Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe
Resource
win10v2004-20241007-en
General
-
Target
8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe
-
Size
797KB
-
MD5
799edee1fb43c237affc9236e1e4a13e
-
SHA1
9557886b2214cb8d354a1caf2d149c6ccec44c86
-
SHA256
8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944
-
SHA512
803bbd6073c5b8817db3034ab739ba1b90694139100eb95d40bd891bf427f83cd9f4b8d90149e6173735cad102e19ebe74b4039dce961146526e615a4d14f0fe
-
SSDEEP
24576:lyxH39rNPGNGhM3qn/x/oISZSUyPUpKi85uQ4:A5Nr5nM3meCUpdW
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5016-19-0x00000000020E0000-0x00000000020FA000-memory.dmp healer behavioral1/memory/5016-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/5016-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-44-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/5016-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro4910.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4910.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4910.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3272-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5316-2156-0x0000000000360000-0x0000000000390000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557135.exe family_redline behavioral1/memory/6008-2166-0x00000000009C0000-0x00000000009EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7841.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu7841.exe -
Executes dropped EXE 5 IoCs
Processes:
un054059.exepro4910.exequ7841.exe1.exesi557135.exepid process 4192 un054059.exe 5016 pro4910.exe 3272 qu7841.exe 5316 1.exe 6008 si557135.exe -
Processes:
pro4910.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4910.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4910.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exeun054059.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un054059.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1436 5016 WerFault.exe pro4910.exe 5864 3272 WerFault.exe qu7841.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un054059.exepro4910.exequ7841.exe1.exesi557135.exe8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un054059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si557135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4910.exepid process 5016 pro4910.exe 5016 pro4910.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4910.exequ7841.exedescription pid process Token: SeDebugPrivilege 5016 pro4910.exe Token: SeDebugPrivilege 3272 qu7841.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exeun054059.exequ7841.exedescription pid process target process PID 1952 wrote to memory of 4192 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe un054059.exe PID 1952 wrote to memory of 4192 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe un054059.exe PID 1952 wrote to memory of 4192 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe un054059.exe PID 4192 wrote to memory of 5016 4192 un054059.exe pro4910.exe PID 4192 wrote to memory of 5016 4192 un054059.exe pro4910.exe PID 4192 wrote to memory of 5016 4192 un054059.exe pro4910.exe PID 4192 wrote to memory of 3272 4192 un054059.exe qu7841.exe PID 4192 wrote to memory of 3272 4192 un054059.exe qu7841.exe PID 4192 wrote to memory of 3272 4192 un054059.exe qu7841.exe PID 3272 wrote to memory of 5316 3272 qu7841.exe 1.exe PID 3272 wrote to memory of 5316 3272 qu7841.exe 1.exe PID 3272 wrote to memory of 5316 3272 qu7841.exe 1.exe PID 1952 wrote to memory of 6008 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe si557135.exe PID 1952 wrote to memory of 6008 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe si557135.exe PID 1952 wrote to memory of 6008 1952 8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe si557135.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe"C:\Users\Admin\AppData\Local\Temp\8ecc183b682d9d8b15e2b8deac427cf5eb876535a444847bf744a0c55effd944.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054059.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4910.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4910.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 11004⤵
- Program crash
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7841.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 14964⤵
- Program crash
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557135.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557135.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5016 -ip 50161⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3272 -ip 32721⤵PID:5392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b22d205e4c19fead6e7489a792b85f10
SHA17060a4a3dc9263503c5da19268f4b46740f09dde
SHA256f02ad2f9161ab1a38844c5a5862873367d09e0dd4f1aaeae9c192a6c89c4e310
SHA512b4ce057960e6ad1f227d21556e9409c90d5e782415393d8a97f66fe9c2d59bf93ece5770cafe9c46a7427ba3fbc607c45955310b159147c61057c7fc3ddf1a5d
-
Filesize
643KB
MD5921bd1f654e25e868fa5ab8f22ddb199
SHA1dac87e1196e3e73c7950298a18a4141fee3aaf6d
SHA256c676d8f10b1efa499ae434f3b2d95c88b8852d79f61c44bde836bb9cd0bc3b05
SHA51280f3dd49948201d3106eda8f7f6202af7bcc46b553717cd0f407185b870e181230b7d53a7ec2629ec631c217c093b15d1a3c308ce93bf00204672e7f5d717bec
-
Filesize
241KB
MD5346492cacfe0566eb7fde8b9e2e7cb32
SHA170d5c983354c41a405f4ab4b6b3e995a2dbc0533
SHA25656c4276d7296d9704283a38f354d5ade8ffdc76f39d3401a36dd064f8e7564ac
SHA512263a7ace6e6972d8a7b5f89ebfdd3e3c4c0b16ef8aa5b4dfd93bfd929b46cb9408f6c8b4054414152ed31ca4e33acb57904486d444d599d88440f3cfdf6b1534
-
Filesize
424KB
MD5edb21c527a5a8217f944f065d80ef991
SHA157126c66d5042722fb59b8c9c235687341502087
SHA256bf3681f1f2a0101209c876d516e737b8775515ccf632d88041bcd533e19e3c96
SHA5121b9413b013d410f61e4bd1a57a2099fb0b49f448c1bc01b56a3c51e27d9491ac65c8b810ac3b599d8f34e52027dd5a209cb1078d113874a00942686ee2f624cf
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0