Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2024 08:36

General

  • Target

    98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe

  • Size

    655KB

  • MD5

    db306cef50cf3bce054abba0a38e46d0

  • SHA1

    bfe4b81824cc8f3f95b9d255d7a29ef5cdb1b90b

  • SHA256

    98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4

  • SHA512

    569d5be29a7f8f13299134849b4710f9a779d876d9e090dc18e989bd7b40b73a7e1d337265bd0f8ef75d4dc68734aa214246bee4796b395ec3013e018278d197

  • SSDEEP

    12288:IMr2y90RamjgMuMDamGiQy3AcSnY84t44E5KZXEqEFMe/NPzMtcNIfFqw2igWS3q:+y0gfMmbiFQVnYn/E5KZ/EPPzjNIEwcq

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe
    "C:\Users\Admin\AppData\Local\Temp\98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijA3401.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijA3401.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827019.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827019.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508394.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1372
          4⤵
          • Program crash
          PID:388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr372262.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr372262.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4996 -ip 4996
    1⤵
      PID:4516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr372262.exe

      Filesize

      168KB

      MD5

      b03e110c14c8e0efa8c3e5ac8f6bf956

      SHA1

      f468bcf7e9ecc5f3e2dec63a1d5e5af4caaae887

      SHA256

      42ca8ef8069d613e4ea50ca1a789c8a250d2384db29c62c24d8dfc4ca746016b

      SHA512

      c906927305e59a5ee4529eebf54bf2b4f63064d9299fdacb012bcbf4dbd8f8a3ed2561c8346cdac1e715a86ed81f9f02d1a1dd05953979364e38e7fde826dcb6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijA3401.exe

      Filesize

      502KB

      MD5

      239814d207a2e61bd6dd1c10abedf9cb

      SHA1

      ad21f455c2e670c149021df9b348bcacb83059b7

      SHA256

      f0ad2f8ebef4cd16dc2eb4ed914a93390483f712e7c56da0b79fc7de9b2c4d3d

      SHA512

      bc6e41b252ea90c293b21341f1706d0be7c98e07d02b38246c5da0c4a71ee47742d0fa47f4736c86cef4b9cb594a3fcfa5fc732942fdda9d2e0ce151dac3bc23

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827019.exe

      Filesize

      11KB

      MD5

      dfa58f6c40c794e3454b9ab7d7024ab1

      SHA1

      41282d193f600b4d07353b8989afa0428c46e469

      SHA256

      6c068871144f3ab3a67b0c67cbbb1eb23434154166028e3d012f4703582dba68

      SHA512

      f53f6a0e2d2b5dbc4c579557a1400d792d66643b3e54ff05c1dbfe11a0780b76b40e42adfcfd93f2d87c9f65d0fb448c3a77c9a9adb2b1375aada1101a467800

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508394.exe

      Filesize

      424KB

      MD5

      8a940e3e925f449298a4ad9afd38f012

      SHA1

      9cb491fdc66acf6e517d885d2f8494494cc6edde

      SHA256

      1583e963ab140cc5a8704f3f1dd39c1d9fa9b804ee35a59484ffc2f7e516b430

      SHA512

      1602fae5dd3d3bc0b915ca73dc29b88c47b6bb5cbf620059ca75597d9fea0df40b2085b2bea0eab326f8d589d299d4859483bdf30e4f7219b6cd048eeb3d2693

    • C:\Windows\Temp\1.exe

      Filesize

      168KB

      MD5

      1073b2e7f778788852d3f7bb79929882

      SHA1

      7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

      SHA256

      c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

      SHA512

      90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

    • memory/1576-14-0x00007FFEED8A3000-0x00007FFEED8A5000-memory.dmp

      Filesize

      8KB

    • memory/1576-15-0x0000000000480000-0x000000000048A000-memory.dmp

      Filesize

      40KB

    • memory/3552-2129-0x0000000000A70000-0x0000000000A76000-memory.dmp

      Filesize

      24KB

    • memory/3552-2128-0x0000000000180000-0x00000000001AE000-memory.dmp

      Filesize

      184KB

    • memory/4812-2119-0x0000000005030000-0x0000000005648000-memory.dmp

      Filesize

      6.1MB

    • memory/4812-2118-0x0000000002390000-0x0000000002396000-memory.dmp

      Filesize

      24KB

    • memory/4812-2117-0x0000000000080000-0x00000000000B0000-memory.dmp

      Filesize

      192KB

    • memory/4812-2123-0x0000000004AB0000-0x0000000004AFC000-memory.dmp

      Filesize

      304KB

    • memory/4812-2122-0x0000000004A30000-0x0000000004A6C000-memory.dmp

      Filesize

      240KB

    • memory/4812-2121-0x0000000004A10000-0x0000000004A22000-memory.dmp

      Filesize

      72KB

    • memory/4812-2120-0x0000000004B20000-0x0000000004C2A000-memory.dmp

      Filesize

      1.0MB

    • memory/4996-57-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-39-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-75-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-73-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-71-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-69-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-65-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-63-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-61-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-59-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-79-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-56-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-53-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-51-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-49-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-47-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-45-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-43-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-41-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-77-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-35-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-33-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-31-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-83-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-29-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-67-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-81-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-85-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-87-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-37-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-23-0x00000000026D0000-0x0000000002736000-memory.dmp

      Filesize

      408KB

    • memory/4996-22-0x0000000004F20000-0x00000000054C4000-memory.dmp

      Filesize

      5.6MB

    • memory/4996-21-0x00000000023E0000-0x0000000002446000-memory.dmp

      Filesize

      408KB

    • memory/4996-27-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-25-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-24-0x00000000026D0000-0x000000000272F000-memory.dmp

      Filesize

      380KB

    • memory/4996-2104-0x00000000027C0000-0x00000000027F2000-memory.dmp

      Filesize

      200KB