Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe
Resource
win10v2004-20241007-en
General
-
Target
dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe
-
Size
660KB
-
MD5
a71d5f827d0ecece1796bcbee63ffa39
-
SHA1
424d71ea4fc5e6f214dd04bfd297eee5ce9d1d3a
-
SHA256
dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b
-
SHA512
5692fea6d3defc470803e95fd260d21202b99980d4798b507700938902a2ec82bfb28b8f82ee4ed7d8311fc5cd3d116fef52fdf4c05a51a0b64adf0b8cf9b571
-
SSDEEP
12288:hMrqy90EcyDVRKJYmOfgx7E77iUbas4vo+hzxxFs2PcqAQKl:PyaybK+B67E77i7sz0xxFt5s
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dozt
77.91.124.145:4125
-
auth_value
857bdfe4fa14711025859d89f18b32cb
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c51-12.dat healer behavioral1/memory/2476-15-0x00000000004A0000-0x00000000004AA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr514795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr514795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr514795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr514795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr514795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr514795.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2896-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0008000000023c54-2110.dat family_redline behavioral1/memory/3556-2118-0x00000000004E0000-0x0000000000510000-memory.dmp family_redline behavioral1/files/0x0008000000023c4f-2128.dat family_redline behavioral1/memory/4568-2129-0x0000000000090000-0x00000000000C0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku512824.exe -
Executes dropped EXE 5 IoCs
pid Process 2248 ziiH4701.exe 2476 jr514795.exe 2896 ku512824.exe 3556 1.exe 4568 lr046646.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr514795.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiH4701.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4716 2896 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku512824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr046646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziiH4701.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 jr514795.exe 2476 jr514795.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2476 jr514795.exe Token: SeDebugPrivilege 2896 ku512824.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2248 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 84 PID 1636 wrote to memory of 2248 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 84 PID 1636 wrote to memory of 2248 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 84 PID 2248 wrote to memory of 2476 2248 ziiH4701.exe 86 PID 2248 wrote to memory of 2476 2248 ziiH4701.exe 86 PID 2248 wrote to memory of 2896 2248 ziiH4701.exe 101 PID 2248 wrote to memory of 2896 2248 ziiH4701.exe 101 PID 2248 wrote to memory of 2896 2248 ziiH4701.exe 101 PID 2896 wrote to memory of 3556 2896 ku512824.exe 103 PID 2896 wrote to memory of 3556 2896 ku512824.exe 103 PID 2896 wrote to memory of 3556 2896 ku512824.exe 103 PID 1636 wrote to memory of 4568 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 108 PID 1636 wrote to memory of 4568 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 108 PID 1636 wrote to memory of 4568 1636 dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe"C:\Users\Admin\AppData\Local\Temp\dcc07db864d3d7d2f3b0c2782916ef84e62a803ef7e6e0780e31259f7439e66b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiH4701.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiH4701.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr514795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr514795.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku512824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku512824.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 13804⤵
- Program crash
PID:4716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046646.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046646.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2896 -ip 28961⤵PID:4712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD58648a7650838c00686c4480bc3a08c13
SHA128fa6aa115896c9ca3f46d738f18d6b22d092ead
SHA2568dd0aa6b5e89367c4cd3e706de79af37e006885b385832294ccf13db268dfe7e
SHA51241b786f2101c9e3f4fb78f59db31a0f8a0c9d44d4e93b269e9d2726699527cd10ddd1e93a9491881e744a524a6b7fc4b5edb2e20b3f0287b45878ef2bfc1db21
-
Filesize
507KB
MD5b35c628b635a017d2b21f947105834b0
SHA109732eb9753a9a5de0be8dcf3cfdaf58e33cb99b
SHA256e8b5db87e44495e09ac79981f91fc646f017cd6a6de10cc31668316eb8be6da0
SHA5122d9ee3bfe128743f467d6c93ff8b58eef61b17eb2537e6790ce81178f6836e4f2d2bdbb8f8f0f0509d97c67c2debc524a7333c9aa33a4bda8e187319bf6197ff
-
Filesize
13KB
MD59b2413a5089ea3bf2b926f2bf78e14b4
SHA11864aaad95832ab8975e3902c5b02bab2eb9ce91
SHA2567e73e67c454e99318811a66b1ea87620db6c6958de067e2ffcf3c631622eb8d8
SHA512798cc525438983ad44ca7644bcaad67cc4a405120c9e409f4ae96878fe5fda4a93a62b60dd52906a8fa3f4a2c81d0b7495e887401a4b93d9692ec44c1de60e9a
-
Filesize
426KB
MD5920b96a7c1b4070fc1b832c892f20a7b
SHA1f2dfd10eb81d4b11d527e70ae14bcc1993b4ae34
SHA256c722e189334ad1240d9171481527ee69d754bf01e1d505ffd13220d3ccc500fc
SHA5126ec32c2c8bca0b1e7fd78fc65c3db40d5dc0a56c42a667fa7cc9a652f63e861e08cf63d6bc8cbee4f4ff38ee7431f85f709861f8118c064456febac49d75d954
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0