Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 14:38

General

  • Target

    1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe

  • Size

    1.0MB

  • MD5

    37f7bcb6d24a909fa799dfad47ca6c28

  • SHA1

    6b9a2cc3664db7615219ee10c100be45c854f74e

  • SHA256

    1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1

  • SHA512

    64c8685b9c3f2e87ef1229f3921a779e29eb72717a11497659b02f8915302360f466115c220d4aebc99dbe64068c3a66a2e32f4cb35690b35bee6f3c76d6a6a4

  • SSDEEP

    24576:NyI+yvV4nLtzROhfOPgv+lg7DIIACpi6ufRcJw+4Oi:oJyNQNsh2o+sDTz4Qw+4O

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

droz

C2

77.91.124.145:4125

Attributes
  • auth_value

    d099adf6dbf6ccb8e16967104280634a

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe
    "C:\Users\Admin\AppData\Local\Temp\1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un604814.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un604814.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un841355.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un841355.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr277946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr277946.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:552
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 1084
            5⤵
            • Program crash
            PID:2164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu503013.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu503013.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4848
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:6960
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1384
            5⤵
            • Program crash
            PID:5908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708059.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:6212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 552 -ip 552
    1⤵
      PID:4448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4848 -ip 4848
      1⤵
        PID:7132

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un604814.exe

        Filesize

        800KB

        MD5

        3b480416209b97bcb59b971e0ff33778

        SHA1

        e7c64cbc1fa4a00de65607d2a0bd5dcb87c9b01c

        SHA256

        32afe63ddb43a78c495b4cb6d43c78633abb70b2bf95eaddd8a33530a0c1f3eb

        SHA512

        57ae574a38a7a159118797e852068035f1877ecacca91152d146e73db7e1f60dc55d47f5e22808b5a6f466a8367ec926fc3d1616ace9127895361d69691f74ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708059.exe

        Filesize

        168KB

        MD5

        e68fd85577ade1c2aa31c33c024db078

        SHA1

        6c1dc83ea2180931ce0c34301918779fc710d14a

        SHA256

        424431f99f3edcccf6f006d3ffc586557d1d86ae29092a28d20e394f0dd77ca0

        SHA512

        7f609e71060ff053ff44fe4ae9d3d728fc38fee1ac19b36fef2a1cff1256e4e2f8df947875a2a245d57fde44b63a28504234d80514c5e7fbc095b85464156caa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un841355.exe

        Filesize

        646KB

        MD5

        6ed69ba10d72cf9d8f10aeef0c8dd72f

        SHA1

        f2aaa309666428291cb3061e603ada53a60b4194

        SHA256

        e8ec3c824f42ce3a59db15738625d2d4a74fcc096cd255a709f80ff5393f5855

        SHA512

        dab3a6640cb49fa295f458496fbf81a6c47d45333f0dc853f27cf2726759188a4874018c4abbd808a4ed1d09f83f2efcdb3d565a687e99fb08d59f1399f121c0

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr277946.exe

        Filesize

        243KB

        MD5

        cabb163b07c95c2f8507e9abf627355e

        SHA1

        e28435168b09bb1b323287014ac17263707b32cd

        SHA256

        7bfba3c237a76c712e7d70f48d1fb8162f8251ad9aef911e63e02785e71ec62e

        SHA512

        c2849df8698746dce9adfea1e1d7873f0e8363d816a3edc3abbef4d0eb3e2b7e9d71a73d7a8c88d65945f98ab3ca957da15ec046788a2406e5087eddd3c8b129

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu503013.exe

        Filesize

        426KB

        MD5

        2907ed9327ad173ea95b90f61702a0bb

        SHA1

        f8ebad1d6baa7eedb4dcf0a121d9f55ead8afa2a

        SHA256

        d0c0786cc7195a05e227400605b4c017475bfd477a77c171bcb10e614aa975bb

        SHA512

        826e0e9acc204daca5d2254f65ac45ddbab6264659dca27ed1a41323f3aa50e00a3030617cb7c7b99655896edd91c82930614dda8e45a633a537ec83bf07f1b0

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/552-62-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/552-57-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/552-27-0x00000000025A0000-0x00000000025B8000-memory.dmp

        Filesize

        96KB

      • memory/552-55-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-53-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-51-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-22-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/552-47-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-45-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-43-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-41-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-39-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-37-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-35-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-33-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-31-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-29-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-28-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/552-56-0x0000000000720000-0x0000000000820000-memory.dmp

        Filesize

        1024KB

      • memory/552-23-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/552-58-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/552-59-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/552-61-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/552-25-0x00000000022D0000-0x00000000022EA000-memory.dmp

        Filesize

        104KB

      • memory/552-24-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/552-26-0x0000000004C30000-0x00000000051D4000-memory.dmp

        Filesize

        5.6MB

      • memory/552-49-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/4848-84-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-98-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-102-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-78-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-80-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-96-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-94-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-92-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-90-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-86-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-68-0x0000000002590000-0x00000000025F6000-memory.dmp

        Filesize

        408KB

      • memory/4848-76-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-67-0x0000000004BE0000-0x0000000004C46000-memory.dmp

        Filesize

        408KB

      • memory/4848-82-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-72-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-70-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-88-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-69-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-2149-0x0000000005410000-0x0000000005442000-memory.dmp

        Filesize

        200KB

      • memory/4848-100-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/4848-74-0x0000000002590000-0x00000000025EF000-memory.dmp

        Filesize

        380KB

      • memory/6212-2174-0x00000000016C0000-0x00000000016C6000-memory.dmp

        Filesize

        24KB

      • memory/6212-2173-0x0000000000EE0000-0x0000000000F0E000-memory.dmp

        Filesize

        184KB

      • memory/6960-2164-0x0000000005DA0000-0x00000000063B8000-memory.dmp

        Filesize

        6.1MB

      • memory/6960-2165-0x0000000005890000-0x000000000599A000-memory.dmp

        Filesize

        1.0MB

      • memory/6960-2166-0x00000000055F0000-0x0000000005602000-memory.dmp

        Filesize

        72KB

      • memory/6960-2167-0x0000000005780000-0x00000000057BC000-memory.dmp

        Filesize

        240KB

      • memory/6960-2168-0x00000000057C0000-0x000000000580C000-memory.dmp

        Filesize

        304KB

      • memory/6960-2163-0x00000000055A0000-0x00000000055A6000-memory.dmp

        Filesize

        24KB

      • memory/6960-2162-0x0000000000D80000-0x0000000000DB0000-memory.dmp

        Filesize

        192KB