Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 19:12

General

  • Target

    51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407.exe

  • Size

    787KB

  • MD5

    d06434798b582fad8997bc1b8332e4e1

  • SHA1

    3972deb0e8fcb2932cb3cf960f51623e13298980

  • SHA256

    51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407

  • SHA512

    28c5ccba1c310c861f443af2628a72d8f6f5ed077bff7d1263c37c09c4af24c297f9ff19f1a775dbcd4776a60e3dac069d4e1318631267af8bcbcd630776f7b1

  • SSDEEP

    24576:pyua5SM6JtyFIJyzIgtib3Di4cGcdNST:c75qgIyzIy0vcGgNS

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407.exe
    "C:\Users\Admin\AppData\Local\Temp\51ea117c56e35e2862eee6cd11e67d3c40e251a6ca0c39d77c2bd171a3358407.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954449.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954449.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3906.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 1084
          4⤵
          • Program crash
          PID:3796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0687.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0687.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 1384
          4⤵
          • Program crash
          PID:5908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383401.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383401.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:6028
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4560 -ip 4560
    1⤵
      PID:2516
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2916 -ip 2916
      1⤵
        PID:5800
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383401.exe

        Filesize

        168KB

        MD5

        48a1d3656b903b5b0e8c109b94a9a851

        SHA1

        062978c198b8e4af83aac1e4f8a903bc5bb282bf

        SHA256

        9730636e672feffb47327607fe28ce988e10ece3583e2455eb6473d7846850fa

        SHA512

        474fec02362f732e2a38fdaa1e991979cb4eab20ebb679c18def9eeb89f36243a361bb18c4508b94e18e5051779a9bcf50ff4eaecb7ccb82dd748c400c80b3bf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954449.exe

        Filesize

        633KB

        MD5

        7f16ff25b00e5bc44620d3695e7cfa3a

        SHA1

        a33994f57efb8a55fe80cd09ea1d30956fb0526a

        SHA256

        bff7ae5ee8f041b8ae767aafc972e6dae41b077792be26bd6de408155ebec3d3

        SHA512

        4c9fa8710855e728bec8f2e85f2d993de68014d98c81a1c906b48b385ce98ca10bdaa312e44b94765c3cef0033381f57d040cdfd38c1c8cda4aed72b6945e6f4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3906.exe

        Filesize

        230KB

        MD5

        d00dfbc35313b83c76a3e1e0ab054907

        SHA1

        48e6b38a5d6b6a3d24140f538fc65d4ba6f6c4df

        SHA256

        76602f6ca97d26959f385c0974e29b419fc0ccb7c9b8a2dac77f2237af4d8ed7

        SHA512

        fdf58ba2ec9e23e366a7b77894a57f887976c0019c6377cd332f8a7e1242ecbde639562ac05162c8e0532700851cb3f0320d628525952b2fc9c1666f3b923a4e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0687.exe

        Filesize

        414KB

        MD5

        8554abeceaf3b5fa6aed9c40505b18e0

        SHA1

        86c764ce9c5fac78be091ee5927f7f1f254e464a

        SHA256

        fb49cc02102674c4275df47f6903b58e4b1f20e5e8e3e47516b394399d49fd5d

        SHA512

        92274a7679caa956ba001c117d3202614164f5ba3bbee1bd5598faf676d87888f1964279f65a2183c38bc18ad5aafa9c6b3d898e9051c7aa3f7cc48c820e7fc4

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/2916-70-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-61-0x00000000024E0000-0x0000000002546000-memory.dmp

        Filesize

        408KB

      • memory/2916-2143-0x00000000053F0000-0x0000000005422000-memory.dmp

        Filesize

        200KB

      • memory/2916-63-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-64-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-88-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-96-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-68-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-72-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-74-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-76-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-80-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-82-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-84-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-86-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-90-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-92-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-78-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-66-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-94-0x00000000026B0000-0x000000000270F000-memory.dmp

        Filesize

        380KB

      • memory/2916-62-0x00000000026B0000-0x0000000002716000-memory.dmp

        Filesize

        408KB

      • memory/4560-25-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-41-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-18-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4560-52-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-51-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4560-36-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-22-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-47-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-50-0x00000000006C0000-0x00000000007C0000-memory.dmp

        Filesize

        1024KB

      • memory/4560-23-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-19-0x0000000002050000-0x000000000206A000-memory.dmp

        Filesize

        104KB

      • memory/4560-27-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-31-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-33-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-37-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-39-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-55-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4560-43-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-17-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4560-45-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-49-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-29-0x00000000021D0000-0x00000000021E2000-memory.dmp

        Filesize

        72KB

      • memory/4560-21-0x00000000021D0000-0x00000000021E8000-memory.dmp

        Filesize

        96KB

      • memory/4560-20-0x0000000004CC0000-0x0000000005264000-memory.dmp

        Filesize

        5.6MB

      • memory/4560-16-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4560-15-0x00000000006C0000-0x00000000007C0000-memory.dmp

        Filesize

        1024KB

      • memory/5680-2157-0x0000000004BF0000-0x0000000004BF6000-memory.dmp

        Filesize

        24KB

      • memory/5680-2158-0x00000000053B0000-0x00000000059C8000-memory.dmp

        Filesize

        6.1MB

      • memory/5680-2159-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

        Filesize

        1.0MB

      • memory/5680-2160-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/5680-2161-0x0000000004DF0000-0x0000000004E2C000-memory.dmp

        Filesize

        240KB

      • memory/5680-2162-0x0000000004E40000-0x0000000004E8C000-memory.dmp

        Filesize

        304KB

      • memory/5680-2156-0x0000000000420000-0x0000000000450000-memory.dmp

        Filesize

        192KB

      • memory/6028-2167-0x00000000007F0000-0x000000000081E000-memory.dmp

        Filesize

        184KB

      • memory/6028-2168-0x0000000000E90000-0x0000000000E96000-memory.dmp

        Filesize

        24KB