Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 02:03

General

  • Target

    35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe

  • Size

    1.0MB

  • MD5

    359f32990fc31a909ae68f406e7b919b

  • SHA1

    916ac95df563144cd27469899da5cb733836ce84

  • SHA256

    35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0

  • SHA512

    ad28cbd0e36bb76863487825ffa06b93584ef04efb870a8edcca76a160783ad9e652356b5352fa1edbf7aa4cd528f8d64724b6894911790e3440e53772aeea10

  • SSDEEP

    24576:Ky1mKkgzosqQ6W5mJUslVBDEIHE2Ga1vhArnTAcMe6q:R1mpgcsq9WEWsNDPkWS0m6

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe
    "C:\Users\Admin\AppData\Local\Temp\35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923956.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923956.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un850374.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un850374.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr801135.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr801135.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1084
            5⤵
            • Program crash
            PID:3832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu274953.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu274953.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3752
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5160
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 1384
            5⤵
            • Program crash
            PID:1960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742740.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742740.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5100 -ip 5100
    1⤵
      PID:1984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3752 -ip 3752
      1⤵
        PID:1108

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923956.exe

        Filesize

        801KB

        MD5

        053ab560f568210f0ffc5eaa3cd7c4fa

        SHA1

        e1386024dd075aa5f019f9718bdfe76ef03c5052

        SHA256

        f9585ba1612c2691e6dce6007b3c14365778f0be7ab73be918dbd0137db5e556

        SHA512

        95df64dfa73d642648c3d32df1098d40b93afbb7616b32b987ac082ff31cdb085c57695e76a96053000c507f6e50515e12d4618a8dccf901c8130add93d96fb4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742740.exe

        Filesize

        168KB

        MD5

        75aba1ff190d55d60624135316197ce5

        SHA1

        50a7a4d416e390d1127f62c0e2b79d909482b96d

        SHA256

        1d4a62c20efc4e666a11d7b41ab7980024216dcbdfec8082164e773af807a0f2

        SHA512

        d7bb0215c85928240c003b32a0cb890891a219a939710d213086015a4e55ca246fdf22e43dc801e9480fda0b89361db907590001ba39037d356946cebf80433d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un850374.exe

        Filesize

        647KB

        MD5

        72e0b077bcf442c7c346f0b2402e0c79

        SHA1

        b861b9fa7ddd33e164e03419bb9e5c39edbf0f22

        SHA256

        06f45967033226a0892e4dc669d86d4d677e12e6db9f5a67aef767e3c29d3f12

        SHA512

        0358a41217d54585e40bcb4360d182b85e0a15124251688e21dfa321d384399380a080b22d7b26d6751bdbf5f769c84855e8a64d0f6529e8ee0e9c60ee96107b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr801135.exe

        Filesize

        243KB

        MD5

        fa4396d53707f25a828009a75c48d810

        SHA1

        55b6facc055672c01b975df2251d28ab8d9c2e1e

        SHA256

        864367ba95b989b3a66168462ca488c7c7f0dce32c84aac8d34e09f68a948c5e

        SHA512

        791d8ee18534a6b3446d5bade4e109a71b49352ae8bcc301c29e575473ae399c09b3ea15acc4835a90dcd54dc4d20652d4a207dbdfdcaad78c988d0299665ad8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu274953.exe

        Filesize

        426KB

        MD5

        e72d7abab9dbed62273562d8089bcd75

        SHA1

        60b456a8faa0b1aabb106caff471cd45715285a6

        SHA256

        bf1745b3d973b1b3426bc41e5aa9e2178fbf68addae3c1bd483c289e3da71faa

        SHA512

        eb7c61bd09757930151e45e18b9c3c60f7f8510f4bc61924b256986b70bd31bb283667065d0586f213abf6307f0e629e7f314ba4933fd8440e7bfa212c72fa71

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/3752-80-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-82-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-68-0x00000000051D0000-0x0000000005236000-memory.dmp

        Filesize

        408KB

      • memory/3752-69-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-2149-0x0000000005400000-0x0000000005432000-memory.dmp

        Filesize

        200KB

      • memory/3752-70-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-102-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-72-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-74-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-76-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-78-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-67-0x0000000002660000-0x00000000026C6000-memory.dmp

        Filesize

        408KB

      • memory/3752-84-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-88-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-90-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-92-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-94-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-96-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-98-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-100-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/3752-86-0x00000000051D0000-0x000000000522F000-memory.dmp

        Filesize

        380KB

      • memory/4912-2173-0x0000000000AB0000-0x0000000000ADE000-memory.dmp

        Filesize

        184KB

      • memory/4912-2174-0x00000000053D0000-0x00000000053D6000-memory.dmp

        Filesize

        24KB

      • memory/5100-31-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-41-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-62-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5100-61-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/5100-59-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5100-58-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/5100-49-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-57-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/5100-56-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/5100-29-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-28-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-26-0x0000000004D80000-0x0000000005324000-memory.dmp

        Filesize

        5.6MB

      • memory/5100-33-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-35-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-37-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-39-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-24-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/5100-25-0x0000000002110000-0x000000000212A000-memory.dmp

        Filesize

        104KB

      • memory/5100-43-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-45-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-48-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-51-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-53-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-23-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/5100-27-0x0000000002740000-0x0000000002758000-memory.dmp

        Filesize

        96KB

      • memory/5100-55-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/5100-22-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/5160-2165-0x00000000056A0000-0x00000000057AA000-memory.dmp

        Filesize

        1.0MB

      • memory/5160-2166-0x00000000055D0000-0x00000000055E2000-memory.dmp

        Filesize

        72KB

      • memory/5160-2167-0x0000000005630000-0x000000000566C000-memory.dmp

        Filesize

        240KB

      • memory/5160-2168-0x00000000057B0000-0x00000000057FC000-memory.dmp

        Filesize

        304KB

      • memory/5160-2164-0x0000000005BA0000-0x00000000061B8000-memory.dmp

        Filesize

        6.1MB

      • memory/5160-2163-0x0000000001290000-0x0000000001296000-memory.dmp

        Filesize

        24KB

      • memory/5160-2162-0x0000000000C50000-0x0000000000C80000-memory.dmp

        Filesize

        192KB