Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe
Resource
win10v2004-20241007-en
General
-
Target
2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe
-
Size
479KB
-
MD5
905d56a1faa52089369e7d36dc43f2ab
-
SHA1
4a0d9e22642e4457bf9b51e3701e90b4554d37a5
-
SHA256
2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc
-
SHA512
1ee4a7f85df60896d9a6065fdab6eb392cb8ddddd0b3fbc663111a57606b1fde3ad9f9feb74575133d0ecbfc1a805b676487699ffb2fc53d1d4a2077e46a9e27
-
SSDEEP
12288:vMrwy90wRs0n5c1u31UTrO26Qb8te6J4TnVCxDn7hQ3dLV2:3yRCaX2TS2N8te6Jl78LA
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/464-15-0x00000000022A0000-0x00000000022BA000-memory.dmp healer behavioral1/memory/464-19-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/464-48-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-46-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-44-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-42-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-40-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-38-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-36-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-34-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-32-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-30-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-28-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-26-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-24-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-22-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/464-21-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6708615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6708615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6708615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6708615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6708615.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6708615.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c86-54.dat family_redline behavioral1/memory/1584-56-0x00000000000E0000-0x0000000000108000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3064 y1749817.exe 464 k6708615.exe 1584 l5121070.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6708615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6708615.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1749817.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1749817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6708615.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l5121070.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 k6708615.exe 464 k6708615.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 k6708615.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3064 3300 2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe 84 PID 3300 wrote to memory of 3064 3300 2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe 84 PID 3300 wrote to memory of 3064 3300 2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe 84 PID 3064 wrote to memory of 464 3064 y1749817.exe 85 PID 3064 wrote to memory of 464 3064 y1749817.exe 85 PID 3064 wrote to memory of 464 3064 y1749817.exe 85 PID 3064 wrote to memory of 1584 3064 y1749817.exe 89 PID 3064 wrote to memory of 1584 3064 y1749817.exe 89 PID 3064 wrote to memory of 1584 3064 y1749817.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe"C:\Users\Admin\AppData\Local\Temp\2fa23fe74d8db262a3dfbd54895f3704eb81f9c53c8748f82ec72eda368c6adc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1749817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1749817.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6708615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6708615.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5121070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5121070.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58808802b207513d76a2bd65c50ea1394
SHA107d57e67fc16c225d5642b135c32bb4e73bd6a3e
SHA256ffc7e886a2fe9e3261b4e0ddb48ad3aadf7edf3ccfdbd23e6ee2b2181da003ff
SHA5129318f4ac4c783237fa5cf2bc71d2495f5adfd704c24ee028b2fc7f2a0a9697802b139b5c1f6415f7f934e21a6531ff1138abfbfcecc0a5ced8ca47ab5bfb592a
-
Filesize
175KB
MD51605f718f74c8534e4d8a7a444f84e83
SHA171974c8c55826c185ac42f5c3d16a12246785629
SHA25663e0759744094f8ca1c5fd1d7943eca521569abf99458ddfbf6f4d1ea112f9a3
SHA512df33e74487998ccd4da1b461d94b2e3c57331775df658f6afe8998d309b525f018e57f13afcc943cec322f5a0d7d04f560774620cab25612723a0483438f7e5a
-
Filesize
136KB
MD5313c2c890b3c4693523af09fb07d6683
SHA18f3c1fb521ff3d99d500afbd0a32b0ab4952261a
SHA25665d8a8d4f144aefc11328650a4a0d3ae7d2c3893a602eff5928973da8d438fa1
SHA5127468d1294753000bbcf7ae744880d50cb78bdaebe2bc25c285bcdabc12d4ee3586cc31d6bfe76e6918c8604000d80a2c5fa5b2e645b319e0e6b27e1370cb92a2