Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe
Resource
win10v2004-20241007-en
General
-
Target
49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe
-
Size
698KB
-
MD5
0f106a72f4da4751c1ea834d3e700d4c
-
SHA1
72d137e49dad638ea37aa9fcf187ac8e8d30439c
-
SHA256
49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f
-
SHA512
37c3b040e84314d457953956a2a13aa9699601617420a7368c5f599c4b20f62941d1682c2de680b0e1509ff1605c19e36f7787d22820ee6f337df1afcf778644
-
SSDEEP
12288:Hy905XrNZ1zIDw6PHUPTpO2vc3TcOtZpH8euviuYnEcY/JmzBi1oqA:HyIZCDU9ODlXuYEQzBi2qA
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2704-18-0x0000000004AA0000-0x0000000004ABA000-memory.dmp healer behavioral1/memory/2704-20-0x0000000004D40000-0x0000000004D58000-memory.dmp healer behavioral1/memory/2704-28-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-48-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-47-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-44-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-42-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-40-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-38-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-36-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-34-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-32-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-30-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-26-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-24-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-22-0x0000000004D40000-0x0000000004D52000-memory.dmp healer behavioral1/memory/2704-21-0x0000000004D40000-0x0000000004D52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr253999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr253999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr253999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr253999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr253999.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr253999.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3652-60-0x00000000048D0000-0x000000000490C000-memory.dmp family_redline behavioral1/memory/3652-61-0x0000000004B90000-0x0000000004BCA000-memory.dmp family_redline behavioral1/memory/3652-91-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-95-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-93-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-89-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-87-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-85-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-83-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-81-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-79-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-77-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-75-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-73-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-71-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-69-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-67-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-65-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-63-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline behavioral1/memory/3652-62-0x0000000004B90000-0x0000000004BC5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2264 un463463.exe 2704 pr253999.exe 3652 qu427608.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr253999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr253999.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un463463.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3816 2704 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr253999.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu427608.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 pr253999.exe 2704 pr253999.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2704 pr253999.exe Token: SeDebugPrivilege 3652 qu427608.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3340 wrote to memory of 2264 3340 49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe 86 PID 3340 wrote to memory of 2264 3340 49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe 86 PID 3340 wrote to memory of 2264 3340 49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe 86 PID 2264 wrote to memory of 2704 2264 un463463.exe 87 PID 2264 wrote to memory of 2704 2264 un463463.exe 87 PID 2264 wrote to memory of 2704 2264 un463463.exe 87 PID 2264 wrote to memory of 3652 2264 un463463.exe 97 PID 2264 wrote to memory of 3652 2264 un463463.exe 97 PID 2264 wrote to memory of 3652 2264 un463463.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe"C:\Users\Admin\AppData\Local\Temp\49db69c658fe75daae8eab89718cd027b77c6af7abd570fc21716fdce1ef373f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463463.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463463.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr253999.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr253999.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 10924⤵
- Program crash
PID:3816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu427608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu427608.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2704 -ip 27041⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5d685a326a1ffadeb0df1fdec3096bfe0
SHA18dd3d9f43a1d1adee42f73b7363464c5cceddd0c
SHA2566acbbf30637016e02a9aa794a2b77b639e21f03861734539b5b9c2f589d01703
SHA512a1c45bbe21ccf96e5462b9b0a560eef2a7b818d35fb37e88712dbf3be3fda2f9418bcf3a77a8014367b5286d1330fcdc6a0dd376e711042549b9c79bedd00b40
-
Filesize
269KB
MD5e302ec32d3fbc03383edf3e7de279382
SHA18426e1d3360c4c5c8e5b0b19caad2bf45637fed4
SHA256d1044b7a313fe8151c37bbe667aff9563c503c0a138650bd3053952471896112
SHA5127e7ec009febf5add69e039845396c9b8d74de0e2678155caf1b52fee913bfdb221bde8a6d30695d33a3acf505f91110d1f845feba1b2665295ef221e1a28db94
-
Filesize
351KB
MD52124bf42e28eaa8e0cb1438d2cc7a4ea
SHA17aca5f5e7a99448468dd0326bb8898b28e605cac
SHA256648d12b6122a791c5f8a9e3bd7196d12ac44f106c7d36ce76d1f1ab76d6e1b38
SHA5120e3be94179db323ff2d16bec0911f54f36fa4fdc0d13d4f688a3ad538f0aafdeb5e7adc56476afaa766e85f15551d0f0f1f3f5569ce1b8fb592b32084057c2c3