Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 17:49

General

  • Target

    ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe

  • Size

    787KB

  • MD5

    df8bc5c98a5ddec32c30d426ad7e51c3

  • SHA1

    faca6fc948110a7e5611b2397d3a94129225f765

  • SHA256

    ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8

  • SHA512

    81db0b69618405f212e9cfa6324cfd4719ed412ce1881e9afaf461736c21ad70cb31357d50411b5a329f01e103780371b64bb2e10a6fe1ab06ac4a1c557526bc

  • SSDEEP

    24576:KyeW0OlaVrQquBgu41jdiu8ermgDJUk+N:ReohquCX1jP/mgD

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe
    "C:\Users\Admin\AppData\Local\Temp\ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927407.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927407.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5423.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1084
          4⤵
          • Program crash
          PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0090.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0090.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 1384
          4⤵
          • Program crash
          PID:4580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2036 -ip 2036
    1⤵
      PID:4728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1584 -ip 1584
      1⤵
        PID:5524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exe

        Filesize

        168KB

        MD5

        79ccb3890476dbfc5e8625cf4b6c00f6

        SHA1

        7bd4ab2d2a1f558bd3e866701df8d5abe83db2dd

        SHA256

        35f6285af7160c819e5a9d4b58169df0bea149845c03b3c79b807a3988517dc0

        SHA512

        c22ea642a40dd0ba7ea7ff14cbdc8d033cabacf9b3f4fb3e5472412143016820422744a2f68e72b4dcb9bdd42bcf801ca4ce93e03a687ee89786392111429123

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927407.exe

        Filesize

        633KB

        MD5

        a94a7dfe4021a7785db6f27068761af9

        SHA1

        31d52f245a44ef9ecbd7608d13a5cdfa8ea55f86

        SHA256

        b3294c813153d67f1f387b2a2b6a4c376d5d69223f84ddad8ba807f373f824e3

        SHA512

        2d3c7baa674bb9064e351f9b769f3377d3cdc9e2f6a250e5910fb42703984900838d910c073e7a08f8102b1813fa7e2ef30b546accb4e8c824c7a47008d0dfe9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5423.exe

        Filesize

        231KB

        MD5

        d44bdd2bdda402b0d098f2034712a741

        SHA1

        5df4b978370530676aa2cc0f123f2921359e84b4

        SHA256

        ad587357ddf8f8bb0db0b3af725d883fbefcdb87da12ee298ba2f55cb46c6069

        SHA512

        43a0708bb4291dee35df13fe31f8531332eaac41836d8765dde5fd3f7099cd59135c647ec089d5d547426e14ef110cf0a21286ba5c8371aec306bf7414e22f77

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0090.exe

        Filesize

        414KB

        MD5

        572f3637a437f46c1cac81c0d7792b94

        SHA1

        b4ab03f4fd358ae7e5fc8d63475560760363527b

        SHA256

        31eb57471d9551b99458d8aa3ffe40fc6442629bde07102efd85bcac440a48bc

        SHA512

        ab81d9b93a9a68060efccfc1f2ab0cf8e2a58c12c2d44deda90e1bfe58efa7eeb92ff944fb604076900cd9cae09b3ee01e33ce0e4ec4289c8eb44243bd13b658

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1584-70-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-74-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-62-0x0000000004CB0000-0x0000000004D16000-memory.dmp

        Filesize

        408KB

      • memory/1584-78-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-2143-0x0000000002690000-0x00000000026C2000-memory.dmp

        Filesize

        200KB

      • memory/1584-63-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-96-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-64-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-66-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-68-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-72-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-61-0x0000000002350000-0x00000000023B6000-memory.dmp

        Filesize

        408KB

      • memory/1584-76-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-80-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-84-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-86-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-88-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-90-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-92-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-94-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1584-82-0x0000000004CB0000-0x0000000004D0F000-memory.dmp

        Filesize

        380KB

      • memory/1960-2167-0x0000000000410000-0x000000000043E000-memory.dmp

        Filesize

        184KB

      • memory/1960-2168-0x0000000002580000-0x0000000002586000-memory.dmp

        Filesize

        24KB

      • memory/2036-27-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2036-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2036-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2036-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/2036-51-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/2036-47-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-50-0x00000000004F0000-0x00000000005F0000-memory.dmp

        Filesize

        1024KB

      • memory/2036-23-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-22-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-25-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-19-0x00000000023C0000-0x00000000023DA000-memory.dmp

        Filesize

        104KB

      • memory/2036-29-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-31-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-33-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-37-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-39-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2036-41-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-43-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-45-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-49-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-35-0x0000000004A40000-0x0000000004A52000-memory.dmp

        Filesize

        72KB

      • memory/2036-16-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/2036-20-0x0000000004BD0000-0x0000000005174000-memory.dmp

        Filesize

        5.6MB

      • memory/2036-21-0x0000000004A40000-0x0000000004A58000-memory.dmp

        Filesize

        96KB

      • memory/2036-15-0x00000000004F0000-0x00000000005F0000-memory.dmp

        Filesize

        1024KB

      • memory/5440-2159-0x00000000051D0000-0x00000000052DA000-memory.dmp

        Filesize

        1.0MB

      • memory/5440-2160-0x0000000005100000-0x0000000005112000-memory.dmp

        Filesize

        72KB

      • memory/5440-2161-0x0000000005160000-0x000000000519C000-memory.dmp

        Filesize

        240KB

      • memory/5440-2162-0x00000000052E0000-0x000000000532C000-memory.dmp

        Filesize

        304KB

      • memory/5440-2158-0x00000000056E0000-0x0000000005CF8000-memory.dmp

        Filesize

        6.1MB

      • memory/5440-2157-0x0000000001080000-0x0000000001086000-memory.dmp

        Filesize

        24KB

      • memory/5440-2156-0x0000000000780000-0x00000000007B0000-memory.dmp

        Filesize

        192KB