Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe
Resource
win10v2004-20241007-en
General
-
Target
393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe
-
Size
690KB
-
MD5
2689e5a5792aab2e7a0a9c4c51e6701f
-
SHA1
714b857d687f4c26065ecc6f10323834e13be6b4
-
SHA256
393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44
-
SHA512
1569f62dd26f68c61bdce441ecaa49c4393a7446c70c874841c35fdc313a770ef77faaf1d50c440add9b0a7689d319c53541d46e51bcf6d5a3dcd0d284df7d41
-
SSDEEP
12288:ty90M0BEWj1xjbDCAG5bu7DiDguRPwIxpIi/rxDZySWL2u+081h:tymfjfUC6sWjBxDZyXL2fH
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5052-19-0x0000000004AB0000-0x0000000004ACA000-memory.dmp healer behavioral1/memory/5052-21-0x00000000050F0000-0x0000000005108000-memory.dmp healer behavioral1/memory/5052-22-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-47-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-45-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-43-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-41-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-39-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-38-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-35-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-34-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-49-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-31-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-29-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-27-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-25-0x00000000050F0000-0x0000000005103000-memory.dmp healer behavioral1/memory/5052-23-0x00000000050F0000-0x0000000005103000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99845552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99845552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99845552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99845552.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 99845552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99845552.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1936-61-0x0000000002510000-0x000000000254C000-memory.dmp family_redline behavioral1/memory/1936-62-0x0000000004B10000-0x0000000004B4A000-memory.dmp family_redline behavioral1/memory/1936-66-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-74-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-96-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-94-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-92-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-90-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-88-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-84-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-78-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-76-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-72-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-70-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-68-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-64-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-86-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-82-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-80-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline behavioral1/memory/1936-63-0x0000000004B10000-0x0000000004B45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4684 un012611.exe 5052 99845552.exe 1936 rk192020.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99845552.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 99845552.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un012611.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4396 5052 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un012611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99845552.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk192020.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5052 99845552.exe 5052 99845552.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5052 99845552.exe Token: SeDebugPrivilege 1936 rk192020.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4684 4448 393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe 84 PID 4448 wrote to memory of 4684 4448 393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe 84 PID 4448 wrote to memory of 4684 4448 393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe 84 PID 4684 wrote to memory of 5052 4684 un012611.exe 85 PID 4684 wrote to memory of 5052 4684 un012611.exe 85 PID 4684 wrote to memory of 5052 4684 un012611.exe 85 PID 4684 wrote to memory of 1936 4684 un012611.exe 98 PID 4684 wrote to memory of 1936 4684 un012611.exe 98 PID 4684 wrote to memory of 1936 4684 un012611.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe"C:\Users\Admin\AppData\Local\Temp\393b54248f88c421df2ad57191e23f1e4eff6a60829754fd7ccda05b3817df44.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012611.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012611.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99845552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99845552.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 10844⤵
- Program crash
PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk192020.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5052 -ip 50521⤵PID:720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD53a26033d36de5df06273159e1be597fa
SHA153830f66341743ce957ca3ad06629de3f2063a0d
SHA2569874158f2b7ba9fc6bd62a4fc8806ce57681d2b28b13b3b83f1e6d476fbf0b20
SHA5128fab7892a1a7553a09e6dfb97dafc1ccb35b9dfb1cd4bf5e93a246c9531b6025014318dc84db488821c974bd2f22c812fd6df16bf4e0a280100333d22b47150e
-
Filesize
259KB
MD5d9c977fd1fc8d4661620430babcfbd97
SHA14a6e40915067aa7068694dbf21cd1a0a8d2902d9
SHA25688e1ee0d52b919e2b973d6735f88f8e4f9ee63de6e5d4f5b0aaba1907943d51d
SHA51266c4c3db5173df70114074f25a20ba44baa6fa79479043e6da43a96c8d93ea0260b6bf01f29cc099571e75bf5b932bf64e572865234d2eecadfc8213b3c33bc4
-
Filesize
342KB
MD58ff56ade6c49f8c37b9cc8d60ec6a1d6
SHA149609311facc96e241817c36117cd9a11d99e003
SHA256b7efb691afbe66a561c337ea2023c72251eda517cf752e0a33faff13cb71dec6
SHA512a403729752737c6743aaa209f353c1c0ef2828c1801656e9e946f9af22163769779feff9196e561a75d3134e6cd9beaaec5721b207a3f304773bbff0a4d60bf9