Resubmissions
29-10-2024 14:06
241029-regnlawcqp 1029-10-2024 12:53
241029-p4zvcsvhqp 1007-05-2023 04:57
230507-fldpqshh67 10Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-10-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win11-20241007-en
General
-
Target
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
-
Size
746KB
-
MD5
7c3dda2c9904ba420260b3489e2ef165
-
SHA1
c5ce5096c8d8175ff522ee68d1a68b8cea926c2d
-
SHA256
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66
-
SHA512
2f10af6e5d497478f47813322d039012467c43d4bba12fe30b5a42a472379c9daa62529c73657d77886c5b8fcaab9cae959e5264124cec750091b0d9a237febd
-
SSDEEP
12288:Sy90N8arEZ38DLXqXNNsbiuQ4sbrXfUcXfSqXtXVtCX3b73xzR:Sy48arEJYLa9eenX8cXfVSb7/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral4/memory/4784-19-0x0000000002810000-0x000000000282A000-memory.dmp healer behavioral4/memory/4784-21-0x0000000004FB0000-0x0000000004FC8000-memory.dmp healer behavioral4/memory/4784-47-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-49-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-45-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-43-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-39-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-35-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-31-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-29-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-25-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-41-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-23-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-37-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-34-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-22-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer behavioral4/memory/4784-27-0x0000000004FB0000-0x0000000004FC2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 55874308.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 55874308.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral4/memory/4316-62-0x0000000002900000-0x000000000293C000-memory.dmp family_redline behavioral4/memory/4316-80-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-78-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-98-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-96-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-94-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-92-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-88-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-86-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-84-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-82-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-90-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-76-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-74-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-72-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-70-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-68-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-66-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-65-0x0000000002A90000-0x0000000002AC5000-memory.dmp family_redline behavioral4/memory/4316-64-0x0000000002A90000-0x0000000002ACA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 860 un721028.exe 4784 55874308.exe 4316 rk367654.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 55874308.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un721028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3140 4784 WerFault.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un721028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55874308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk367654.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4784 55874308.exe 4784 55874308.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 55874308.exe Token: SeDebugPrivilege 4316 rk367654.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 236 wrote to memory of 860 236 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 77 PID 236 wrote to memory of 860 236 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 77 PID 236 wrote to memory of 860 236 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 77 PID 860 wrote to memory of 4784 860 un721028.exe 78 PID 860 wrote to memory of 4784 860 un721028.exe 78 PID 860 wrote to memory of 4784 860 un721028.exe 78 PID 860 wrote to memory of 4316 860 un721028.exe 82 PID 860 wrote to memory of 4316 860 un721028.exe 82 PID 860 wrote to memory of 4316 860 un721028.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe"C:\Users\Admin\AppData\Local\Temp\9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55874308.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55874308.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 10404⤵
- Program crash
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk367654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk367654.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4784 -ip 47841⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5f39e96db71b850be0e8113dff1c58e96
SHA123a5a923212d5dba4e79a32d29a53e981ab15b21
SHA256512a02378458eb8745bf6bdbc1eee575b557651072d935c96746f01c3eb30f7f
SHA5122be9713d582dd079188c08ca9ec60c596e55f70ede81893d0a30add859687aae7e522fde85ea005c24eab6bc8587a31b57fd1b5a7fc8303a904406b8f15ea31f
-
Filesize
376KB
MD5bfe8737b256d0abd4bd9b86dd51cf2d2
SHA191906151c3d615497a2685a1c2dfb8398a7524cb
SHA2563dea26076cd2848c5544006f5d3d06b5d7b369c0a594f50b3175c805587756f8
SHA512b581ab6ae61ceb4ad38b1888032fc53d4c972a97839096eb1b44a760377fc4eab12fb4b5fc2cb51d611355843e1f412631677e427c420b9e75cb2351e368cea9
-
Filesize
459KB
MD5d041b732253fef6c275a1f5c490447ed
SHA115caa238a29b75ea279ef08684558f89145741cf
SHA256f938c49409d99ce839e8b5de672c5a972c8348f96935b4ca7f73414e1bd406f1
SHA512c044332361d1e8788882beddd5d4113c5147c87b39b80791bbe1328b14c6a5b9a5b211c049802798ae474f8082281556469f636ebc2ab078dd25eba36f68f440