Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
29-10-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win11-20241007-en
General
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
-
Size
706KB
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral3/memory/4784-18-0x0000000004BA0000-0x0000000004BBA000-memory.dmp healer behavioral3/memory/4784-20-0x0000000004C40000-0x0000000004C58000-memory.dmp healer behavioral3/memory/4784-32-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-34-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-48-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-46-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-44-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-42-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-38-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-36-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-30-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-28-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-24-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-22-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-40-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-21-0x0000000004C40000-0x0000000004C52000-memory.dmp healer behavioral3/memory/4784-27-0x0000000004C40000-0x0000000004C52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr352157.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral3/memory/2288-60-0x00000000071E0000-0x000000000721C000-memory.dmp family_redline behavioral3/memory/2288-61-0x0000000007220000-0x000000000725A000-memory.dmp family_redline behavioral3/memory/2288-95-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-93-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-91-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-89-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-87-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-85-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-83-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-81-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-79-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-77-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-75-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-73-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-71-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-69-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-67-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-65-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-63-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral3/memory/2288-62-0x0000000007220000-0x0000000007255000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4728 un460721.exe 4784 pr352157.exe 2288 qu619011.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr352157.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460721.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1976 4784 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un460721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr352157.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu619011.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4784 pr352157.exe 4784 pr352157.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 pr352157.exe Token: SeDebugPrivilege 2288 qu619011.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4728 2940 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 80 PID 2940 wrote to memory of 4728 2940 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 80 PID 2940 wrote to memory of 4728 2940 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 80 PID 4728 wrote to memory of 4784 4728 un460721.exe 81 PID 4728 wrote to memory of 4784 4728 un460721.exe 81 PID 4728 wrote to memory of 4784 4728 un460721.exe 81 PID 4728 wrote to memory of 2288 4728 un460721.exe 86 PID 4728 wrote to memory of 2288 4728 un460721.exe 86 PID 4728 wrote to memory of 2288 4728 un460721.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 12284⤵
- Program crash
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 47841⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0