Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe
Resource
win10v2004-20241007-en
General
-
Target
0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe
-
Size
1.0MB
-
MD5
aff8b61b9cbfc22b8aa24d134701bc38
-
SHA1
6e23d0ce463e776d69cb1f244a5b7bdbd6345d32
-
SHA256
0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6
-
SHA512
6bb5e655dbd51066bcfab7a474517e5ff15e55255910ec96543ab41f0b7e7a87ee83227d280a14e719ded22697b0b7cbc95ad664b290d7cca4426e885eb36866
-
SSDEEP
24576:dy+Kr1jRoM6Ubj3i4WX6BU8btDZEjTdRCLFf6:4fKM6UbMX6BU8bV6jTds
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3344-23-0x0000000002510000-0x000000000252A000-memory.dmp healer behavioral1/memory/3344-25-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/3344-36-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-26-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-53-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-52-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-49-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-47-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-45-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-44-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-41-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-39-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-37-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-31-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-29-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-27-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3344-34-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr625402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr625402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr625402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr625402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr625402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr625402.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2060-62-0x0000000002A00000-0x0000000002A3C000-memory.dmp family_redline behavioral1/memory/2060-63-0x0000000004E40000-0x0000000004E7A000-memory.dmp family_redline behavioral1/memory/2060-73-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-79-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-95-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-93-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-91-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-89-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-85-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-83-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-81-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-77-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-75-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-71-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-69-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-97-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-87-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-67-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-65-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline behavioral1/memory/2060-64-0x0000000004E40000-0x0000000004E75000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2344 un339856.exe 3940 un644713.exe 3344 pr625402.exe 2060 qu756415.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr625402.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr625402.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un339856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un644713.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3156 3344 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr625402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu756415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un339856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un644713.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3344 pr625402.exe 3344 pr625402.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3344 pr625402.exe Token: SeDebugPrivilege 2060 qu756415.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3620 wrote to memory of 2344 3620 0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe 84 PID 3620 wrote to memory of 2344 3620 0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe 84 PID 3620 wrote to memory of 2344 3620 0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe 84 PID 2344 wrote to memory of 3940 2344 un339856.exe 85 PID 2344 wrote to memory of 3940 2344 un339856.exe 85 PID 2344 wrote to memory of 3940 2344 un339856.exe 85 PID 3940 wrote to memory of 3344 3940 un644713.exe 86 PID 3940 wrote to memory of 3344 3940 un644713.exe 86 PID 3940 wrote to memory of 3344 3940 un644713.exe 86 PID 3940 wrote to memory of 2060 3940 un644713.exe 101 PID 3940 wrote to memory of 2060 3940 un644713.exe 101 PID 3940 wrote to memory of 2060 3940 un644713.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe"C:\Users\Admin\AppData\Local\Temp\0ad768060c70d8d1e51fc1d968b61a1a3755455c8c2a6f813c061f7fa19323d6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339856.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un339856.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un644713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un644713.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr625402.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr625402.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10645⤵
- Program crash
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu756415.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu756415.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3344 -ip 33441⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761KB
MD57af0238458ea0c5b608c1142a45c93bd
SHA1d748e1e380737bdde4ac72bdf4338e1003ee2ac7
SHA256df67c776250674bd4979c615bf5c5be3503bc7aea2b2e8907b949fa7c3d4577f
SHA512f482242265646afd7fa5a029ef6131daef720101e672c11ce9ab8380720deaee4991d8b50801fcc676f9a98f1c9cc6c7f9ad5ea7d8ef7e0937c22d6666c4a4a5
-
Filesize
607KB
MD54620c25adc0f5320e8fb5430701dbd56
SHA199fd99f5ab015570a02181a2b4565727e48e1b1a
SHA2560db90983e3df55577f98b560e42a04db539e89cf6b5d7172120e9dd5f5e8d256
SHA512edaceb95df565a4c6f8394a86c94320e331b7dfb6cd9fce072ee65d0e26a9d012e4fb677388e50561884724d19b578178df4739ecb6922f3354baddd98bb3333
-
Filesize
405KB
MD5b6a83e1f71e94863f5e0c3283a3239ef
SHA129c007b4bb8a7474081134d055c3814cc8fcd041
SHA2569e8d0193daa660a3a83df5d6f101a63c54efd70991f7a96f58987b7cb8d12160
SHA512973dfc4b29e3d0d7b49e01748adf3d309fe0315c49691225dd0000764c8b1710a5ee7db80d3ad530c60df123ffaefc77ba0988e6200144fec516ba462ad35ada
-
Filesize
488KB
MD5066b99e5b55587478e3881cbaf58b2f2
SHA13bce90751a632e60fe6d87a7f3c9301cd15a4031
SHA25640ae794fb1dfceed7bc191f26e643f4942da2b6b3f873de0aa325e7b56453fb1
SHA512829ef5511ac2bf7e913f74760a1c9fc8a05d23ffcee732f796e7deb4e85c37ab4c53d023a10ecbdc158030acb0e88ef4935c490a80673838b38ebaa31bae38c7