Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe
Resource
win10v2004-20241007-en
General
-
Target
9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe
-
Size
1.0MB
-
MD5
8f0f2514c6bbc888a2cfb02ca90ee34f
-
SHA1
2320b57aea813c026a8a14c8e762d2a6c41913de
-
SHA256
9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6
-
SHA512
ead058b129c734242e1d245392251078b97fc705b739f66614a6563ee9afbdb5fd07cdd7e713fcc38816f7223f8f7f09f06b222d3bd1ff3946cc5c998d02e045
-
SSDEEP
24576:wyzxt/KuvaoqhlOrnYvnewT+KaxKQRry1lUfeUgd5UNGm/ns:3zf/XioECynirryvI3NGK
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4988-23-0x0000000002790000-0x00000000027AA000-memory.dmp healer behavioral1/memory/4988-25-0x0000000002970000-0x0000000002988000-memory.dmp healer behavioral1/memory/4988-53-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-51-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-49-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-47-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-45-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-43-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-41-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-39-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-37-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-35-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-33-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-31-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-29-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-27-0x0000000002970000-0x0000000002982000-memory.dmp healer behavioral1/memory/4988-26-0x0000000002970000-0x0000000002982000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr458004.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4436-62-0x0000000002760000-0x000000000279C000-memory.dmp family_redline behavioral1/memory/4436-63-0x0000000004E40000-0x0000000004E7A000-memory.dmp family_redline behavioral1/memory/4436-73-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-69-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-67-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-81-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-71-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-65-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-64-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-97-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-95-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-93-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-91-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-89-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-87-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-85-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-83-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-79-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-77-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/4436-76-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1196 un121647.exe 5116 un146283.exe 4988 pr458004.exe 4436 qu733179.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr458004.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr458004.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un121647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un146283.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 444 4988 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu733179.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un121647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un146283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr458004.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4988 pr458004.exe 4988 pr458004.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4988 pr458004.exe Token: SeDebugPrivilege 4436 qu733179.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1196 2228 9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe 86 PID 2228 wrote to memory of 1196 2228 9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe 86 PID 2228 wrote to memory of 1196 2228 9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe 86 PID 1196 wrote to memory of 5116 1196 un121647.exe 87 PID 1196 wrote to memory of 5116 1196 un121647.exe 87 PID 1196 wrote to memory of 5116 1196 un121647.exe 87 PID 5116 wrote to memory of 4988 5116 un146283.exe 88 PID 5116 wrote to memory of 4988 5116 un146283.exe 88 PID 5116 wrote to memory of 4988 5116 un146283.exe 88 PID 5116 wrote to memory of 4436 5116 un146283.exe 102 PID 5116 wrote to memory of 4436 5116 un146283.exe 102 PID 5116 wrote to memory of 4436 5116 un146283.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe"C:\Users\Admin\AppData\Local\Temp\9e6e757d18cb8cd53f3c892d6ebeecaff8d80b65bc3d1310ce149b64a32b8bd6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121647.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un146283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un146283.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr458004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr458004.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 10805⤵
- Program crash
PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu733179.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu733179.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4988 -ip 49881⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD535882646cf522bca0b7a91ab1df194ba
SHA1571463f938891eabfb6494688f646709fd23c635
SHA256cf454085daa452aeb2ee5db483f2d6cad5ea901ac8ac5bc1f5bebdec846cb151
SHA512d274676e5e0c2a60d032a06271879095e92b2caebd8ee77d9e241a49c4e823ecc20e6509e5ef0579eb30f370e48cefe6ec2f8f4978e97ec9298082c3b7afe12e
-
Filesize
596KB
MD51555ce9883675d2e21742dcd65213f6f
SHA13bb87d535ada6c5db701c57ebef648a984382650
SHA256c30695da8b8c56a1ca0896ac9690218ce2b479ff9e500a7ab8938b5120c77675
SHA512973bcaa7d791fea94af609a7de3e5946ae4892802441706509319ac4a1e4fee65b2e253ad7828694ef7cea582ed17e093228c26c59a44c2c4d7e7cefa789fa5f
-
Filesize
389KB
MD54231e6c0db5c83f39fc069dc782f9954
SHA19f70caf4af4aa21a6304da214aef664a63ce3566
SHA256935392c04dfb4b7744266142cc1f0ced862886bdddc006e3994a41d49178e8a6
SHA512fb90ec5701709a3bafc85c8d7aa34553f0e975969585e67ae9d74e046bf4a8fd1b37c2c95e4a22230e54c3fdef446dc8fb099639fac724ae2558ac0c60af332b
-
Filesize
472KB
MD54e5625387b0222574e5587fb86931640
SHA14e5fef7d5cbb27824fbafa9344abb9bff88250d7
SHA256f44074df278a222914b4414bad5db58df1c683ff2e0bbeaf15c37795d18b3f11
SHA512ecdc54bc090979cb00e9773c00e3faadebe2cb420055ddec1332dbcf857c334f6b4d7087fee7820859f4e6805d399552157dc5e8cd68ad742dd72ad3692a6fc1