Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe
Resource
win10v2004-20241007-en
General
-
Target
386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe
-
Size
1.1MB
-
MD5
eab87c956927997261cdd3942876d9f1
-
SHA1
d26d63fe575090a565aabbe3c912e4ed6da8ca2b
-
SHA256
386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613
-
SHA512
55b5a25b38bb4d24ce0da9257c9d47bafecc15feaac43b304336e17afafc860791201f0da0e8232e269e0a8fa21ee1e47d615e30aae317425074ea77036be04c
-
SSDEEP
24576:HyUXHOby4Avu6ctswxBVdwWqmyfY4U10l2/HAGdVoN7:SYEyHvfUcWXBZ/bV6
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3660-23-0x0000000002630000-0x000000000264A000-memory.dmp healer behavioral1/memory/3660-25-0x0000000002960000-0x0000000002978000-memory.dmp healer behavioral1/memory/3660-31-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-53-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-51-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-49-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-47-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-45-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-43-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-41-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-39-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-37-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-35-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-33-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-29-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-27-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3660-26-0x0000000002960000-0x0000000002972000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr620632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr620632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr620632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr620632.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr620632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr620632.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4112-62-0x0000000002730000-0x000000000276C000-memory.dmp family_redline behavioral1/memory/4112-63-0x0000000004E30000-0x0000000004E6A000-memory.dmp family_redline behavioral1/memory/4112-69-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-85-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-97-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-96-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-93-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-91-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-89-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-83-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-81-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-79-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-77-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-75-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-73-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-71-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-87-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-67-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-65-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline behavioral1/memory/4112-64-0x0000000004E30000-0x0000000004E65000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 368 un885431.exe 3664 un401051.exe 3660 pr620632.exe 4112 qu845472.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr620632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr620632.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un885431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un401051.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5816 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2148 3660 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un885431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un401051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr620632.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu845472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3660 pr620632.exe 3660 pr620632.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3660 pr620632.exe Token: SeDebugPrivilege 4112 qu845472.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1152 wrote to memory of 368 1152 386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe 84 PID 1152 wrote to memory of 368 1152 386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe 84 PID 1152 wrote to memory of 368 1152 386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe 84 PID 368 wrote to memory of 3664 368 un885431.exe 85 PID 368 wrote to memory of 3664 368 un885431.exe 85 PID 368 wrote to memory of 3664 368 un885431.exe 85 PID 3664 wrote to memory of 3660 3664 un401051.exe 86 PID 3664 wrote to memory of 3660 3664 un401051.exe 86 PID 3664 wrote to memory of 3660 3664 un401051.exe 86 PID 3664 wrote to memory of 4112 3664 un401051.exe 97 PID 3664 wrote to memory of 4112 3664 un401051.exe 97 PID 3664 wrote to memory of 4112 3664 un401051.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe"C:\Users\Admin\AppData\Local\Temp\386ecdfa1264d87bf01885e651a8a08ae6d4dd94411b817dc7baba155fee6613.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885431.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un401051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un401051.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr620632.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr620632.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 10485⤵
- Program crash
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu845472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu845472.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3660 -ip 36601⤵PID:3008
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5816
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD539618f36d1e46aca9dcaf937e87df5c7
SHA1eb0046e736bf0256ecbf300b9596674c55e86a80
SHA2562ad1793a8f9445787f114e080736327e5150bcf46b519aa2e5888d69680e5b18
SHA512ee7b185c44443c69c73dcb19662a82c3063df0049850108a376d819a2594d4be01158c3d797e95c4a54c9cd9eccedff84b156eb1f0ca8637bdb4dca826f1e74e
-
Filesize
611KB
MD5c3cf292a1b4504f6addbdf519cd9dbfa
SHA1077ee98f01ec14d10ca76ff8635b3186b9d72cce
SHA256b9f2b029713d27abea18d33913134a5f7a2201cd65188593a6506a932ce36662
SHA512f877741035e30875c8fb71465e2a473a1915dc20ac37877a06eecc213b7455b74eda1685baeac35e4d1004f15b7c1aa22b9bd3e8c2d646e7777ba2b5f4791210
-
Filesize
405KB
MD5e8ba6d7ad1716a07ec919f2eafc94ea5
SHA1f074472de9a91e934447d1dfa91a912cf67e3025
SHA2568799e5a68f2721726bb7fcb968ff47ebf0dbf4968be8fc8532bd4647e8ccd9fd
SHA512ec0a9f7f4eb039ec30c8815034063a3f80f14fba79a7fa5f1211bf03f53ea9cbe1289e0ac31ad8f0c37846003fbb392fa8520606f6de2cb3374122ce63b8258d
-
Filesize
488KB
MD5b1cc8b860d5a6828b3d0fd9b3980a786
SHA1fd16e0e369f7a3ae891620ac40b2b157f1502446
SHA25604e8455b660f56cd2475fe9466954bdb7a00e92865d7772bccbc8f787e75cd84
SHA5120de3fbe3b5e212a2042b0f58a645299f3eee660793ab6669969680accfebbf30062a74f9692bfc9009662cbe3f254f9765799210ab882cc289f66e9ba32faafc