Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 04:59

General

  • Target

    e78e5d542a85d3218317f83b489fe780fff2e831591dd9ef3b98f0b6de56e461.exe

  • Size

    813KB

  • MD5

    930ce1872717c80d72f576ac11e92bfb

  • SHA1

    076476334615ab1c80b4f16d8d115eeb463931c3

  • SHA256

    e78e5d542a85d3218317f83b489fe780fff2e831591dd9ef3b98f0b6de56e461

  • SHA512

    281aeccd29b080d61c8a8766a059e19f7ba33bf031333cbe3ff3b8133bffd1dcbed43c4d32856d5e4e69999407d180c6bf6090289409aa08526d621198f237cd

  • SSDEEP

    12288:8MrMy90pv6TqayICoD/K7oVPwYH2dEuSEe7RNIWkMD4H3D2OyvSsAT1rSJPORWS+:oyQvdGm7eIYH2d2d0T2p/MEiKd4K

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

diza

C2

77.91.124.145:4125

Attributes
  • auth_value

    bbab0d2f0ae4d4fdd6b17077d93b3e80

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e78e5d542a85d3218317f83b489fe780fff2e831591dd9ef3b98f0b6de56e461.exe
    "C:\Users\Admin\AppData\Local\Temp\e78e5d542a85d3218317f83b489fe780fff2e831591dd9ef3b98f0b6de56e461.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532185.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532185.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4685.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 1084
          4⤵
          • Program crash
          PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3391.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3391.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 1376
          4⤵
          • Program crash
          PID:5564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si526573.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si526573.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3636 -ip 3636
    1⤵
      PID:2932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 512 -ip 512
      1⤵
        PID:5700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si526573.exe

        Filesize

        169KB

        MD5

        e27f8d7a0c1ad4e47ad88e28a8622e73

        SHA1

        325cfe168bf3f7369380054b60576b8b69a2a260

        SHA256

        28fe0c256d7c7defb481a8ae1ca37447e2c73810dc335a789a70661bb5fd37fb

        SHA512

        5ad2cadc1c8e39c87f2e01ff44d76bfbb165f2c456c4f663a7f075418a86e4e83ef24a4244930303b413a7f6dfc2d6bf14d0e7c44e84d92d80c49cc462d07bf6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532185.exe

        Filesize

        660KB

        MD5

        ce7712c13d4d4120c36f3f513b2f2f24

        SHA1

        9c539ae8263480c4874ab917d1e7689ede040bb6

        SHA256

        3d627175dc488d11d15056a8ff702cc90a4441d686f65ec072bb2069266d3aa4

        SHA512

        a67599fe40b78aac69c43125a87dbcd27dc7e09667467863c9c1367a49fbeac9c46c7d31ba7ef525c8c1dbf2c9a12021d1f103fd5b2e0b22b1722fb82316cd14

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4685.exe

        Filesize

        332KB

        MD5

        d404d200fb643d63ec22a07cc0c40df4

        SHA1

        8368c393323ed908d17ce01f307c5c7eedca40e0

        SHA256

        b8e1173f673c436f7df7591b79a0006ddeb8323b0c93199bc316d8e70c8dda32

        SHA512

        be6b68b69394e23ef6b285c161bccb8e888992f9b140a7cedd2d17766bfd36ef445b1c26d1f8c1a9b1d10ff66b810061d0a0d3d37b92fa6c8f4f31fa670e9756

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3391.exe

        Filesize

        495KB

        MD5

        e7cc1bccbd909176ab22ceb4b790faf6

        SHA1

        c7931b751247c27213ff8d48811d4cba0596545d

        SHA256

        2127f992f77dbd54bfd4b227b7000f835687b172775f035ff79e696b12025c3d

        SHA512

        75aa62382ea2bc021d5546a1ef8d24606029f55eea9ca466134b4886814d031a8bc737931675641d7b16d55ef52d2770857fa875e68b319701e40de3b44441b2

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/512-82-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-61-0x0000000002900000-0x0000000002966000-memory.dmp

        Filesize

        408KB

      • memory/512-74-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-78-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-2143-0x0000000005750000-0x0000000005782000-memory.dmp

        Filesize

        200KB

      • memory/512-63-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-64-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-66-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-68-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-70-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-72-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-76-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-80-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-96-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-86-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-88-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-90-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-92-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-94-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-84-0x0000000005540000-0x000000000559F000-memory.dmp

        Filesize

        380KB

      • memory/512-62-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/3636-27-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-37-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-18-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/3636-56-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3636-51-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3636-20-0x0000000004EB0000-0x0000000005454000-memory.dmp

        Filesize

        5.6MB

      • memory/3636-15-0x00000000008B0000-0x00000000009B0000-memory.dmp

        Filesize

        1024KB

      • memory/3636-50-0x00000000008B0000-0x00000000009B0000-memory.dmp

        Filesize

        1024KB

      • memory/3636-25-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-41-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-22-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-23-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-19-0x00000000025B0000-0x00000000025CA000-memory.dmp

        Filesize

        104KB

      • memory/3636-29-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-31-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-34-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-35-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-55-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/3636-39-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-16-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/3636-43-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-45-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-49-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-48-0x0000000002850000-0x0000000002862000-memory.dmp

        Filesize

        72KB

      • memory/3636-17-0x0000000000400000-0x0000000000807000-memory.dmp

        Filesize

        4.0MB

      • memory/3636-21-0x0000000002850000-0x0000000002868000-memory.dmp

        Filesize

        96KB

      • memory/5548-2157-0x00000000025C0000-0x00000000025C6000-memory.dmp

        Filesize

        24KB

      • memory/5548-2158-0x00000000052C0000-0x00000000058D8000-memory.dmp

        Filesize

        6.1MB

      • memory/5548-2159-0x0000000004DB0000-0x0000000004EBA000-memory.dmp

        Filesize

        1.0MB

      • memory/5548-2160-0x0000000004CC0000-0x0000000004CD2000-memory.dmp

        Filesize

        72KB

      • memory/5548-2156-0x0000000000330000-0x0000000000360000-memory.dmp

        Filesize

        192KB

      • memory/5548-2164-0x0000000004D20000-0x0000000004D5C000-memory.dmp

        Filesize

        240KB

      • memory/5548-2167-0x0000000004D60000-0x0000000004DAC000-memory.dmp

        Filesize

        304KB

      • memory/5836-2166-0x0000000000140000-0x000000000016E000-memory.dmp

        Filesize

        184KB

      • memory/5836-2168-0x0000000002430000-0x0000000002436000-memory.dmp

        Filesize

        24KB