Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe
Resource
win10v2004-20241007-en
General
-
Target
c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe
-
Size
787KB
-
MD5
c077e608027f1953d97514121b06862a
-
SHA1
b75cbb80e34bc9f9707cce0ae9fdc9bc497a91d5
-
SHA256
c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d
-
SHA512
6d1668b9e200f0020c21d85fd2e8eb32071fe3c1d2fb14a99fc1e6116cbdcf10dc9f14c235b005c063236420f50afbd144729b26c920341b59bc0210dd5361e6
-
SSDEEP
24576:7yWevcc3TQqo4+Ziv3v7io8pwmLbQ+WV:uu5qoVgvfrfmLbR
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4712-19-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/4712-21-0x0000000002460000-0x0000000002478000-memory.dmp healer behavioral1/memory/4712-23-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-49-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-47-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-45-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-43-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-41-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-39-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-37-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-35-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-33-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-31-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-29-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-27-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-25-0x0000000002460000-0x0000000002472000-memory.dmp healer behavioral1/memory/4712-22-0x0000000002460000-0x0000000002472000-memory.dmp healer -
Healer family
-
Processes:
pro2937.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2937.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4400-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4532-2155-0x0000000000010000-0x0000000000040000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si132470.exe family_redline behavioral1/memory/2408-2166-0x0000000000B90000-0x0000000000BBE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2003.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu2003.exe -
Executes dropped EXE 5 IoCs
Processes:
un423253.exepro2937.exequ2003.exe1.exesi132470.exepid process 2428 un423253.exe 4712 pro2937.exe 4400 qu2003.exe 4532 1.exe 2408 si132470.exe -
Processes:
pro2937.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2937.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2937.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exeun423253.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un423253.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4428 4712 WerFault.exe pro2937.exe 408 4400 WerFault.exe qu2003.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro2937.exequ2003.exe1.exesi132470.exec84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exeun423253.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si132470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un423253.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2937.exepid process 4712 pro2937.exe 4712 pro2937.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2937.exequ2003.exedescription pid process Token: SeDebugPrivilege 4712 pro2937.exe Token: SeDebugPrivilege 4400 qu2003.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exeun423253.exequ2003.exedescription pid process target process PID 940 wrote to memory of 2428 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe un423253.exe PID 940 wrote to memory of 2428 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe un423253.exe PID 940 wrote to memory of 2428 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe un423253.exe PID 2428 wrote to memory of 4712 2428 un423253.exe pro2937.exe PID 2428 wrote to memory of 4712 2428 un423253.exe pro2937.exe PID 2428 wrote to memory of 4712 2428 un423253.exe pro2937.exe PID 2428 wrote to memory of 4400 2428 un423253.exe qu2003.exe PID 2428 wrote to memory of 4400 2428 un423253.exe qu2003.exe PID 2428 wrote to memory of 4400 2428 un423253.exe qu2003.exe PID 4400 wrote to memory of 4532 4400 qu2003.exe 1.exe PID 4400 wrote to memory of 4532 4400 qu2003.exe 1.exe PID 4400 wrote to memory of 4532 4400 qu2003.exe 1.exe PID 940 wrote to memory of 2408 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe si132470.exe PID 940 wrote to memory of 2408 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe si132470.exe PID 940 wrote to memory of 2408 940 c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe si132470.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe"C:\Users\Admin\AppData\Local\Temp\c84dc7fbb04eb5b3aeac5b9a7e66fb5b813a37cd780404e3f0f4bca8e3142b8d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423253.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423253.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2937.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 10844⤵
- Program crash
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2003.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 13844⤵
- Program crash
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si132470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si132470.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4712 -ip 47121⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4400 -ip 44001⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d33d2ca76a72da7f16d6d0c8c5c85a54
SHA1d8a1584263d79144c6a6c0425f6758491bcd736b
SHA256895cf9f93b3931d67c98a555a6cfe66338417a5486c2c92dc2b8fd8e03705f0b
SHA5125352a98e8784514deeae0888234d04147c4fd8ccf7db3b22039db0ff851172a11b2e5eeaeddf0c3d10095b7b9c54265b5ae1fec45863c5e131524bfc67f9f386
-
Filesize
633KB
MD5e1e32fd2038907f5e92ec2339cc9a24c
SHA1539761de865a66ea5c8e276c83fe33f714773ae7
SHA25686a206f9f8a7c9abd9574e6ce063f0232fad476d50daed655bc42652e5f48376
SHA512bb4d2e094ea6c959e63bb89d4aa5b6e8f11e4c2aca8e8ddf168262dec240ce7c27cfa9ff687971d8c43d463ab69d25d05704fd42def9868c64956f8ac704bde6
-
Filesize
231KB
MD5e0458b1ac23898e2685e366c44594663
SHA15d3396f3f2361d13e4ad35a895540a6c91ab9608
SHA256c8d5a1b91a9b43d4bf337bfeb46460c2a5565ba9dea8ebb39d83d32b70efcef3
SHA512c1a9c95aa1cb58ec463367cfc34c360aa6f755beac16b5fe6f8371985a361b27c84bd97f7ef80f22a1efc93e2479c4fd6aec78268a8f32cc2829de559ba9feda
-
Filesize
414KB
MD5fe21881a15603f1e3147bba9c98f1e24
SHA17564ce0773ff830486c23fc91def84ee36021a4e
SHA256afa3a6d730903450c93a12498957b7ef56c17ea5dbe8cf692e0ff6d99948e5c6
SHA512857580a5bfca38ca56ffc739d514786741de392727c5b070a4c0bd84c35a5255a9200422c91349b097e7395df721134d9c7d11ff302c517fcc4577ee11b4010a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0