Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 02:07

General

  • Target

    a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe

  • Size

    660KB

  • MD5

    5923df8e8b775fbf8b8b77b978eab294

  • SHA1

    a3819d424ab21510321036c3007f82f548993493

  • SHA256

    a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a

  • SHA512

    034c75e4641e57df1b9e6be907776b7def255aa44b5e79b856750e1f67ed32d39051883580e29ce1b519df059f24f641bf3470a4ac6bef60418eb1086c1043e1

  • SSDEEP

    12288:tMrIy90ebh5o2QsrS5lFiTxCr9a2nFG5kwL0NFbFuEabNsovNj1:Zy9he2QsrS5n2CRaQG5kwUdF7kJ

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

dizon

C2

77.91.124.145:4125

Attributes
  • auth_value

    047038ed6238aaee09c368831591e935

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe
    "C:\Users\Admin\AppData\Local\Temp\a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwZ4689.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwZ4689.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it538817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it538817.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437173.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437173.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1376
          4⤵
          • Program crash
          PID:1352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp728888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp728888.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2680 -ip 2680
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp728888.exe

      Filesize

      168KB

      MD5

      8eecb6f8baaf2454bc6669f848bd59d9

      SHA1

      a062da5a1bded7ef2a32d0f42f931166c5c1ea97

      SHA256

      a8136a4d250f19a6544650f7c0455ba9fe3485f78dec419b88afa6a2a1200324

      SHA512

      064bb11c6997377967948a36e15302d7b2c3ac6d623854590673bdc2eff911384a6b7848c41cf82999372cfb587e0529cc203a4c8937daeb4d2661c5d1e138af

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwZ4689.exe

      Filesize

      506KB

      MD5

      23fd6f3326608fca5b0709e6afaba405

      SHA1

      a0275b2863c932744eee961501f843484b9bc6da

      SHA256

      7b950738fdf62909e6b771820e09221a9a26018248f526ed65558e9d12f8ee4d

      SHA512

      8783ac813f99408dafb2d6a32f5687352f0cbad3b55ca1a5d5d2982e05e59a06ede4ac06b75dff2dd66eecf9aeb0254c6ca42b3baccfa8e2391f9a062bb43e97

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it538817.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437173.exe

      Filesize

      419KB

      MD5

      243fefe2ceae60dda68216b4c07688b1

      SHA1

      51f7dea3fd14f3337047dd5c5878838b590c383d

      SHA256

      83a28a58c1450055c2a24e52c5cf473f8cb4dea085967f35bb137649f97a711f

      SHA512

      d1a45165341bb9a352db53f2d9656b27d6a2b6e8cdf006ac5c757585c8b056993520cbd589dc8c46e8198a60c2b6063956354e5443eaf1d456c8bff8f69b6059

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/2680-52-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-86-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-24-0x0000000005390000-0x00000000053F6000-memory.dmp

      Filesize

      408KB

    • memory/2680-42-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-44-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-88-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-40-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-84-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-80-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-78-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-76-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-38-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-70-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-68-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-66-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-64-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-62-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-60-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-58-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-56-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-46-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-22-0x0000000004BE0000-0x0000000004C46000-memory.dmp

      Filesize

      408KB

    • memory/2680-50-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-48-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-54-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-23-0x0000000004DE0000-0x0000000005384000-memory.dmp

      Filesize

      5.6MB

    • memory/2680-72-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-36-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-34-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-30-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-28-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-82-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-74-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-32-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-26-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-25-0x0000000005390000-0x00000000053EF000-memory.dmp

      Filesize

      380KB

    • memory/2680-2105-0x0000000005560000-0x0000000005592000-memory.dmp

      Filesize

      200KB

    • memory/3668-2118-0x00000000000F0000-0x0000000000120000-memory.dmp

      Filesize

      192KB

    • memory/3668-2119-0x0000000000920000-0x0000000000926000-memory.dmp

      Filesize

      24KB

    • memory/3668-2120-0x00000000050F0000-0x0000000005708000-memory.dmp

      Filesize

      6.1MB

    • memory/3668-2121-0x0000000004BE0000-0x0000000004CEA000-memory.dmp

      Filesize

      1.0MB

    • memory/3668-2122-0x0000000004960000-0x0000000004972000-memory.dmp

      Filesize

      72KB

    • memory/3668-2123-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

      Filesize

      240KB

    • memory/3668-2124-0x0000000004B20000-0x0000000004B6C000-memory.dmp

      Filesize

      304KB

    • memory/3984-14-0x00007FFC727E3000-0x00007FFC727E5000-memory.dmp

      Filesize

      8KB

    • memory/3984-15-0x0000000000A10000-0x0000000000A1A000-memory.dmp

      Filesize

      40KB

    • memory/3984-16-0x00007FFC727E3000-0x00007FFC727E5000-memory.dmp

      Filesize

      8KB

    • memory/5008-2129-0x00000000008D0000-0x0000000000900000-memory.dmp

      Filesize

      192KB

    • memory/5008-2130-0x0000000001180000-0x0000000001186000-memory.dmp

      Filesize

      24KB