Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe
Resource
win10v2004-20241007-en
General
-
Target
71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe
-
Size
694KB
-
MD5
db0a3ab1ecc9016cd406d8ee8d500739
-
SHA1
aca142d0ee07098cea6f1a525a9ce3e683861a8b
-
SHA256
71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb
-
SHA512
3f3ad90a85d52977728f0600158af2da3994af422fbb9c76e2eff5e33455544fc26af09fe6a9c93fb64eb3d4c0b68c22e9f1d2c606d3ff75f77ae573e2e080fe
-
SSDEEP
12288:ay90cmp1cgFePaUeWbEJWa83oMRmNmQT7DllaMxUB5zhZi9SY:ayocSWaUeWbvzoMkNJJXWRY
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3876-18-0x0000000004990000-0x00000000049AA000-memory.dmp healer behavioral1/memory/3876-20-0x0000000007290000-0x00000000072A8000-memory.dmp healer behavioral1/memory/3876-31-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-46-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-44-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-42-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-40-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-38-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-36-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-34-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-32-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-48-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-28-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-26-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-24-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-22-0x0000000007290000-0x00000000072A2000-memory.dmp healer behavioral1/memory/3876-21-0x0000000007290000-0x00000000072A2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr478867.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1912-60-0x0000000004BC0000-0x0000000004BFC000-memory.dmp family_redline behavioral1/memory/1912-61-0x00000000071B0000-0x00000000071EA000-memory.dmp family_redline behavioral1/memory/1912-75-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-95-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-93-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-91-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-87-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-85-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-83-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-82-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-79-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-77-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-73-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-89-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-71-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-69-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-67-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-65-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-63-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/1912-62-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1896 un853150.exe 3876 pr478867.exe 1912 qu456147.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr478867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr478867.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un853150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 976 3876 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr478867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu456147.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un853150.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3876 pr478867.exe 3876 pr478867.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3876 pr478867.exe Token: SeDebugPrivilege 1912 qu456147.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 876 wrote to memory of 1896 876 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 876 wrote to memory of 1896 876 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 876 wrote to memory of 1896 876 71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe 84 PID 1896 wrote to memory of 3876 1896 un853150.exe 85 PID 1896 wrote to memory of 3876 1896 un853150.exe 85 PID 1896 wrote to memory of 3876 1896 un853150.exe 85 PID 1896 wrote to memory of 1912 1896 un853150.exe 97 PID 1896 wrote to memory of 1912 1896 un853150.exe 97 PID 1896 wrote to memory of 1912 1896 un853150.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"C:\Users\Admin\AppData\Local\Temp\71158b38a33d1d8a245fb87b34c4bc308ae4f4677e27d9653fce877af52b04eb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un853150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr478867.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 10844⤵
- Program crash
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu456147.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3876 -ip 38761⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5bcdef6c5da03c91b6c4ee75e21188a2f
SHA161f02c00cd4e163856a7dae3fa482af834af23e1
SHA256e429f2e0dec4d872451a292059647d02c65b0d527f3831e5e49201b437c23a69
SHA512ebcbba84cd21abdef4bf8d43434920967ec51a93c5305f094ff9bc0b282a13bf205de39911a1da6784b5024d6ccd2233d332e43ee66d97209c580bdc5d59d3f2
-
Filesize
278KB
MD555035719f1967b40a21bd260f4e40da8
SHA13db0f8d1d38a37c525391720b30de411534138c5
SHA256b6ebebb7b32f21a0a50795dd1d19d91820ee04991769113a87c8f5f7f2cbede7
SHA5127e22f6e49056f48ca0eeaa045c555a688b54208c0919151916bf2543e7d5dc7bc6496a5185b6aa3169d3d83364185f6e70eb5223f61b87d27ea8af416f1a2985
-
Filesize
361KB
MD588d1ca5e656cd3223240e232767762ea
SHA10e52da74d0a30764cd88a2db1b2857f7f6cf971d
SHA256ceb49b2729f99910f489e86cfa97b19fdb81637b36acf96a644a6537dc297a4a
SHA51224a76563d8a0cf8d3d5de24d1392ca953839fe507f5b0c49381dafcfa53c8ebd0758bf1586d3ec3b8e3ed14e072cb07eca642c5ecf82324a6e262516d652b54c