Analysis

  • max time kernel
    105s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 04:12

General

  • Target

    7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe

  • Size

    916KB

  • MD5

    c9597a24387974618db4668c36b23f09

  • SHA1

    076d01def9c3e356d9e48a326a87950f43922648

  • SHA256

    7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557

  • SHA512

    7c7f8820d88ff05eba14733a3e9e8c10377e8896e4bef9f0901446c15d972faab910063c3b5c4f31ea42cee3136a7496cf9531681f2cfb22930673e151b3cb49

  • SSDEEP

    12288:pMrJy90ZYFcv+IOdO4EZ+W7YfOoF6xYZbugh8Vk6jgNnTiWDcier9OPsrvV8L3lq:gy8NOdGZ5cxqM6itKQ3PCU3Ihai

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

linos

C2

77.91.124.145:4125

Attributes
  • auth_value

    85221849d0efabfea4d7563bb7454724

Signatures

  • Detects Healer an antivirus disabler dropper 19 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe
    "C:\Users\Admin\AppData\Local\Temp\7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4612.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3451.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3451.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6086Zm.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6086Zm.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1080
            5⤵
            • Program crash
            PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49qN55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49qN55.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 1496
          4⤵
          • Program crash
          PID:5776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2804 -ip 2804
    1⤵
      PID:532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1408 -ip 1408
      1⤵
        PID:988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exe

        Filesize

        168KB

        MD5

        38cf56b3e2f40903f80bfbd9f19ab986

        SHA1

        49ffb92753778b12b108a43665c238957b2917fd

        SHA256

        92cbb2470b46ab989e2fcb32e6c3a89b9c2f823907ecdf4d2922cf31126007ca

        SHA512

        f69cd6ef7087146320505146dd6032a6ae8f50ac496d20eaa10732b7fde0b8a43756830e683ec418cb6ad3a44a57bb81f57a27a048325115411eaad9b41d2a4f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4612.exe

        Filesize

        763KB

        MD5

        342dbbd8aee4ab8a2eadce57f0dfbe48

        SHA1

        1246f8a8ef6ed06ee9b34653164f07be1a501c08

        SHA256

        2b5a413b35954913ccd89d0d19e7e545a250b953141c86984bb05bd96c291cc4

        SHA512

        b4e7c7a642c86004509821b3634e8b5a492321bbee9729b358bbe1b1458734faedb9c7d7a461733ffa5e4634642b6b4b19171af1f527a9cf9676cb08b28d136c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49qN55.exe

        Filesize

        417KB

        MD5

        10d5a600a23096da6bce20bf3bffe6f2

        SHA1

        8137d63516625524bc48a8f565635b71ebe5e4d1

        SHA256

        d77c5a8b7baefc48d16efffd8b200f3cb76b5ff7525e12045ef421dfc51ce277

        SHA512

        a46862eb29aab1eedc3153baaab8eed83fff619c65ed0d90604bdc09ec1019dec0ee5b3e305da63d52340c2cc8872941868183c6b5bc07c6e2dc00aee81a28d5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3451.exe

        Filesize

        315KB

        MD5

        088cad1797400a44c35ef69a37c481b4

        SHA1

        30b1f4bbe9f832286e383c8fb71e11b1dc06de8e

        SHA256

        c8065172343319866e2a07befe06ab4153902423ac3a88a23654d9dc8821b9fc

        SHA512

        950c586dfbb75e4b21f1174ad365178dc0eace9a1843505269c9645ce5cef76abf807b3e4f74e1d809ae4db6b0918c10c3cdf355c11b6106d4f7a22d5de14438

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exe

        Filesize

        12KB

        MD5

        835fadd2e0593f34a427b465a15e74a4

        SHA1

        f250505f5381ddfe1d4620b6d2721f6db9d60f40

        SHA256

        49539ff01b688c7ebb4a28b20b60796123a759b41cc67c404781dfbc89e11c29

        SHA512

        93b06dec22e362b385b301f75ea31c26a0e42a34949a43242d82502276a7aa8a7acf72c3a4fbd4b93f2887f57ca1d96b799b38794baf7509b6ad1dd47351f520

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6086Zm.exe

        Filesize

        233KB

        MD5

        4c6138d8c460f44a9d802e5e41236d38

        SHA1

        f5ae4d89277c1c9979b8c425d5d581aee8b8a485

        SHA256

        b25b517fff55cd2a3b55f15146145f392f37fd9d0f7ea3947f7eaa2c6eb9a7ae

        SHA512

        7c5c9dda5802560753286051b7dea0368421d92460d9fdb679232f05ad28b09e361f2c5d8a3128e4b264cf2a173331b1e8f2fbdd3ff1cc6d5c13c307e7027ff1

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        1073b2e7f778788852d3f7bb79929882

        SHA1

        7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4

        SHA256

        c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb

        SHA512

        90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0

      • memory/1408-80-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-74-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-2149-0x0000000005410000-0x0000000005442000-memory.dmp

        Filesize

        200KB

      • memory/1408-76-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-82-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-84-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-86-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-88-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-90-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-92-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-94-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-96-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-100-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-102-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-98-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-70-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-72-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-78-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-69-0x0000000004C30000-0x0000000004C8F000-memory.dmp

        Filesize

        380KB

      • memory/1408-68-0x0000000004C30000-0x0000000004C96000-memory.dmp

        Filesize

        408KB

      • memory/1408-67-0x00000000025F0000-0x0000000002656000-memory.dmp

        Filesize

        408KB

      • memory/2116-23-0x00007FFCA0F23000-0x00007FFCA0F25000-memory.dmp

        Filesize

        8KB

      • memory/2116-21-0x00007FFCA0F23000-0x00007FFCA0F25000-memory.dmp

        Filesize

        8KB

      • memory/2116-22-0x0000000000160000-0x000000000016A000-memory.dmp

        Filesize

        40KB

      • memory/2804-55-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-39-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-32-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-37-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-57-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-41-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-43-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-45-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-59-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-47-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-49-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-30-0x0000000004AA0000-0x0000000005044000-memory.dmp

        Filesize

        5.6MB

      • memory/2804-53-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-29-0x0000000002460000-0x000000000247A000-memory.dmp

        Filesize

        104KB

      • memory/2804-35-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-33-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-51-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/2804-31-0x0000000002500000-0x0000000002518000-memory.dmp

        Filesize

        96KB

      • memory/2804-60-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/2804-62-0x0000000000400000-0x00000000004A8000-memory.dmp

        Filesize

        672KB

      • memory/4296-2163-0x0000000001100000-0x0000000001106000-memory.dmp

        Filesize

        24KB

      • memory/4296-2164-0x0000000005990000-0x0000000005FA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4296-2165-0x0000000005480000-0x000000000558A000-memory.dmp

        Filesize

        1.0MB

      • memory/4296-2166-0x0000000005320000-0x0000000005332000-memory.dmp

        Filesize

        72KB

      • memory/4296-2167-0x00000000053B0000-0x00000000053EC000-memory.dmp

        Filesize

        240KB

      • memory/4296-2162-0x00000000009A0000-0x00000000009D0000-memory.dmp

        Filesize

        192KB

      • memory/4296-2172-0x00000000053F0000-0x000000000543C000-memory.dmp

        Filesize

        304KB

      • memory/5880-2173-0x0000000000970000-0x00000000009A0000-memory.dmp

        Filesize

        192KB

      • memory/5880-2174-0x0000000002B80000-0x0000000002B86000-memory.dmp

        Filesize

        24KB