Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe
Resource
win10v2004-20241007-en
General
-
Target
054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe
-
Size
690KB
-
MD5
9bc6e21658b1e61a95c358f459636ebc
-
SHA1
9a2ecc1aedfd84b855c11eaf30ca8bbaa854916d
-
SHA256
054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178
-
SHA512
31edcc0f7f0ef6f0fee873300739a89e7ba9117801bc60a08e67ed4e4962f34d2213d2ef7b58e9d5b8b42d5a2b176be60204853a23970a2e9c94500ddac29da0
-
SSDEEP
12288:ry907A/o3WDBkfRkxLC9QmIXkrIKGtniNjm3J7S2Uf/X4:ryXgW1GREC9XEkrIeNKWRf/o
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2648-19-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/2648-21-0x00000000025A0000-0x00000000025B8000-memory.dmp healer behavioral1/memory/2648-22-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-23-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-37-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-35-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-49-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-47-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-45-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-43-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-41-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-39-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-33-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-31-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-29-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-27-0x00000000025A0000-0x00000000025B3000-memory.dmp healer behavioral1/memory/2648-25-0x00000000025A0000-0x00000000025B3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 02849436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 02849436.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 02849436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 02849436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 02849436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 02849436.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2704-60-0x0000000002470000-0x00000000024AC000-memory.dmp family_redline behavioral1/memory/2704-61-0x0000000004A70000-0x0000000004AAA000-memory.dmp family_redline behavioral1/memory/2704-69-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-89-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-95-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-93-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-92-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-87-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-85-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-83-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-79-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-77-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-75-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-73-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-72-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-81-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-67-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-65-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-63-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline behavioral1/memory/2704-62-0x0000000004A70000-0x0000000004AA5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2488 un639422.exe 2648 02849436.exe 2704 rk281523.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 02849436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 02849436.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un639422.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5072 2648 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk281523.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un639422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02849436.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 02849436.exe 2648 02849436.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2648 02849436.exe Token: SeDebugPrivilege 2704 rk281523.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2488 4948 054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe 84 PID 4948 wrote to memory of 2488 4948 054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe 84 PID 4948 wrote to memory of 2488 4948 054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe 84 PID 2488 wrote to memory of 2648 2488 un639422.exe 85 PID 2488 wrote to memory of 2648 2488 un639422.exe 85 PID 2488 wrote to memory of 2648 2488 un639422.exe 85 PID 2488 wrote to memory of 2704 2488 un639422.exe 96 PID 2488 wrote to memory of 2704 2488 un639422.exe 96 PID 2488 wrote to memory of 2704 2488 un639422.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe"C:\Users\Admin\AppData\Local\Temp\054bfc739ef899d49b2f2bcbbb96cd5d5a7dce0ee3e65af0c13c05457e84a178.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un639422.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02849436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02849436.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 10804⤵
- Program crash
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk281523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk281523.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2648 -ip 26481⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5a70fcf9e4faabd2cb759e3b9625ffc14
SHA1aae507ad8685ca674121c7ebd5d4ed2eb353ed26
SHA25687a499b709a5cff69b61ee591d9e0620a157a7198ee2976213521e2c05d7cf44
SHA51237751e15357bc48d41147e8db653295f689f64d08fa5f0fabb758d84ea2e7884830790e6aa53016a701ff352c12f2373b1663af79c3c0f6e64371bc1f34c0692
-
Filesize
258KB
MD50a218630366040c54c7acdcbde0ec490
SHA1dd7d2193422a331985c9736fc05a4bc0c16f5864
SHA25626c3b711fcdb5fb0cde51876417a318f58730e6b470cb3a61ca250621e93dcde
SHA512583e4ee845ba5391b7b021dbd14866e628c2db8d9a1ed78d3d50703979314ed61c1ffcd29446ba1f0e797480f2d0d8d7f178e76a83b5b69c768fd1b357378df9
-
Filesize
341KB
MD5aa2c430af75ee0474a0fee98b2254c9b
SHA1a9447060464a0f6e0bb991ac797456f6202e40fc
SHA256cf87844c0c905f73b71c41053013321fd654fef063c6c530c9ce41ea3cf5fc94
SHA512486eac3418af4a545babaa05cc55a013272c9fc2acd5478ebbe4bb9a678f7f10b9bd003c7095d0d425bc8546d6f88daa80e9bcee8025790e0a564f94a566fa08