Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 00:25

General

  • Target

    eb272acb58b9bc98837b85ade912d531c245589a2e265f13672d61772ac1223f.exe

  • Size

    660KB

  • MD5

    23b6ed63145611a7f9f4deb713e0dbd5

  • SHA1

    59ddab499da83142979af9392f9106fc16e4a3d7

  • SHA256

    eb272acb58b9bc98837b85ade912d531c245589a2e265f13672d61772ac1223f

  • SHA512

    de64af5145b3e239d8eac9730d5d966550ee75d969caf5c8fcd7d616375528ef4ac960b36033fc3b6b3f23a4c70a200103c56d2625b786abe6410e6a95771b8e

  • SSDEEP

    12288:lMrgy90GffeOnObN7dMlFWZWJFdODmhjxwTdw62HK75C4a2nAFMX:lyF+8Ob1dMlgsJQmBk7Fa2AyX

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dozt

C2

77.91.124.145:4125

Attributes
  • auth_value

    857bdfe4fa14711025859d89f18b32cb

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb272acb58b9bc98837b85ade912d531c245589a2e265f13672d61772ac1223f.exe
    "C:\Users\Admin\AppData\Local\Temp\eb272acb58b9bc98837b85ade912d531c245589a2e265f13672d61772ac1223f.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifu6289.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifu6289.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730619.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730619.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku652800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku652800.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 1520
          4⤵
          • Program crash
          PID:3928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507257.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507257.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1956 -ip 1956
    1⤵
      PID:5900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507257.exe

      Filesize

      170KB

      MD5

      82b224178bb4c887eb1fb1c7619bf41e

      SHA1

      96bfedb39cae523c7f53722755a91d07b3414758

      SHA256

      57cc60d0192f5d22d7485f07e8ba204a53acd9ba5505600eb59f243791a4726f

      SHA512

      03bd21824d7d8210d1363a5c387798f48db98d817ed7fbdbe6c67701e6aaf6b934a15afb2d21502439d24ce9c0a013152f78c88704a3d534beb9c56aeeed5b22

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifu6289.exe

      Filesize

      506KB

      MD5

      ab863c3cb843fdf83d43a9406ead832c

      SHA1

      9ce103bbf020cf47bac82474250257aaee0a04a5

      SHA256

      e8c6c3500034b8f52372f13585c89d50ff1b7e1d59de599f91776fedc4880568

      SHA512

      004e84ce8652dde20695d40c9903d5a28a3471eb72ace89ceb5e00d90097b44efa025a4e81a3d25bc21054980d109939e4bd7d76581f8fb2018a07c5db53871b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr730619.exe

      Filesize

      14KB

      MD5

      f0cd4567a35da1af1e56a6e6f253a987

      SHA1

      ae004cafc982f36ff69dbcc5f95d56a3f78b59bb

      SHA256

      759f007f4c1906c95843f7fcc84c792732b107d58e1b0e51607dde598396624d

      SHA512

      e85ca4a2c87a57294379c058d5f0022b83e3bb21b4aea07e07ac4ea6571f2a8dab1211cc7491aadd46ea500994df22d4d10cb5c3a72551cd11b2e4048c44e6eb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku652800.exe

      Filesize

      426KB

      MD5

      bdb161adf1e5ff2c52ff415658e95467

      SHA1

      c444d41733f593b36c9952e064d98ff1a364c503

      SHA256

      0ef6ade47c7da244bdf8ca8d9b3a51728652c34f3ef500f04d0f89f9e9e8b0a7

      SHA512

      71244f5a562731ecf17978abe5412e0cf6f0fb346c12e7eb38a039a1f283b00f3dff931d72fea34a32d079cdb0600196214cbe9b8ff11d53618b90f5077e95dc

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1956-50-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-86-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-24-0x0000000005300000-0x0000000005366000-memory.dmp

      Filesize

      408KB

    • memory/1956-32-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-84-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-88-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-42-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-82-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-80-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-78-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-76-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-40-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-72-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-70-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-68-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-64-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-62-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-60-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-56-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-54-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-44-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-22-0x0000000004CA0000-0x0000000004D06000-memory.dmp

      Filesize

      408KB

    • memory/1956-48-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-46-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-53-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-23-0x0000000004D10000-0x00000000052B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1956-74-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-38-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-36-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-34-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-30-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-28-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-66-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-58-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-26-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-25-0x0000000005300000-0x000000000535F000-memory.dmp

      Filesize

      380KB

    • memory/1956-2105-0x0000000005540000-0x0000000005572000-memory.dmp

      Filesize

      200KB

    • memory/3680-2118-0x0000000000EC0000-0x0000000000EF0000-memory.dmp

      Filesize

      192KB

    • memory/3680-2119-0x0000000001790000-0x0000000001796000-memory.dmp

      Filesize

      24KB

    • memory/3680-2120-0x0000000005F10000-0x0000000006528000-memory.dmp

      Filesize

      6.1MB

    • memory/3680-2121-0x0000000005A00000-0x0000000005B0A000-memory.dmp

      Filesize

      1.0MB

    • memory/3680-2122-0x00000000032F0000-0x0000000003302000-memory.dmp

      Filesize

      72KB

    • memory/3680-2123-0x0000000003310000-0x000000000334C000-memory.dmp

      Filesize

      240KB

    • memory/3680-2124-0x00000000058F0000-0x000000000593C000-memory.dmp

      Filesize

      304KB

    • memory/3768-14-0x00007FF8FC0C3000-0x00007FF8FC0C5000-memory.dmp

      Filesize

      8KB

    • memory/3768-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp

      Filesize

      40KB

    • memory/3768-16-0x00007FF8FC0C3000-0x00007FF8FC0C5000-memory.dmp

      Filesize

      8KB

    • memory/4828-2129-0x0000000000970000-0x00000000009A0000-memory.dmp

      Filesize

      192KB

    • memory/4828-2130-0x0000000005110000-0x0000000005116000-memory.dmp

      Filesize

      24KB