Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe
Resource
win10v2004-20241007-en
General
-
Target
c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe
-
Size
1.2MB
-
MD5
459e95e41c1666ad0731d48fce4a3dad
-
SHA1
67f57937f0a9b7289719c63aafc9b3183c9cd85b
-
SHA256
c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98
-
SHA512
923fe552c6f93b28bd7dffa807c1eda9b0e6b70b7988617841ff15c43885956815f0285cc93a43d3087d59cd4fb1976a2954251dc02404fdd2dfc4fd872be356
-
SSDEEP
24576:6yF5H78VNAyoLHkeVXg2HVhEhhgA5m86zhayJcr0MYYC9O8:BF5beNA1JB+6n8ian0YH
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4140-22-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/4140-24-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/4140-28-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-50-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-52-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-48-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-46-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-44-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-42-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-40-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-38-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-36-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-34-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-32-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-30-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-26-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/4140-25-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
Processes:
pr822626.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr822626.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3644-2204-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5784-2217-0x0000000000C30000-0x0000000000C5E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk562342.exe family_redline behavioral1/memory/2488-2228-0x0000000000820000-0x0000000000850000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu104044.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu104044.exe -
Executes dropped EXE 6 IoCs
Processes:
un545776.exeun546308.exepr822626.exequ104044.exe1.exerk562342.exepid process 1524 un545776.exe 2028 un546308.exe 4140 pr822626.exe 3644 qu104044.exe 5784 1.exe 2488 rk562342.exe -
Processes:
pr822626.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr822626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr822626.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
un546308.exec9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exeun545776.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un546308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un545776.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3484 4140 WerFault.exe pr822626.exe 3748 3644 WerFault.exe qu104044.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu104044.exe1.exerk562342.exec9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exeun545776.exeun546308.exepr822626.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu104044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk562342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un545776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un546308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr822626.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr822626.exepid process 4140 pr822626.exe 4140 pr822626.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr822626.exequ104044.exedescription pid process Token: SeDebugPrivilege 4140 pr822626.exe Token: SeDebugPrivilege 3644 qu104044.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exeun545776.exeun546308.exequ104044.exedescription pid process target process PID 2228 wrote to memory of 1524 2228 c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe un545776.exe PID 2228 wrote to memory of 1524 2228 c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe un545776.exe PID 2228 wrote to memory of 1524 2228 c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe un545776.exe PID 1524 wrote to memory of 2028 1524 un545776.exe un546308.exe PID 1524 wrote to memory of 2028 1524 un545776.exe un546308.exe PID 1524 wrote to memory of 2028 1524 un545776.exe un546308.exe PID 2028 wrote to memory of 4140 2028 un546308.exe pr822626.exe PID 2028 wrote to memory of 4140 2028 un546308.exe pr822626.exe PID 2028 wrote to memory of 4140 2028 un546308.exe pr822626.exe PID 2028 wrote to memory of 3644 2028 un546308.exe qu104044.exe PID 2028 wrote to memory of 3644 2028 un546308.exe qu104044.exe PID 2028 wrote to memory of 3644 2028 un546308.exe qu104044.exe PID 3644 wrote to memory of 5784 3644 qu104044.exe 1.exe PID 3644 wrote to memory of 5784 3644 qu104044.exe 1.exe PID 3644 wrote to memory of 5784 3644 qu104044.exe 1.exe PID 1524 wrote to memory of 2488 1524 un545776.exe rk562342.exe PID 1524 wrote to memory of 2488 1524 un545776.exe rk562342.exe PID 1524 wrote to memory of 2488 1524 un545776.exe rk562342.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe"C:\Users\Admin\AppData\Local\Temp\c9ddf5958bc7d3c91bac5d94b5622b6b105abd1d094a2fbaa5327de6a84edc98.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545776.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un546308.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un546308.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr822626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr822626.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10885⤵
- Program crash
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu104044.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu104044.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 13725⤵
- Program crash
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk562342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk562342.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4140 -ip 41401⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3644 -ip 36441⤵PID:5768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD592dda13a685355f6211c53c1ecd9eb44
SHA17183de018638dd377c3c61e958f314749807cfbc
SHA25649fcd3f18353f30e6d22ad748e07802212fd222c9e92aaa6d30e9eb17d8992b5
SHA512c7cd94e9d551f560d3488647ddc707b679b16f7da152ac921b8240a3bd32a995e12da0a9b6144d959405f0a248831d2456644548240b431aa66236cb98d0f526
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
708KB
MD5552149898a11a77b91aa888d906342da
SHA16a1abb2dbdac286471b7cdadcb1b59b74cac9f49
SHA256df8db21f27cbd39579ba15b9d9788c15bc585fd04493a7a69101f74ea7c0d42f
SHA5121828aaff7485defce1454a31e1a3726e6eaa8e43ecb250957c3fd9dcfff7820297a45bf1fb87265fb1ec88248c3b02c3989563d913cf85a5b6880456ea369c0f
-
Filesize
404KB
MD598beb6e0ebbb23774e77c2f902a163b3
SHA1446a83607668026a1034df0b365a480638ee92ef
SHA256edc19ab1fb928c1a030d32e2749ca9f85b71cb53e6eb4408c607e198f5e38b71
SHA51280b720b13d6e8346956543122404cf453ddfd772896b350cbeb71dd9bdd4d4a0e1277d48203383e60321050414e7d1f95bc8d615f9231975043382288e8d7084
-
Filesize
588KB
MD576ce876e53c1891b826bb1333085051a
SHA184843704e88584ab10ad96f0f63db365b655ab42
SHA256ce88a15ec3194e50ece47849c5cb71ca5756a7cb0edc5bf33a0c306150e098ba
SHA512383493202d48007d329828335525a1fb0223c3e2d3a418f1c7b2ad694257065edeb801cdc21dafda1660d2c5886d884d942ab78318dccb27fe229c0a6fe59d1c
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1