Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe
Resource
win10v2004-20241007-en
General
-
Target
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe
-
Size
925KB
-
MD5
d249419f089dec604734f8f51513d57d
-
SHA1
cb4038ea5bcbc63d283c242541cd0e1073e6ef7f
-
SHA256
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369
-
SHA512
f8b8af190eb1d3353fec06d58cc71bed716c936d16bf97a5861be21c615c4b9f3b69975f23df66ba2412967c7d9a7e111f135497a262232d22787e72e7bcb11e
-
SSDEEP
12288:4MrQy90x7xlbW6j/V8jgBGEegBK9hGGi2MlwcZkShEemRT8LcBW2RkZSQZQjS7LB:IySnjnogq2l3oeVQNRK5ZQcmMFr
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca1-19.dat healer behavioral1/memory/3704-22-0x00000000004C0000-0x00000000004CA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it478674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4544-2112-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0008000000023c98-2117.dat family_redline behavioral1/memory/4460-2125-0x0000000000E10000-0x0000000000E40000-memory.dmp family_redline behavioral1/files/0x0007000000023c9f-2135.dat family_redline behavioral1/memory/6688-2136-0x00000000002E0000-0x000000000030E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation jr158104.exe -
Executes dropped EXE 6 IoCs
pid Process 556 ziXQ9096.exe 4160 zidY8545.exe 3704 it478674.exe 4544 jr158104.exe 4460 1.exe 6688 kp451159.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it478674.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXQ9096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidY8545.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7072 4544 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp451159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziXQ9096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidY8545.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr158104.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3704 it478674.exe 3704 it478674.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3704 it478674.exe Token: SeDebugPrivilege 4544 jr158104.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4552 wrote to memory of 556 4552 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 84 PID 4552 wrote to memory of 556 4552 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 84 PID 4552 wrote to memory of 556 4552 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 84 PID 556 wrote to memory of 4160 556 ziXQ9096.exe 86 PID 556 wrote to memory of 4160 556 ziXQ9096.exe 86 PID 556 wrote to memory of 4160 556 ziXQ9096.exe 86 PID 4160 wrote to memory of 3704 4160 zidY8545.exe 87 PID 4160 wrote to memory of 3704 4160 zidY8545.exe 87 PID 4160 wrote to memory of 4544 4160 zidY8545.exe 94 PID 4160 wrote to memory of 4544 4160 zidY8545.exe 94 PID 4160 wrote to memory of 4544 4160 zidY8545.exe 94 PID 4544 wrote to memory of 4460 4544 jr158104.exe 95 PID 4544 wrote to memory of 4460 4544 jr158104.exe 95 PID 4544 wrote to memory of 4460 4544 jr158104.exe 95 PID 556 wrote to memory of 6688 556 ziXQ9096.exe 99 PID 556 wrote to memory of 6688 556 ziXQ9096.exe 99 PID 556 wrote to memory of 6688 556 ziXQ9096.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe"C:\Users\Admin\AppData\Local\Temp\cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXQ9096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXQ9096.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidY8545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidY8545.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it478674.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it478674.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr158104.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr158104.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 14965⤵
- Program crash
PID:7072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp451159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp451159.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4544 -ip 45441⤵PID:2288
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD594e6ff3fef7b795a6be24353f26ea4b4
SHA1ad7e7bc4ea257a659d1c80d57d4aed22b2773aff
SHA256ca1b0fb534dd45101f85f41e3ad3b02fedab33e0d3c2f5bfd0e0a763d60d83f8
SHA512f110f6afecd41b77309e3e738f17067479770f123bc98f07dd08838d2cf32612d655b5e08f18fac09f508d942aa40250f3d51f9294a09df304a92dc4c8e32888
-
Filesize
169KB
MD5c2ee6dfea1f389a4874f76d2fcee6491
SHA10f44d586fbb18892d3e97123e61201361ffdb8a2
SHA256c2155fa38cc377ad79a3c93dae78602db3461d165db96f9fcd1152692b09cbf2
SHA512be230ea7af89d618d2574d2044d05e244c778255f8cd329b1ce53219f06c653f57e29c8dc5c83482b1c7fcb49cb64456dec0515ff8c6a9805ea12bf26a7ec23a
-
Filesize
507KB
MD5ca68f1f35f253cd94fe85d031fcdd4e7
SHA13a7aec52e7d4e04f0fdaf2f036e07310609d39a9
SHA2562b2b4f4f31f748d40c16096112a8fb59ac8516f19cf13dcbb38d8d9b59a4cd92
SHA512f7ae96ce92b419f137bac33161d79fe66b3cfaad36cb93fd491481a54d193cf5912545b4d5d4a049a1669a88b9b7235577f2dd83a4b79af45f1d370b49160c0d
-
Filesize
15KB
MD535c106657d4231803ddde519e86dc59b
SHA1d35abacdf3c5d11d8644dec1b3dd2fe030c6f789
SHA2566addd5d2b153ece6b55478ea97699c0a796ce23b459a13633b8e8d5f85891d6b
SHA512a3a50b113fcc71407c0c71c00fa90685f51405d06b5504849e1f3831808d9f63b9bf7e956806b19154dd148d749becab97c11c1ad2ffd79a180bd935893db281
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0