Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe
Resource
win10v2004-20241007-en
General
-
Target
ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe
-
Size
479KB
-
MD5
695603f32c753c511f41a6da7f7395a3
-
SHA1
eeddf0de7649347d83cb148d637226e0bb97ba89
-
SHA256
ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a
-
SHA512
88c11ccf756242b8543a1a667654e312c1e123b9c2a613a8d6f78337945fae6481be7f290175ca45dda029db0d5c45a0e3f84df8cbdf5a91c739404b5622da3a
-
SSDEEP
6144:Kxy+bnr+wp0yN90QE1cJpJ0B4KYIExFAOaoYX0S+GYfUFnq8ysycUYLxJAVoxb+K:nMrMy90QDJFKeaoM0tI8tYLxYooK
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3456-15-0x00000000049F0000-0x0000000004A0A000-memory.dmp healer behavioral1/memory/3456-18-0x0000000005080000-0x0000000005098000-memory.dmp healer behavioral1/memory/3456-48-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-46-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-44-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-42-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-40-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-38-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-36-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-34-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-32-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-30-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-28-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-26-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-24-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-22-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/3456-21-0x0000000005080000-0x0000000005092000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4237128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4237128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4237128.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4237128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4237128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4237128.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b99-54.dat family_redline behavioral1/memory/4488-56-0x0000000000780000-0x00000000007A8000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3516 y2640431.exe 3456 k4237128.exe 4488 l2603947.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4237128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4237128.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2640431.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2640431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4237128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2603947.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 k4237128.exe 3456 k4237128.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3456 k4237128.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3516 1664 ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe 84 PID 1664 wrote to memory of 3516 1664 ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe 84 PID 1664 wrote to memory of 3516 1664 ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe 84 PID 3516 wrote to memory of 3456 3516 y2640431.exe 85 PID 3516 wrote to memory of 3456 3516 y2640431.exe 85 PID 3516 wrote to memory of 3456 3516 y2640431.exe 85 PID 3516 wrote to memory of 4488 3516 y2640431.exe 102 PID 3516 wrote to memory of 4488 3516 y2640431.exe 102 PID 3516 wrote to memory of 4488 3516 y2640431.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe"C:\Users\Admin\AppData\Local\Temp\ce130bd208f35611bf7d9a6484ca33869cb619a3756913e66a0ae69eb6ab751a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2640431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2640431.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4237128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4237128.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2603947.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2603947.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5f1cdac57ef7cdd31243d2820a955a5a2
SHA1dc037db41e0f9dde382adae80acbca0b0a008ab3
SHA2560d520294c599feba740354f81b2e360c37274b1e67daf6a021714735420664c1
SHA5126d4419132ccbccfebf9611f881a2e16b1cdbb52338050b670a20e65799cdbf79fc26515b2dc3b4cfcf30c61f8d55d762b4d5f35802f2725ae39110db92f8801e
-
Filesize
175KB
MD505e8062565c44a2831f08f568280bde4
SHA1723009922d727b19da2f16ac032d6410efaff9b8
SHA256f023989fadd6acbf6c64c42ec191b011e0e8869b4a0f686daf85fa115da80045
SHA512af925c4b27e6d129184e0b0439bc4bc6f74489f45ed39db61e10af7a7bea0a2759aadd7ba973366245fa594bf9dcd849c1e869c3e9d06efc9191c1f7f9b6b64a
-
Filesize
136KB
MD5e90bb87eb40510f903806962a6c95124
SHA1448e9dd5808cfbf884e892e137a0544e9d70d555
SHA256e6e73da5f74b905c307e969328c0b68478d53c7844622b9c497c408da7909183
SHA5129f215345f4bec1ead0e8427f597edb80016e7842b9da3c1084e8799a35ba510fe5b3a969c065fe433bef563dd86b332ede6cea6c450a044ce26c57b3b9530f21