Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe
Resource
win10v2004-20241007-en
General
-
Target
846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe
-
Size
1000KB
-
MD5
2414ec3e4e085627d03ed6151e305dda
-
SHA1
e1e53721856f67dcd51d6d330e9e7afec1a03ed8
-
SHA256
846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da
-
SHA512
be632f15162825f4b24b45274f344307b89790e018b8462b8a6a296f86be9ecbc66e1bd508988aadff7562224269eadfd0a2a18fe31e83f50f1661fead2ad816
-
SSDEEP
24576:sTLrvnFOPYjIA0NCw+J3Hl+yV5vCoyvIc5zlYWSSpb:CrvFqYjbfJV+QvCoyZzt9p
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral2/memory/2284-26-0x0000000004930000-0x000000000494A000-memory.dmp healer behavioral2/memory/2284-28-0x0000000004CF0000-0x0000000004D08000-memory.dmp healer behavioral2/memory/2284-51-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-56-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-54-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-52-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-49-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-46-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-44-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-42-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-40-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-38-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-36-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-34-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-32-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-30-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral2/memory/2284-29-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 106888316.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 106888316.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/3272-68-0x0000000003020000-0x000000000305C000-memory.dmp family_redline behavioral2/memory/3272-69-0x0000000004CC0000-0x0000000004CFA000-memory.dmp family_redline behavioral2/memory/3272-75-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-87-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-101-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-99-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-98-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-95-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-94-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-91-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-90-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-85-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-83-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-81-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-79-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-77-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-73-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-71-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline behavioral2/memory/3272-70-0x0000000004CC0000-0x0000000004CF5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3148 ut865216.exe 8 iY640225.exe 2284 106888316.exe 3272 258768145.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 106888316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 106888316.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ut865216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" iY640225.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 2284 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ut865216.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iY640225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 106888316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258768145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2284 106888316.exe 2284 106888316.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2284 106888316.exe Token: SeDebugPrivilege 3272 258768145.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4788 wrote to memory of 3148 4788 846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe 87 PID 4788 wrote to memory of 3148 4788 846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe 87 PID 4788 wrote to memory of 3148 4788 846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe 87 PID 3148 wrote to memory of 8 3148 ut865216.exe 88 PID 3148 wrote to memory of 8 3148 ut865216.exe 88 PID 3148 wrote to memory of 8 3148 ut865216.exe 88 PID 8 wrote to memory of 2284 8 iY640225.exe 89 PID 8 wrote to memory of 2284 8 iY640225.exe 89 PID 8 wrote to memory of 2284 8 iY640225.exe 89 PID 8 wrote to memory of 3272 8 iY640225.exe 97 PID 8 wrote to memory of 3272 8 iY640225.exe 97 PID 8 wrote to memory of 3272 8 iY640225.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe"C:\Users\Admin\AppData\Local\Temp\846e5cfac587c46e306b86d5dc9903e39e3dae5d7d264b912abcffb29bef08da.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ut865216.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ut865216.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iY640225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iY640225.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\106888316.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\106888316.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 10805⤵
- Program crash
PID:2344
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\258768145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\258768145.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2284 -ip 22841⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
719KB
MD5d65c8e9f391cf20655232c5c987b746f
SHA1bfce684cea9f3ad1f8319e3dd581f58ec22df410
SHA2560376e92c9fdd3170bd6c4589d0ab56494bbef6ebb0c1ec8c2be1ea0c637281dc
SHA512226c17e238df5c15eb0a90d5e6922f131e45daa44bee1d7dffe934068cb0db54e03fb23d45826e6daf21f5251bc1cfa65948f19dc45c4c9099376f724e342597
-
Filesize
548KB
MD579bb8aa7f82a94ba01dc4b70c63957e0
SHA1535a7c0407de96fdce4bf3017f07b4333e9acc01
SHA256337c493481660ea88e0c92612f9caafff009cf7820f9fb84746b24ed2b64fff9
SHA512c7adba7203490aee60aa1b678632df1b1b168f47810bc927978f9b8b7e8ace467446c58f8ae85f3f5bbd3fa4cbae2ace32f67b893c02282de618878b98b50139
-
Filesize
278KB
MD5e1b364b4b96ca742b39a069ca1390a0b
SHA1970e15712c7b43117b2144d2dbf2aed590fff249
SHA256dc2f6a4b3d395642bdd40c133807093078b2e6b7f4e683a878d63e258d58cb4b
SHA5124b48624e84da9949c79e3116f9327cd1f1cd1a68cf495db1c7203db470fc668afca3f48674fc47244e6d6e9157a0d3adaa22183a20470a57df1c5f4a31f8573d
-
Filesize
360KB
MD5848ce28183931ae67c8a0d8ce3a1efc3
SHA1a39582bf82be42b8cf83b0015130273ab0e51c90
SHA2561920e51f6e64752f4dd7474638b8d86c646e1b8cc4099415d2319d038fe1aff3
SHA512430e793cac623274f0082eaec2377e946d9238f394837272ea4237ef305a00b3db28c081d6c82d2fbcadab0dc5a11769ebd9423e9129279a91ffe4b7aeae4b1d