Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win11-20241007-en
General
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
-
Size
706KB
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2868-24-0x00000000045C0000-0x00000000045DA000-memory.dmp healer behavioral1/memory/2868-25-0x0000000004750000-0x0000000004768000-memory.dmp healer behavioral1/memory/2868-28-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-34-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-39-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-45-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-47-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-26-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-31-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-53-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-51-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-49-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-43-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-41-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-37-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-35-0x0000000004750000-0x0000000004762000-memory.dmp healer behavioral1/memory/2868-29-0x0000000004750000-0x0000000004762000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr352157.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr352157.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2744-66-0x0000000004860000-0x000000000489C000-memory.dmp family_redline behavioral1/memory/2744-67-0x00000000048A0000-0x00000000048DA000-memory.dmp family_redline behavioral1/memory/2744-101-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-99-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-97-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-95-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-93-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-91-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-89-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-87-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-85-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-83-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-81-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-79-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-77-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-75-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-73-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-71-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-69-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline behavioral1/memory/2744-68-0x00000000048A0000-0x00000000048D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2436 un460721.exe 2868 pr352157.exe 2744 qu619011.exe -
Loads dropped DLL 8 IoCs
pid Process 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 2436 un460721.exe 2436 un460721.exe 2436 un460721.exe 2868 pr352157.exe 2436 un460721.exe 2436 un460721.exe 2744 qu619011.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr352157.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pr352157.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460721.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un460721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr352157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu619011.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 pr352157.exe 2868 pr352157.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 pr352157.exe Token: SeDebugPrivilege 2744 qu619011.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2328 wrote to memory of 2436 2328 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 29 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2868 2436 un460721.exe 30 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31 PID 2436 wrote to memory of 2744 2436 un460721.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0