Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe
Resource
win10v2004-20241007-en
General
-
Target
c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe
-
Size
1.2MB
-
MD5
f50317c48f53767776f84e6b1d1f965e
-
SHA1
8b3eddf9d8ef16d946f3d44dbcc6f26f8d81db39
-
SHA256
c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1
-
SHA512
3a57a654d7c5fe7bf61ade9622ec1a5f5e86b93f842a9194128d5d886a0c1a2612b5911fb17141cb013ed20fc0435c590b2cc53e7a67dd0cfc8f49ee31b381d7
-
SSDEEP
24576:BywKU/yOHbtGNBHRtH+yfB8ziKQlAscXCZUh+:0wKU/H7yRRtHdGzAK
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1468-22-0x00000000026C0000-0x00000000026DA000-memory.dmp healer behavioral1/memory/1468-24-0x0000000002900000-0x0000000002918000-memory.dmp healer behavioral1/memory/1468-52-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-50-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-49-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-46-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-44-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-42-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-40-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-38-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-36-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-34-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-32-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-30-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-28-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-26-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1468-25-0x0000000002900000-0x0000000002912000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr050884.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1924-2190-0x0000000005030000-0x0000000005062000-memory.dmp family_redline behavioral1/files/0x0010000000023b44-2195.dat family_redline behavioral1/memory/1500-2203-0x0000000000020000-0x000000000004E000-memory.dmp family_redline behavioral1/files/0x0007000000023c89-2212.dat family_redline behavioral1/memory/5568-2213-0x0000000000770000-0x00000000007A0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu117750.exe -
Executes dropped EXE 6 IoCs
pid Process 1504 un084722.exe 3900 un073498.exe 1468 pr050884.exe 1924 qu117750.exe 1500 1.exe 5568 rk301836.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr050884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr050884.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un084722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un073498.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4948 1468 WerFault.exe 87 5384 1924 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un084722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un073498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr050884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu117750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk301836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 pr050884.exe 1468 pr050884.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1468 pr050884.exe Token: SeDebugPrivilege 1924 qu117750.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1504 2484 c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe 84 PID 2484 wrote to memory of 1504 2484 c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe 84 PID 2484 wrote to memory of 1504 2484 c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe 84 PID 1504 wrote to memory of 3900 1504 un084722.exe 85 PID 1504 wrote to memory of 3900 1504 un084722.exe 85 PID 1504 wrote to memory of 3900 1504 un084722.exe 85 PID 3900 wrote to memory of 1468 3900 un073498.exe 87 PID 3900 wrote to memory of 1468 3900 un073498.exe 87 PID 3900 wrote to memory of 1468 3900 un073498.exe 87 PID 3900 wrote to memory of 1924 3900 un073498.exe 93 PID 3900 wrote to memory of 1924 3900 un073498.exe 93 PID 3900 wrote to memory of 1924 3900 un073498.exe 93 PID 1924 wrote to memory of 1500 1924 qu117750.exe 95 PID 1924 wrote to memory of 1500 1924 qu117750.exe 95 PID 1924 wrote to memory of 1500 1924 qu117750.exe 95 PID 1504 wrote to memory of 5568 1504 un084722.exe 98 PID 1504 wrote to memory of 5568 1504 un084722.exe 98 PID 1504 wrote to memory of 5568 1504 un084722.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe"C:\Users\Admin\AppData\Local\Temp\c9fe85507eef89f59dba96ec7b50dd9a8a2de45f73cd62f1b8a926e3a5f99ae1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084722.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084722.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un073498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un073498.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr050884.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr050884.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 10885⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu117750.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu117750.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 14605⤵
- Program crash
PID:5384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301836.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1468 -ip 14681⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1924 -ip 19241⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
863KB
MD5579fd4538fc766d796f6be0fbb9f211d
SHA1d8b9c5192310e8f9f8cec6f2119130a3ea4cbc23
SHA256c7797acc248faa03db95bf14c315969a0f2f4a18a63f67071303319cf7660888
SHA512d7ba0728f9656f55bdfb27e16e3aaefc97fea662e75b61ea6bdf6883b5d553254c745e0b31e4b7848b1b7bf9964ff7e5f6a67bc7d9341aad641c2c650c5cae9a
-
Filesize
168KB
MD5ba8c17a6a3824c09180ea2fd84bbc365
SHA1186d9bf51d66bb02e9edf30c345e5a0a793668a5
SHA256818f4d1b9229ea05c481a7492240a72a248cfc631d5dfaad9aba8952c1885651
SHA5129ddc4c37d2a4e10efdf68a7f47343e3fdca3c34d3587c7e14c2383744d1912382115f8b80e1b6c1ae7f76e6b4040667bff264736413e92bbe973dcec7651606f
-
Filesize
710KB
MD551c31284296e7c02517f8a1cba189339
SHA118103ef35d0315e0f4400421a6bd0b8764a96982
SHA256d9205e56d7c5a53d4736874876b32fd6d456a75975956d8b7822ae5673bc25ac
SHA51269981adc7157820660be84bd43b0c51e8c0fc3d74d7648e5e3b12c60d5e271d56a897cfadf9a5807a8eb017d28b2105e7fc33e8cda3c2a5ba1aec289729fb41d
-
Filesize
403KB
MD5b9c4a44e1a8586648f08620be266a8ae
SHA17bd3f41279d131b38ccb6cd9503e8c7663ee1265
SHA256c6ee8b9c4e3a590596803001338e738da884532e6e19a216a3dec4c2d9bcfe93
SHA512525c1a91dde78bd6c127265d7647a40df1b8d4a83387dc880a2acf967e4753b4e4946bac545197943147bbfec3a8416e511ffa712074d1c64360e3ef523e2314
-
Filesize
588KB
MD510a407a5fe393739001dcf7e4f24a5b1
SHA1a6d2a4c6aa55cfddbeeb605550a7f1fe5937746e
SHA25697bace2fbafe4af536fa145e1dfc17cb109504eee17bf4ca99a4ec1e903963ad
SHA5127bd95a691d0f43cadbfbbdfc07608bf03a500f0b6413507f27f9dd9ef8dbd09324af7b72b01f1333c87bb694bda738bd38665f9863ffbf83d0562b56d4a7bc9d
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13