Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe
Resource
win10v2004-20241007-en
General
-
Target
c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe
-
Size
815KB
-
MD5
f599cf1bcfe4f72de8d0fbde1aa2bf41
-
SHA1
ec64012b9884762c50ebb72079d7b4850e9e73c3
-
SHA256
c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401
-
SHA512
58d8f811c3200f6f59cb4bbee6902b64a6af2950e7bcae869a1cc26882e3872c46cdc2699f048a95941fd7c21156445fd4fd40251d2bf98d949da30bb3794720
-
SSDEEP
12288:8Mr4y90PKrcDZN93f+7eUN7xWU2tpPJYkBw2qhe2hvUHz9SirSFUIhiIqAhH1zH:Myn4FPm7e+MDtpRBzqU2GTbYU9IqAzH
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3004-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/3004-21-0x0000000004DC0000-0x0000000004DD8000-memory.dmp healer behavioral1/memory/3004-49-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-47-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-45-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-43-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-41-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-39-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-37-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-35-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-33-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-31-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-29-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-27-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-25-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-23-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/3004-22-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer -
Healer family
-
Processes:
pro4010.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4010.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4010.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2716-2143-0x0000000005740000-0x0000000005772000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5680-2156-0x0000000000060000-0x0000000000090000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exe family_redline behavioral1/memory/1212-2167-0x00000000002B0000-0x00000000002DE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1750.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu1750.exe -
Executes dropped EXE 5 IoCs
Processes:
un936671.exepro4010.exequ1750.exe1.exesi255432.exepid process 1744 un936671.exe 3004 pro4010.exe 2716 qu1750.exe 5680 1.exe 1212 si255432.exe -
Processes:
pro4010.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4010.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exeun936671.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un936671.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2200 3004 WerFault.exe pro4010.exe 6080 2716 WerFault.exe qu1750.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro4010.exequ1750.exe1.exesi255432.exec354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exeun936671.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si255432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un936671.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4010.exepid process 3004 pro4010.exe 3004 pro4010.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4010.exequ1750.exedescription pid process Token: SeDebugPrivilege 3004 pro4010.exe Token: SeDebugPrivilege 2716 qu1750.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exeun936671.exequ1750.exedescription pid process target process PID 3680 wrote to memory of 1744 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe un936671.exe PID 3680 wrote to memory of 1744 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe un936671.exe PID 3680 wrote to memory of 1744 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe un936671.exe PID 1744 wrote to memory of 3004 1744 un936671.exe pro4010.exe PID 1744 wrote to memory of 3004 1744 un936671.exe pro4010.exe PID 1744 wrote to memory of 3004 1744 un936671.exe pro4010.exe PID 1744 wrote to memory of 2716 1744 un936671.exe qu1750.exe PID 1744 wrote to memory of 2716 1744 un936671.exe qu1750.exe PID 1744 wrote to memory of 2716 1744 un936671.exe qu1750.exe PID 2716 wrote to memory of 5680 2716 qu1750.exe 1.exe PID 2716 wrote to memory of 5680 2716 qu1750.exe 1.exe PID 2716 wrote to memory of 5680 2716 qu1750.exe 1.exe PID 3680 wrote to memory of 1212 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe si255432.exe PID 3680 wrote to memory of 1212 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe si255432.exe PID 3680 wrote to memory of 1212 3680 c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe si255432.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe"C:\Users\Admin\AppData\Local\Temp\c354dbcb1cc20ebbc02ce35c43769c8d59f75112a490f1f21e7b9a689a0f9401.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936671.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936671.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4010.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 10804⤵
- Program crash
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1750.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 13844⤵
- Program crash
PID:6080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si255432.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3004 -ip 30041⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2716 -ip 27161⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5f3ccd1388f34347f084c363f3a095517
SHA1a5f71f4bc524a07da60b8d5279b18e80c260eefc
SHA256732c81c09109b4fd8e28a7b66bec9345bd6e5f5a603a60dc981d6cf44eb03446
SHA5121fcd23f175d8678e02b596179cd2daf4ce223b64b3e6663a0221b95d0a580d8a44448bf6d6b1cc5abd2d307338457ffb3f9dd4cbaec12533d154e709ec48aed6
-
Filesize
661KB
MD5acdd5e4bb79b448e61d69e50691e4d69
SHA15526297c65eb3c18b6b261aacae9647b47489241
SHA2560f9678dcb0b30d70080b421ba6ae493455f40dc113ac63261952a0fa249c870d
SHA512f134b734a019859dc34725b273e38503cdebce665c2b5214d7dcd3e3a44c5a61375cf0c8b5a3b0b27e11cd36873273ae378ffda2cc8a9e3a7a4eb811521a20d3
-
Filesize
312KB
MD5f838da92ac8d32065140be25bec464b1
SHA1536cb2e037680e50f02d7c7ed676cc734a1cd2fa
SHA256c5f9adfd4e6831ad7f350e8d4d83a6583c6d7addc0a2182fa60f01bbb75c9540
SHA512830e44918a48e4838926330d1abe2d0d04e2d2bf176f3dd8c2dda06b4b5675e85568287b5841871cb6f9fa9b5c505166b72008e79069fea2b175f3a8ddfc4670
-
Filesize
495KB
MD5a4da9e3ecb6b96db4662a9f0e0706ccd
SHA1de98b0e903791ea40acde5f518a1fc7ceaf3c3f8
SHA256a762bd58670de264130e1b616a3089055e44979deab3be24b392a6bf0ada3b81
SHA512b7a04922dedf3f774b64ba26b2ed27969787aa85932b3e942a1ca74e9ae0b100b7f2d32bc94951e99a20ea6f7d708f2e08b4b3711720c5040b2f1937df9d2a02
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0