Local\Temp\4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLP1118.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLP1118.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr926906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr926906.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368169.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1536
          4⤵
          • Program crash
          PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906014.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906014.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2488
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5100 -ip 5100
    1⤵
      PID:960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906014.exe

      Filesize

      169KB

      MD5

      6c86284fca70fd48009b132cadf4d95d

      SHA1

      3d4b74035d0592dc8b163d1b47f4e9d28eb77065

      SHA256

      18dd191f94f2d4b5167cabd01a6fa0503e520d505afddc7cec462b74c545b1f0

      SHA512

      8704b474e8d015b8e7a6ccba6d794c50cbf4a8fddd4f06d38ab1b704fe7a60b171ff6af9f4c5eaabc15ee97b9e8e0910e0a0e8f3bae0c8dd32a5a2fca421ff9c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLP1118.exe

      Filesize

      507KB

      MD5

      8419f26de726b551bdc24468a65c5468

      SHA1

      003fed476b2b525f162ca50f7a37a21fc804a858

      SHA256

      d699eaaaf09870d9da28760fff4f7156760cb515ffeedcc7e3ef25a680de6d83

      SHA512

      99289b1f0f499b3018ea4f8e03e412727eba76388d7a057b926ac42580b60a74ef6d5a2bc572e47b7839048304e472c8ce0722d05e70691092aba2e0c04fdb86

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr926906.exe

      Filesize

      15KB

      MD5

      b77360b9b68b6977d9a61e7861530af9

      SHA1

      74845ec857ef1de7c0296c67c90737077e2588db

      SHA256

      fe41df9ec8d02e205e013a4ca7117885ef049199a584ec7c249e856aeceb53c7

      SHA512

      e44816c3e570d5e446f8fef0710c77b8f4837d6b543d75c2a6b561c1613d17d00b539959b421f7c5702a855540d6d4f89e0c68a772c4c8837ad53022d67a6054

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368169.exe

      Filesize

      426KB

      MD5

      dd10c790024e5ce0b7bf1df123554482

      SHA1

      f7e90adc73a20f7ceed789e31526d11f7e1c2816

      SHA256

      cad3a6fc7e18354ed12f55355ba4ac1d91882f183bec5d14bdf43a14e0dafaa0

      SHA512

      18da3815f84bccc607a7939eb070ca7803e1c54c81cb282726bb485bd9af77aa7265532483ba41295152a1b7d2dc99bc97938ecb88d33b3b1b65275e292c37a1

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/228-2118-0x00000000006F0000-0x0000000000720000-memory.dmp

      Filesize

      192KB

    • memory/228-2120-0x0000000005630000-0x0000000005C48000-memory.dmp

      Filesize

      6.1MB

    • memory/228-2119-0x0000000000F50000-0x0000000000F56000-memory.dmp

      Filesize

      24KB

    • memory/228-2124-0x0000000005240000-0x000000000528C000-memory.dmp

      Filesize

      304KB

    • memory/228-2123-0x00000000050C0000-0x00000000050FC000-memory.dmp

      Filesize

      240KB

    • memory/228-2121-0x0000000005130000-0x000000000523A000-memory.dmp

      Filesize

      1.0MB

    • memory/228-2122-0x0000000005060000-0x0000000005072000-memory.dmp

      Filesize

      72KB

    • memory/2488-2130-0x0000000000AD0000-0x0000000000AD6000-memory.dmp

      Filesize

      24KB

    • memory/2488-2129-0x00000000001F0000-0x000000000021E000-memory.dmp

      Filesize

      184KB

    • memory/4808-15-0x0000000000270000-0x000000000027A000-memory.dmp

      Filesize

      40KB

    • memory/4808-14-0x00007FFB27603000-0x00007FFB27605000-memory.dmp

      Filesize

      8KB

    • memory/4808-16-0x00007FFB27603000-0x00007FFB27605000-memory.dmp

      Filesize

      8KB

    • memory/5100-64-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-40-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-80-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-76-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-74-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-72-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-70-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-68-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-66-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-84-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-62-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-58-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-56-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-54-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-52-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-50-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-49-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-47-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-42-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-82-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-38-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-36-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-34-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-30-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-28-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-78-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-86-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-88-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-44-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-32-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-24-0x0000000005310000-0x0000000005376000-memory.dmp

      Filesize

      408KB

    • memory/5100-23-0x0000000004D60000-0x0000000005304000-memory.dmp

      Filesize

      5.6MB

    • memory/5100-22-0x0000000004C90000-0x0000000004CF6000-memory.dmp

      Filesize

      408KB

    • memory/5100-60-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-26-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-25-0x0000000005310000-0x000000000536F000-memory.dmp

      Filesize

      380KB

    • memory/5100-2105-0x0000000005530000-0x0000000005562000-memory.dmp

      Filesize

      200KB