Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe
Resource
win10v2004-20241007-en
General
-
Target
528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe
-
Size
690KB
-
MD5
142ee86df8e3e6a378a0a2cdcc63ae9a
-
SHA1
d00cb34a3bb32eb4c992606cb754e0b140aca581
-
SHA256
528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804
-
SHA512
d0337b96e0622d10688ce80aa949822d2d3859f53eceaf8dfb32d7486265d44a76d77c04bbeb9ce591c52b8778c92731b68e49c8ff8dbf4f049ffeca58e542c8
-
SSDEEP
12288:Uy90RniNLv01IPY0vNlcBVviF00Jj25mJ9DhFvQE:Uy6nms1IPcPvWd25c9FZb
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3732-19-0x00000000022C0000-0x00000000022DA000-memory.dmp healer behavioral1/memory/3732-21-0x0000000004A00000-0x0000000004A18000-memory.dmp healer behavioral1/memory/3732-49-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-47-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-46-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-43-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-41-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-39-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-37-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-35-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-33-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-31-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-30-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-27-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-25-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-23-0x0000000004A00000-0x0000000004A13000-memory.dmp healer behavioral1/memory/3732-22-0x0000000004A00000-0x0000000004A13000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 02975496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 02975496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 02975496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 02975496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 02975496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 02975496.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4488-60-0x0000000004A20000-0x0000000004A5C000-memory.dmp family_redline behavioral1/memory/4488-61-0x0000000005050000-0x000000000508A000-memory.dmp family_redline behavioral1/memory/4488-65-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-73-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-95-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-93-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-91-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-87-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-85-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-83-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-81-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-79-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-77-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-75-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-71-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-69-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-67-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-89-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-63-0x0000000005050000-0x0000000005085000-memory.dmp family_redline behavioral1/memory/4488-62-0x0000000005050000-0x0000000005085000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3204 un236178.exe 3732 02975496.exe 4488 rk363092.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 02975496.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 02975496.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un236178.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1672 3732 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk363092.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un236178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02975496.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 02975496.exe 3732 02975496.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3732 02975496.exe Token: SeDebugPrivilege 4488 rk363092.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3204 2864 528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe 84 PID 2864 wrote to memory of 3204 2864 528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe 84 PID 2864 wrote to memory of 3204 2864 528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe 84 PID 3204 wrote to memory of 3732 3204 un236178.exe 85 PID 3204 wrote to memory of 3732 3204 un236178.exe 85 PID 3204 wrote to memory of 3732 3204 un236178.exe 85 PID 3204 wrote to memory of 4488 3204 un236178.exe 101 PID 3204 wrote to memory of 4488 3204 un236178.exe 101 PID 3204 wrote to memory of 4488 3204 un236178.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe"C:\Users\Admin\AppData\Local\Temp\528ad5dc092a66925b6937b2fcd574b7112ef2c6e3f94e3c1900620b6dacf804.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un236178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un236178.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02975496.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02975496.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 10524⤵
- Program crash
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk363092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk363092.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3732 -ip 37321⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD513b4b227aeee903d04f18a6305b0d9c1
SHA1746544e229cd17c48416b86a7de6bb0f9722354f
SHA256943dc071357be5d2d7f57626225d6051ee87c69012eb13ad21f723f01a37c917
SHA51248bcb87b6ae8947dd9c87b6a573632b515d4e6ae19601060bed65e7cf05bb1b5e6f8c18053c670f80711c74fb1907c796ba36188c1ccfddb50c924a839c35458
-
Filesize
259KB
MD5509b1240c8701ef2bed7edacf1db1c41
SHA1ddcbb052ac9badfd50ebf1406968d3d7749852da
SHA2563e7c5f4038bc4f6579bf2fcd1d6fc1578cefd20d1946f042283cf465221773db
SHA51287de975561f2e10129d34f1cb78f2efdbe844057858cfc55a7d7e6f1b6af26274db82132db150c8a54ad37869ff451ba13faf3801bd7a453a3c8a6086c8dc150
-
Filesize
341KB
MD5545118faae736a0082babf1e77055cde
SHA1158b6ddfb2de367348f44c13841885da32e7f4c7
SHA256cd6cae57558528886649491cb32710737ee8fa08c2d4e924ee3e6f6c8fd1ca3f
SHA51275e1c5e9fd5134431e12fe7c5e12efd908d606143189ec899c15c498606e73e4b2bca67ca4a2ed2f5b35deb721e306d623eaa8282866de7320ea7cefd0697992