Analysis

  • max time kernel
    95s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/11/2024, 23:05

General

  • Target

    f032d3b099fb8e947ee7b698069180081246911227d28101c578cc5d89401161N.exe

  • Size

    644KB

  • MD5

    1a4461cc7a464ccb9605fb8596258129

  • SHA1

    1df484a746f05429a164dfd41cfa0fd041667510

  • SHA256

    d7e173042f24c9e44b5bb24a1d969def8d43efa09be30aed32e1461f094cc32d

  • SHA512

    77b5e9e6e838d42a4b1ef5d3c0557679a226e0b725c6e4683f6b0c68690135ad1c1934ab949d55d63139f0f4dbee1fa6d49ed2c42c0a1a2d7d3b5c65a8458c45

  • SSDEEP

    12288:JMrNy9098v8kPanzxUjMDBL9ujH+CmUSjrtYcwpYIJEPmzhRko/N6:gyPazfBL9oH+CmUSjR0EPGao/N6

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f032d3b099fb8e947ee7b698069180081246911227d28101c578cc5d89401161N.exe
    "C:\Users\Admin\AppData\Local\Temp\f032d3b099fb8e947ee7b698069180081246911227d28101c578cc5d89401161N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr972983.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr972983.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1080
        3⤵
        • Program crash
        PID:2012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu646904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu646904.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\Temp\1.exe
        "C:\Windows\Temp\1.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 1376
        3⤵
        • Program crash
        PID:2660
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4724 -ip 4724
    1⤵
      PID:1776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1176 -ip 1176
      1⤵
        PID:1420

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pr972983.exe

        Filesize

        243KB

        MD5

        18c181757ebb61a97ad3d08b0a9c740b

        SHA1

        6d913c49628f0ea5e1d6da73a0fbeaf5d55c134b

        SHA256

        be74f15a0a4ddda3781c66aa1d344e65c6e554f69af3716c97ca4ad51e2c435a

        SHA512

        c1437e4fe5158c2770a6c2fca152ae8e6ad581799224f23f3c8ac41f62fa020305b65b0a91353cf28cdf7b94e6643dc0224f684fa2a4a61a093ef6dc9e675ad8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu646904.exe

        Filesize

        426KB

        MD5

        88dbb359b42a8d73d57f371f73a0ac43

        SHA1

        4ed4a64e0ee8680260204aa0369d95fa3115d50a

        SHA256

        78cd18de06d606e05cbd8f073e427efbc7785a09b9d13728681d09c28e2fe94e

        SHA512

        b94964d3cb2dc3a49be8da940188bd88408b344e90ff49c5334e74f1fc68b401a00eb1d0aa039eb8e6b62668f5d64503bd8ff052319f3ea09942d68e93744db8

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1176-72-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-66-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-2158-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/1176-2139-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/1176-59-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-90-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-62-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-64-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-57-0x0000000004B20000-0x0000000004B86000-memory.dmp

        Filesize

        408KB

      • memory/1176-58-0x00000000051B0000-0x0000000005216000-memory.dmp

        Filesize

        408KB

      • memory/1176-74-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-56-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/1176-78-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-80-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-82-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-84-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-86-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-88-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-92-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-68-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-60-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-70-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-76-0x00000000051B0000-0x000000000520F000-memory.dmp

        Filesize

        380KB

      • memory/1176-55-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/1176-54-0x0000000000400000-0x00000000004D8000-memory.dmp

        Filesize

        864KB

      • memory/4724-36-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-9-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/4724-48-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4724-11-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4724-45-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4724-44-0x00000000004B0000-0x00000000004DD000-memory.dmp

        Filesize

        180KB

      • memory/4724-43-0x00000000005B0000-0x00000000006B0000-memory.dmp

        Filesize

        1024KB

      • memory/4724-16-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-18-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-22-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-38-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-26-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-28-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-30-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-32-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-10-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4724-49-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4724-34-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-24-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-40-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-42-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-20-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-15-0x00000000021B0000-0x00000000021C2000-memory.dmp

        Filesize

        72KB

      • memory/4724-14-0x00000000021B0000-0x00000000021C8000-memory.dmp

        Filesize

        96KB

      • memory/4724-13-0x0000000004C40000-0x00000000051E4000-memory.dmp

        Filesize

        5.6MB

      • memory/4724-8-0x00000000005B0000-0x00000000006B0000-memory.dmp

        Filesize

        1024KB

      • memory/4724-12-0x0000000002110000-0x000000000212A000-memory.dmp

        Filesize

        104KB

      • memory/5096-2153-0x0000000002C60000-0x0000000002C66000-memory.dmp

        Filesize

        24KB

      • memory/5096-2154-0x0000000005AE0000-0x00000000060F8000-memory.dmp

        Filesize

        6.1MB

      • memory/5096-2155-0x00000000055D0000-0x00000000056DA000-memory.dmp

        Filesize

        1.0MB

      • memory/5096-2156-0x0000000005380000-0x0000000005392000-memory.dmp

        Filesize

        72KB

      • memory/5096-2152-0x0000000000B10000-0x0000000000B40000-memory.dmp

        Filesize

        192KB

      • memory/5096-2159-0x0000000005500000-0x000000000553C000-memory.dmp

        Filesize

        240KB

      • memory/5096-2160-0x0000000005540000-0x000000000558C000-memory.dmp

        Filesize

        304KB