Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe
Resource
win10v2004-20240419-en
General
-
Target
d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe
-
Size
479KB
-
MD5
7bcf2e753722fce4e136cbbe1117f966
-
SHA1
e9f85926c3888d93bf7bdcbe582fcfcea7ee17ca
-
SHA256
d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844
-
SHA512
a5797cd51b94846ef22520662291a14667573cbe2fe57254ab4076ca82bd66678961e6a3a8505296ba9c79e4ce66d8e8493fe529b133047d9c0114824202eb62
-
SSDEEP
6144:Kky+bnr+sp0yN90QECge4Xy+xkKUxnwqggIjf1kuJQ4QbCA2P32NKr686MocC3gZ:wMr0y90bzuLxnwuITTQbCNRp6dxg71
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4440-15-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/4440-18-0x0000000002420000-0x0000000002438000-memory.dmp healer behavioral1/memory/4440-36-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-45-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-42-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-40-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-38-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-32-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-30-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-26-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-24-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-22-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-20-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-34-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-28-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-19-0x0000000002420000-0x0000000002432000-memory.dmp healer behavioral1/memory/4440-46-0x0000000002420000-0x0000000002432000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1735670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1735670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1735670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1735670.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1735670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1735670.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b93-52.dat family_redline behavioral1/memory/2440-54-0x00000000007B0000-0x00000000007D8000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
resource yara_rule behavioral1/memory/4440-15-0x0000000002150000-0x000000000216A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-18-0x0000000002420000-0x0000000002438000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-36-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-45-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-42-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-40-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-38-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-32-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-30-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-26-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-24-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-22-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-20-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-34-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-28-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-19-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4440-46-0x0000000002420000-0x0000000002432000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b93-52.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2440-54-0x00000000007B0000-0x00000000007D8000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 4092 y1976558.exe 4440 k1735670.exe 2440 l5217824.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1735670.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1735670.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1976558.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4440 k1735670.exe 4440 k1735670.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4440 k1735670.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4092 3016 d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe 83 PID 3016 wrote to memory of 4092 3016 d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe 83 PID 3016 wrote to memory of 4092 3016 d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe 83 PID 4092 wrote to memory of 4440 4092 y1976558.exe 84 PID 4092 wrote to memory of 4440 4092 y1976558.exe 84 PID 4092 wrote to memory of 4440 4092 y1976558.exe 84 PID 4092 wrote to memory of 2440 4092 y1976558.exe 97 PID 4092 wrote to memory of 2440 4092 y1976558.exe 97 PID 4092 wrote to memory of 2440 4092 y1976558.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe"C:\Users\Admin\AppData\Local\Temp\d7fc0af08c7889254cdf65ba417997f9d7d84c8c0c78665c4165c55cc6865844.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1976558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1976558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1735670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1735670.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5217824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5217824.exe3⤵
- Executes dropped EXE
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD543b84af92c8494c5f900585fe2e09764
SHA12e5627c40ccc8de56e387ca7f44b2a6d178d5a51
SHA25605a1128c35808cf04a3552b238bfc7e0cf1b531695cda5a05b2b26d965e906e2
SHA512887345cd70236ef96bc6dbc648c5f345d1297a7bd37131defd32f00af7fa055785f392e138799527eb608f6016f14caf781bf953a6a6efbb42a2a20a6b4b9160
-
Filesize
175KB
MD5e49886750e95b2674393077cf2ee9b0a
SHA1dc81ee1850826dfedd36382d1b5a5bf913e1a986
SHA2569ad5deeafca80f6bfacfb2290d072b3c8f00e819e295a42e0fb989b0b2edacac
SHA51265c5099fb31e8ff4ffeac09440f2e434e3804e142d440e54ae0052a33e5a116b4fb56c40c4184c7206cf854b8345529bccf94333cf00b551371d55445bf1e2fb
-
Filesize
136KB
MD5710515fb2c667ad83d8b3547e921f712
SHA1085d65dc42e2b7baa04caf2206f2e9ede48b2591
SHA25605c7f7137651ae6586b92f59e3391c5775a3d28175ac83e89be55843d1c35a1e
SHA512db8f4e21c85715274c9c61a22c638d39d25c098d4921a32c68d9a8cacacf600fcd217a552e12ee074d3ff5f177572c6b4ee10a3592075c0c44bfa58007c70566