Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe
Resource
win10v2004-20241007-en
General
-
Target
cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe
-
Size
794KB
-
MD5
0b8815019de33025f63b4b65bcbb82d6
-
SHA1
64c494f32832b1da6c9d53eb0e6f79b9f96a0688
-
SHA256
cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25
-
SHA512
4760e7e7c62a7d5b969ad861ab47b1c3f7354573ca1c3622497fc4324803ca8373cb3f7b18ace883dfb05da461f2c92ac262261887cba90f234f6a4627a323c1
-
SSDEEP
24576:ey4wT0gfIUFSgEFJTd0SLwd66onoAQ4IqJ3l:tBIQS9JTdtcdKQ4Iql
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4840-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/4840-21-0x0000000005000000-0x0000000005018000-memory.dmp healer behavioral1/memory/4840-49-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-47-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-45-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-43-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-41-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-39-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-37-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-35-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-33-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-31-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-29-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-27-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-25-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-23-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4840-22-0x0000000005000000-0x0000000005012000-memory.dmp healer -
Healer family
-
Processes:
pro1714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1714.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1714.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1714.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2324-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5288-2156-0x0000000000F90000-0x0000000000FC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308890.exe family_redline behavioral1/memory/1320-2166-0x0000000000030000-0x000000000005E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7020.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu7020.exe -
Executes dropped EXE 5 IoCs
Processes:
un126342.exepro1714.exequ7020.exe1.exesi308890.exepid process 3936 un126342.exe 4840 pro1714.exe 2324 qu7020.exe 5288 1.exe 1320 si308890.exe -
Processes:
pro1714.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1714.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1714.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exeun126342.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un126342.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2412 4840 WerFault.exe pro1714.exe 2180 2324 WerFault.exe qu7020.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si308890.exececb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exeun126342.exepro1714.exequ7020.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si308890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un126342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1714.exepid process 4840 pro1714.exe 4840 pro1714.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1714.exequ7020.exedescription pid process Token: SeDebugPrivilege 4840 pro1714.exe Token: SeDebugPrivilege 2324 qu7020.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exeun126342.exequ7020.exedescription pid process target process PID 832 wrote to memory of 3936 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe un126342.exe PID 832 wrote to memory of 3936 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe un126342.exe PID 832 wrote to memory of 3936 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe un126342.exe PID 3936 wrote to memory of 4840 3936 un126342.exe pro1714.exe PID 3936 wrote to memory of 4840 3936 un126342.exe pro1714.exe PID 3936 wrote to memory of 4840 3936 un126342.exe pro1714.exe PID 3936 wrote to memory of 2324 3936 un126342.exe qu7020.exe PID 3936 wrote to memory of 2324 3936 un126342.exe qu7020.exe PID 3936 wrote to memory of 2324 3936 un126342.exe qu7020.exe PID 2324 wrote to memory of 5288 2324 qu7020.exe 1.exe PID 2324 wrote to memory of 5288 2324 qu7020.exe 1.exe PID 2324 wrote to memory of 5288 2324 qu7020.exe 1.exe PID 832 wrote to memory of 1320 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe si308890.exe PID 832 wrote to memory of 1320 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe si308890.exe PID 832 wrote to memory of 1320 832 cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe si308890.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe"C:\Users\Admin\AppData\Local\Temp\cecb357741b99723c6df4a5d9a539e53cfb9412772616daf3c8667504339ad25.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un126342.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1714.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10804⤵
- Program crash
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7020.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 13764⤵
- Program crash
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308890.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308890.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4840 -ip 48401⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2324 -ip 23241⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD509025ebec60cf0270f49babfd478d804
SHA108a89b904528c1c5ce9e8735d495e9a06603eea5
SHA256e802ad2feffbd9b2e83a3afa002c20035cd528a973856d4770a7030ec80ab7f3
SHA512d89e1ddf3d9a3fc228fc212c1421919ccff83a5d16b17c791bca5d17b584f437a62b64a51e252227d06ecb7a39d6aca470eb199ed1ba7fec22f7f541942f99e3
-
Filesize
641KB
MD5a628504d5044063a9d1aec869d18b9cd
SHA1d5b5954981e414b0a53418bb943f7d0350519747
SHA2563b251931690954c1d022dd4b0bcc288412cfd46b54f4cb887ff618ed8cd0c0b6
SHA51207cc6911b1907e862942cedce85ecc67c0afa806fb8f2367f0819af8a1e0580fbeeb504ccb113b05b191205aacd9197f27deaca6e4404a6c4ec873dcfded0459
-
Filesize
241KB
MD547e32be87977ce56538eae103abae39b
SHA145fa4aed2d13613a5a6444f427d9038657fd2780
SHA256ed6dfe98d3fc809b55e7dd688b3b44bf359e0e9ef2b95170fe82d1ef6a5354ae
SHA512db906f683df9e2c289f69ab9b73ad4861df734e8689ac69fca4a5e315b3a51363e330fa8e4f0e5dcbb5bda9a7e3543d3111173ebaa031761235cccb22d11a9f2
-
Filesize
424KB
MD55c34d8e4e420427424783429a9116afb
SHA11d77324b17dfc34fca174f5496de04453ed5293d
SHA256c026a78e64c2dc7825f4ee67c56601b78eb25c898ae354605666c0dba4240844
SHA5127d92abf607ce5df75e0d7546afe88907d8ab7fb15d27a078bb409367c93685127d4051f67c6ccacb316573b1f12a6aa02334b5ac5e76be760adb4d39bd908a23
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0